nuclei-templates/http/exposures/tokens/microsoft/microsoft-teams-webhook.yaml

23 lines
609 B
YAML
Executable File

id: microsoft-teams-webhook
info:
name: Microsoft Teams Webhook Disclosure
author: Ice3man
severity: info
metadata:
max-request: 1
tags: exposure,token,microsoft
http:
- method: GET
path:
- "{{BaseURL}}"
extractors:
- type: regex
part: body
regex:
- 'https://outlook\.office\.com/webhook/[A-Za-z0-9\-@]+/IncomingWebhook/[A-Za-z0-9\-]+/[A-Za-z0-9\-]+'
# digest: 490a0046304402206592120fada86353a571916708cd7957ee72f02e6d555add96372a8ec0576f17022076099b3788e3ada4a5b70889edb2524c536a092a6e0fa9c60e473bfd66e09054:922c64590222798bb761d5b6d8e72950