Files
nuclei-templates/http/technologies/herokuapp-detect.yaml
2024-12-01 13:57:55 +00:00

23 lines
686 B
YAML

id: herokuapp-detect
info:
name: Detect websites using Herokuapp endpoints
author: alifathi-h1,righettod
severity: info
description: Detected endpoints might be vulnerable to subdomain takeover or disclose sensitive info
metadata:
max-request: 1
tags: heroku,tech
http:
- method: GET
path:
- "{{BaseURL}}"
extractors:
- type: regex
part: body
regex:
- "[a-z0-9.-]+\\.herokuapp\\.com"
- "[a-z0-9.-]+\\.herokucdn\\.com"
# digest: 490a0046304402202622d4e317965749d436b420cee947239045e1b4ed8ba825ecf5529ff3c9638a02200f12b613cf4185c63e4222adb4b8c0a7c12f829693917555f5a09237cfe47255:922c64590222798bb761d5b6d8e72950