Skip to content

AWS Account ID

ID: aws-account-id

Severity: info

Author: DhiyaneshDK

Tags: aws,amazon,token,exposure

id: aws-account-id
info:
name: AWS Account ID
author: DhiyaneshDK
severity: info
reference:
- https://github.com/praetorian-inc/noseyparker/blob/main/data/default/rules/aws.yml
metadata:
verified: true
max-request: 1
tags: aws,amazon,token,exposure
http:
- method: GET
path:
- "{{BaseURL}}"
extractors:
- type: regex
part: body
regex:
- '(?i)aws_?(?:account)_?(?:id)?["''`]?\s{0,30}(?::|=>|=)\s{0,30}["''`]?([0-9]{4}-?[0-9]{4}-?[0-9]{4})'
# digest: 4a0a004730450221009e436beadca2a103a993a5f5f3fa2366153904e7227a2d66c64c320a74c16485022027e1ed0a0e313206a821c668eb608b8da61e11cd25db154be14a28b45854f922:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposures/tokens/amazon/aws-account-id.yaml"

View on Github