Skip to content

JavaMelody Monitoring Exposed

ID: java-melody-exposed

Severity: medium

Author: dhiyaneshDK,thomas_from_offensity

Tags: config,java,javamelody,misconfig

JavaMelody is a tool used to monitor Java or Java EE applications in QA and production environments. JavaMelody was detected on this web application. One option in the dashboard is to “View http sessions”. This can be used by an attacker to steal a user’s session.

id: java-melody-exposed
info:
name: JavaMelody Monitoring Exposed
author: dhiyaneshDK,thomas_from_offensity
severity: medium
description: JavaMelody is a tool used to monitor Java or Java EE applications in QA and production environments. JavaMelody was detected on this web application. One option in the dashboard is to "View http sessions". This can be used by an attacker to steal a user's session.
reference:
- https://www.acunetix.com/vulnerabilities/web/javamelody-publicly-accessible/
- https://github.com/javamelody/javamelody/wiki/UserGuide#16-security
metadata:
max-request: 2
tags: config,java,javamelody,misconfig
http:
- method: GET
path:
- '{{BaseURL}}/monitoring'
- '{{BaseURL}}/..%3B/monitoring'
matchers-condition: and
matchers:
- type: word
words:
- 'Monitoring JavaMelody on'
- type: status
status:
- 200
# digest: 490a00463044022038f17a00939e5e6f80c80619d2ac4b18ecf97263aba19c9088673c29da8b2b6c02203db1bea34a5a1bb8aeac1c30732bcb8ed9025e5789802b25fa600ad01e480535:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/misconfiguration/java-melody-exposed.yaml"

View on Github