nuclei-templates/exposures/configs/azure-domain-tenant.yaml

41 lines
987 B
YAML
Raw Normal View History

id: azure-domain-tenant
info:
name: Microsoft Azure Domain Tenant ID - Detect
author: V0idC0de
severity: info
description: Microsoft Azure Domain Tenant ID was detected.
2023-02-06 20:54:19 +00:00
reference:
- https://azure.microsoft.com
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0.0
cwe-id: CWE-200
tags: azure,microsoft,cloud
requests:
- raw:
- |
@Host: https://login.microsoftonline.com:443
GET /{{Host}}/v2.0/.well-known/openid-configuration HTTP/1.1
Host: login.microsoftonline.com
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: word
words:
- "token_endpoint"
extractors:
- type: regex
part: body
group: 1
regex:
- "\"https:\\/\\/login\\.microsoftonline\\.com\\/([0-9a-fA-F]{8}-[0-9a-fA-F]{4}-[0-9a-fA-F]{4}-[0-9a-fA-F]{4}-[0-9a-fA-F]{12})"
# Enhanced by mp on 2023/02/05