Security for everyone

CVE-2021-37304 Scanner

Detects 'Information Disclosure' vulnerability in Jeecg Boot <= 2.4.5, potentially exposing sensitive data.


Short Info



Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 sec

Scan only one

Domain, Ipv4



Jeecg Boot is an advanced, enterprise-level low-code platform that enables rapid development and deployment of web and mobile applications. It is widely used by developers to create efficient, scalable applications with minimal coding effort. This platform's flexibility and comprehensive feature set make it a popular choice for businesses looking to streamline their application development processes. However, vulnerabilities within such a platform can pose significant security risks, potentially leading to unauthorized access and data leakage.

The vulnerability specifically exists because the httptrace actuator endpoint is improperly secured, permitting unauthenticated access. An attacker can exploit this by sending a simple HTTP GET request to the endpoint, which then returns sensitive information about the application's HTTP trace data. This data can include HTTP request and response details, headers, and potentially sensitive information transmitted during the session.

If exploited, this vulnerability can lead to significant information disclosure. Attackers may gain insights into the application's internal workings, user data, session tokens, and other sensitive information that could be leveraged for further attacks, such as session hijacking, privilege escalation, or targeted phishing campaigns.

By leveraging the comprehensive scanning capabilities of the securityforeveryone platform, users can identify and mitigate vulnerabilities like CVE-2021-37304 efficiently. Our platform offers detailed insights and recommendations to secure your digital assets against emerging threats, ensuring the confidentiality, integrity, and availability of your information and systems.



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture