nuclei-templates/http/exposures/files/google-services-json.yaml

35 lines
966 B
YAML

id: google-services-json
info:
name: Google Service Json
author: DhiyaneshDK
severity: low
description: google-services.json internal file is exposed.
reference: https://www.exploit-db.com/ghdb/6886
metadata:
verified: true
max-request: 3
google-query: intitle:"index of" "google-services.json"
tags: google,cloud,exposure,files
http:
- method: GET
path:
- "{{BaseURL}}/google-services.json"
- "{{BaseURL}}/app/google-services.json"
- "{{BaseURL}}/android/app/google-services.json"
stop-at-first-match: true
matchers-condition: and
matchers:
- type: word
words:
- 'storage_bucket'
- 'oauth_client'
condition: and
- type: status
status:
- 200
# digest: 490a00463044022020ee1866291e51620adb9a16c0725726291b0ead7c2566af3d830fa5e8445e8d02201a2de8845456ae89ddf904ffab7c197cee7d59851e0652ded6fe972095d076a0:922c64590222798bb761d5b6d8e72950