Skip to content

Salesforce Access Token

ID: salesforce-access-token

Severity: info

Author: DhiyaneshDK

Tags: salesforce,exposure,tokens

id: salesforce-access-token
info:
name: Salesforce Access Token
author: DhiyaneshDK
severity: info
reference:
- https://github.com/praetorian-inc/noseyparker/blob/main/crates/noseyparker/data/default/builtin/rules/salesforce.yml
metadata:
verified: true
max-request: 1
tags: salesforce,exposure,tokens
http:
- method: GET
path:
- "{{BaseURL}}"
extractors:
- type: regex
part: body
regex:
- \b(00[a-zA-Z0-9]{13}![a-zA-Z0-9._]{96})(?:\b|$|[^a-zA-Z0-9._])
# digest: 4a0a0047304502210081d8dae30bbeb17d8530acf0ac5b07ca01e6bc15eb41bc95e5e1b72dd3e79fd202202e99e50806c9af94408336e8fbcdc8189a0cb30cc1ed2ad224a2a87ed0b13b2e:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposures/tokens/salesforce/salesforce-access-token.yaml"

View on Github