-
-
Notifications
You must be signed in to change notification settings - Fork 402
add a rule with APPLICATION-ATTACK-JAVA.conf to block Actuator url #2447
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Thank you for your very welcome report. |
8000
As this vulnerability is scored with a CVSS Score of 10 (CRITICAL) and we already have java rules against specific vulnerabilities, I think it could be worth writing a new rule for this vulnerability. I find it super difficult to find the affected URLs and I am thankful for @k4n5ha0's choice. I found the following descriptions of most of the URLs here:
However when I look through the PoCs of this CVE (1, 2, 3, 4) I only find the following 2 endpoints:
I still have some questions:
|
we can find many urls is vul. and some urls leak infos i think itis dangerous too. |
What I don't quite understand is that if we block these paths, are we also blocking legitimate requests? So we limit the functionality of the feature actuator? |
This issue has been open 120 days with no activity. Remove the stale label or comment, or this will be closed in 14 days |
Motivation
like CVE-2022-22947 SpEL injection, java Actuator usually comes out vul
so i think APPLICATION-ATTACK-JAVA.conf need block Actuator url as these:
/actuator
gateway/
/autoconfig
/beans
/env
/dump
/health
/info
/metrics
/shutdown
/trace
/heapdump
these urls gives many dangerous infomations aslo some of them have vul
Proposed solution
block them with level=2
reference linking:
https://github.com/maurosoria/dirsearch/blob/master/db/dicc.txt
https://github.com/mpgn/Spring-Boot-Actuator-Exploit
https://github.com/Greetdawn/CVE-2022-22947
https://docs.spring.io/spring-boot/docs/current/reference/html/actuator.html
thx
The text was updated successfully, but these errors were encountered: