Catégories

🔍 Licence d'Utilisation 🔍

Sauf mention contraire, le contenu de ce blog est sous licence CC BY-NC-ND 4.0.

© 2025 à 2042 Sébastien Gioria. Tous droits réservés.

Voici le template Nuclei que j’ai développé rapidement pour tester la CVE-2025-22235 touchant spring-boot et springSecurity.

id: CVE-2025-22235

info:
  name: Spring Boot EndpointRequest.to() Matcher Vulnerability
  author: Sebastien Gioria
  severity: high
  description: |
    EndpointRequest.to() creates a matcher for null/** if the actuator endpoint, for which the EndpointRequest has been created, is disabled or not exposed.
  reference:
    - https://spring.io/security/cve-2025-22235
    - https://nvd.nist.gov/vuln/detail/CVE-2025-22235
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
    cvss-score: 7.3
    cve-id: CVE-2025-22235
    cwe-id: CWE-20
  metadata:
    verified: true
    max-request: 2
  tags: cve, cve2025, spring, security, exposure

http:
  - method: GET
    path:
      - "/actuator"
      - "/null"
    
    matchers:
      - type: word
        part: body
        words:
          - "Whitelabel Error Page"
          - "There was an unexpected error"