Skip to content

Amazon Web Services Cognito Pool ID - Detect

ID: aws-cognito-pool

Severity: info

Author: gaurang,zeroc00i

Tags: file,keys,token,aws,amazon

Amazon Web Services Cognito Pool ID token was detected.

id: aws-cognito-pool
info:
name: Amazon Web Services Cognito Pool ID - Detect
author: gaurang,zeroc00i
severity: info
description: Amazon Web Services Cognito Pool ID token was detected.
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0
cwe-id: CWE-200
tags: file,keys,token,aws,amazon
file:
- extensions:
- all
extractors:
- type: regex
regex:
- "(ap|ca|eu|sa|us)-(east|southeast|south|west|north|central)-[0-9]:[0-9A-Za-z]{8}-[0-9A-Za-z]{4}-[0-9A-Za-z]{4}-[0-9A-Za-z]{4}-[0-9a-z]{12}"
# digest: 490a0046304402207d13cb30176731c60211df1722a3fac800ef80cfec3510c5b4e1bae80f2993b002203ac7cdc316f18af4d7181eabb641cf5925aac8faa7d310188349a732d7ddb4f9:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "file/keys/amazon/aws-cognito.yaml"

View on Github