nuclei-templates/http/exposures/tokens/microsoft/microsoft-teams-webhook.yaml

20 lines
415 B
YAML
Executable File

id: microsoft-teams-webhook
info:
name: Microsoft Teams Webhook Disclosure
author: Ice3man
severity: info
tags: exposure,token,microsoft
metadata:
max-request: 1
http:
- method: GET
path:
- "{{BaseURL}}"
extractors:
- type: regex
part: body
regex:
- 'https://outlook\.office\.com/webhook/[A-Za-z0-9\-@]+/IncomingWebhook/[A-Za-z0-9\-]+/[A-Za-z0-9\-]+'