Spring Boot Http Trace Actuator Exposed
Spring Boot Http Trace Actuator Exposed Misconfiguration.
Security Misconfiguration (SM)
How this template works
APIs Selection
The API selection filters in this template specify the criteria for selecting the API to be tested. In this case, the filters include the response code range (gte: 200, lt: 300) and the extraction of the URL as a variable (urlVar).
Execute request
The execute section defines the type of request to be executed and the specific request details. In this template, a single request is executed, and the URL is modified using the extracted URL variable (${urlVar}) to access the Actuator's HTTP trace endpoint.
Validation
The validation section defines the expected response criteria for the executed request. In this template, the response code is expected to be 200, and the response payload is expected to contain specific elements such as traces, timestamp, principal, and session.
Frequently asked questions
What is the purpose of the "Spring Boot Http Trace Actuator Exposed" test
What are the potential security risks associated with the misconfiguration of the Spring Boot Http Trace Actuator
What category and severity level does the "Spring Boot Http Trace Actuator Exposed" test fall under
How can the unauthorized access to HTTP tracing information be prevented
What are the recommended tags associated with the "Spring Boot Http Trace Actuator Exposed" test
Are there any references or resources available for further information on the "Spring Boot Http Trace Actuator Exposed" test
"The text editor in Akto is absolutely remarkable. Its user-friendly YAML format strikes the perfect balance between simplicity and power. With intuitive features like 'API selection filter', 'Execute', Validate' creating test rules becomes incredibly easy. Akto's test editor is a game-changer, enabling seamless creation of highly personalized and effective tests that could meet the needs of any modern day organization. "

Security team,
Rippling
Explore other tests
eSMTP - Config Discovery
Nginx - Git Configuration Exposure
Laravel - Sensitive Information Disclosure
Docker Container - Misconfiguration Exposure
Msmtp - Config Exposure
Parameters.yml - File Discovery
Mongo Express - Unauthenticated Access
Apache Airflow Configuration Exposure
Dockerrun AWS Configuration Exposure
Apache Config file disclosure
Appspec Yml Disclosure
CGI script environment variable