Support Center

Burp Community

See what our users are saying about Burp Suite:

How do I?

New Post View All

Feature Requests

New Post View All

Burp Extensions

New Post View All

Bug Reports

New Post View All
Documentation

Burp Suite Documentation

Take a look at our Documentation section for full details about every Burp Suite tool, function and configuration option.

Full Documentation Contents Burp Projects
Suite Functions Burp Tools
Options Using Burp Suite
Extensibility

Burp Extender

Burp Extender lets you extend the functionality of Burp Suite in numerous ways.

Extensions can be written in Java, Python or Ruby.

API documentation Writing your first Burp Suite extension
Sample extensions View community discussions about Extensibility
Support Center BApp Store J2EEScan

BApp details: J2EEScan

The goal of this extension is to improve the test coverage during web application penetration tests on J2EE applications. It adds some new test cases and new strategies to discover different kind of J2EE vulnerabilities.

Test cases:

  • Expression Language Injection (CVE-2011-2730)
  • JBoss SEAM Remote Command Execution (CVE-2010-1871)
  • Java Server Faces Local File Include (CVE-2013-3827 CVE-2011-4367)
  • Local File include - /WEB-INF/web.xml Retrieved
  • Local File include - Spring Application Context Retrieved
  • Local File include - struts.xml Retrieved
  • Local File include - weblogic.xml Retrieved
  • Local File include - ibm-ws-bnd.xml Retrieved
  • Local File include - ibm-web-ext.xmi Retrieved
  • Local File include - ibm-web-ext.xml Retrieved
  • Local File include - /etc/shadow Retrieved
  • Local File include - /etc/passwd Retrieved
  • Apache Struts 2 S2-016
  • Apache Struts 2 S2-017
  • Apache Struts 2 S2-020
  • Apache Struts 2 S2-021
  • Apache Struts DevMode Enabled
  • Apache Wicket Arbitrary Resource Access (CVE-2015-2080)
  • Grails Path Traversal (CVE-2014-0053)
  • Incorrect Error Handling - JSF
  • Incorrect Error Handling - Apache Struts
  • Incorrect Error Handling - Apache Tapestry
  • Incorrect Error Handling - Grails
  • Incorrect Error Handling - GWT
  • Incorrect Error Handling - Java
  • XML Security - XInclude Support
  • XML Security - XML External Entity
  • Information Disclosure Issues - Remote JVM version
  • Information Disclosure Issues - Apache Tomcat version
  • Compliance Checks - web.xml - HTTP Verb Tampering
  • Compliance Checks - web.xml - URL Parameters for Session Tracking
  • Compliance Checks - web.xml - Incomplete Error Handling
  • Compliance Checks - web.xml - Invoker Servlet
  • Infrastructure Issue - HTTP Weak Password
  • Infrastructure Issue - Tomcat Manager Console Weak Password
  • Infrastructure Issue - Tomcat Host Manager Console Weak Password
  • Infrastructure Issue - WEB-INF Application Configuration Files Retrieved
  • Infrastructure Issue - Status Servlet
  • Infrastructure Issue - Snoop Servlet (CVE-2012-2170)
  • Infrastructure Issue - Extended Path Traversal Scan
  • Infrastructure Issue - JBoss Web Service Enumeration
  • Infrastructure Issue - JBoss Admin Console Weak Password
  • Infrastructure Issue - JBoss JMX/Web Console Not Password Protected
  • Infrastructure Issue - JBoss JMX Invoker Remote Command Execution
  • Infrastructure Issue - Jetty Remote Leak Shared Buffers (CVE-2015-2080) found by @gdssecurity
  • Infrastructure Issue - Apache Axis2 - Web Service Enumeration
  • Infrastructure Issue - Apache Axis2 - Admin Console Weak Password
  • Infrastructure Issue - Apache Axis2 - Local File Include Vulnerability (OSVDB 59001)

Requires Java version 7.

Author Enrico Milanese
Version 1.2.6
Rating
Popularity
Last updated 02 October 2017

You can install BApps directly within Burp, via the BApp Store feature in the Burp Extender tool. You can also download them from here, for offline installation into Burp.

Download BApp View Source Code

Please note that extensions are written by third party users of Burp, and PortSwigger Web Security makes no warranty about their quality or usefulness for any particular purpose.

Go back to BappStore