nuclei-templates/exposures/tokens/microsoft/microsoft-teams-webhook.yaml

17 lines
377 B
YAML
Executable File

id: microsoft-teams-webhook
info:
name: Microsoft Teams Webhook Disclosure
author: Ice3man
severity: info
tags: exposure,token
requests:
- method: GET
path:
- "{{BaseURL}}"
extractors:
- type: regex
part: body
regex:
- 'https://outlook\.office\.com/webhook/[A-Za-z0-9\-@]+/IncomingWebhook/[A-Za-z0-9\-]+/[A-Za-z0-9\-]+'