Skip to content

Adobe Client ID

ID: adobe-client-id

Severity: info

Author: DhiyaneshDK

Tags: adobe,exposure,tokens

id: adobe-client-id
info:
name: Adobe Client ID
author: DhiyaneshDK
severity: info
reference:
- https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/adobe-client-id.yaml
- https://github.com/returntocorp/semgrep-rules/blob/develop/generic/secrets/gitleaks/adobe-client-id.go
metadata:
verified: true
max-request: 1
tags: adobe,exposure,tokens
http:
- method: GET
path:
- "{{BaseURL}}"
extractors:
- type: regex
part: body
regex:
- (?i)(?:adobe)(?:[0-9a-z\-_\t .]{0,20})(?:[\s|']|[\s|"]){0,3}(?:=|>|:=|\|\|:|<=|=>|:)(?:'|\"|\s|=|\x60){0,5}([a-f0-9]{32})(?:['|\"|\n|\r|\s|\x60|;]|$)
# digest: 490a00463044022017642769b64af2addd28f4a956da1a1b3974fae5e628772f3a9bcbe05984294002207c0b8d6caa555bb2c10e34ddb9cc5ecb771bb376d4e8cc5b6710436d720abeb6:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposures/tokens/adobe/adobe-client-id.yaml"

View on Github