nuclei-templates/http/exposures/configs/azure-domain-tenant.yaml

41 lines
991 B
YAML

id: azure-domain-tenant
info:
name: Microsoft Azure Domain Tenant ID - Detect
author: V0idC0de
severity: info
description: Microsoft Azure Domain Tenant ID was detected.
reference:
- https://azure.microsoft.com
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0.0
cwe-id: CWE-200
tags: azure,microsoft,cloud,exposure
metadata:
max-request: 1
http:
- raw:
- |
@Host: https://login.microsoftonline.com:443
GET /{{Host}}/v2.0/.well-known/openid-configuration HTTP/1.1
Host: login.microsoftonline.com
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: word
words:
- "token_endpoint"
extractors:
- type: regex
part: body
group: 1
regex:
- "\"https:\\/\\/login\\.microsoftonline\\.com\\/([0-9a-fA-F]{8}-[0-9a-fA-F]{4}-[0-9a-fA-F]{4}-[0-9a-fA-F]{4}-[0-9a-fA-F]{12})"