Skip to content

Microsoft Teams Webhook Disclosure

ID: microsoft-teams-webhook

Severity: info

Author: Ice3man

Tags: exposure,token,microsoft

id: microsoft-teams-webhook
info:
name: Microsoft Teams Webhook Disclosure
author: Ice3man
severity: info
metadata:
max-request: 1
tags: exposure,token,microsoft
http:
- method: GET
path:
- "{{BaseURL}}"
extractors:
- type: regex
part: body
regex:
- 'https://outlook\.office\.com/webhook/[A-Za-z0-9\-@]+/IncomingWebhook/[A-Za-z0-9\-]+/[A-Za-z0-9\-]+'
# digest: 4a0a0047304502206fbd32d030677ab67b1d206d8c6526d5bb1d73d564094ed997d8193aab99ddb0022100a03c4f26a79b57f92ce19727110720f029e16e971a2e90bd29c613f0b1549528:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposures/tokens/microsoft/microsoft-teams-webhook.yaml"

View on Github