You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: java/ql/src/experimental/Security/CWE/CWE-016/InsecureSpringActuatorConfig.ql
+21-37Lines changed: 21 additions & 37 deletions
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,7 @@
1
1
/**
2
2
* @name Insecure Spring Boot Actuator Configuration
3
-
* @description Exposed Spring Boot Actuator through configuration files without declarative or procedural security enforcement leads to information leak or even remote code execution.
3
+
* @description Exposed Spring Boot Actuator through configuration files without declarative or procedural
4
+
* security enforcement leads to information leak or even remote code execution.
4
5
* @kind problem
5
6
* @id java/insecure-spring-actuator-config
6
7
* @tags security
@@ -9,7 +10,6 @@
9
10
10
11
import java
11
12
import semmle.code.configfiles.ConfigFiles
12
-
import semmle.code.java.security.SensitiveActions
13
13
import semmle.code.xml.MavenPom
14
14
15
15
/** The parent node of the `org.springframework.boot` group. */
@@ -26,7 +26,10 @@ class SpringBootPom extends Pom {
# safe configuration (spring boot 1.5+): requires value false to expose sensitive actuators
19
19
management.security.enabled=true
20
20
21
-
# safe configuration (spring boot 2+): exposes health and info only by default
21
+
# safe configuration (spring boot 2+): exposes health and info only by default, here overridden to expose one additional endpoint which we assume is intentional and safe.
0 commit comments