Skip to content

Spring Eureka Exposure

ID: spring-eureka

Severity: low

Author: tess

Tags: misconfig,springboot,exposure,eureka

Spring Eureka is exposed.

id: spring-eureka
info:
name: Spring Eureka Exposure
author: tess
severity: low
description: Spring Eureka is exposed.
metadata:
verified: true
max-request: 1
shodan-query: title:"Eureka"
tags: misconfig,springboot,exposure,eureka
http:
- method: GET
path:
- "{{BaseURL}}"
matchers-condition: and
matchers:
- type: word
part: body
words:
- 'Eureka'
- 'Toggle navigation'
- 'Last 1000 since startup'
condition: and
- type: status
status:
- 200
# digest: 4b0a00483046022100bc5868eff51a96caf18626eb89c33709f9fa6dda797357ecf3a37826e978f204022100a37b0d54e343a4572b5c3c89f3c49b14bd80221a388d3ea70da95e510cf856a2:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/misconfiguration/springboot/spring-eureka.yaml"

View on Github