nuclei-templates/http/technologies/herokuapp-detect.yaml

23 lines
688 B
YAML
Raw Normal View History

2021-07-10 16:52:27 +00:00
id: herokuapp-detect
2021-07-10 16:31:09 +00:00
info:
2021-07-10 16:52:27 +00:00
name: Detect websites using Herokuapp endpoints
2024-04-01 18:26:27 +00:00
author: alifathi-h1,righettod
2021-07-10 16:31:09 +00:00
severity: info
description: Detected endpoints might be vulnerable to subdomain takeover or disclose sensitive info
metadata:
max-request: 1
2023-10-14 11:27:55 +00:00
tags: heroku,tech
2021-07-10 16:31:09 +00:00
http:
2021-07-10 16:31:09 +00:00
- method: GET
path:
- "{{BaseURL}}"
extractors:
- type: regex
part: body
regex:
- "[a-z0-9.-]+\\.herokuapp\\.com"
2024-04-01 18:26:27 +00:00
- "[a-z0-9.-]+\\.herokucdn\\.com"
# digest: 4a0a00473045022019060c7c12cd369d01ace5809c3741a16cfa048e73fa86885482bd5d28ff1875022100e7c9f7960f61af1180c927cac9e3f43e2ec2d661bc9b5860960f7a4ea8c805b9:922c64590222798bb761d5b6d8e72950