Skip to content

Sidekiq Sensitive URL

ID: sidekiq-sensitive-url

Severity: info

Author: DhiyaneshDK

Tags: exposure,token,sidekiq

id: sidekiq-sensitive-url
info:
name: Sidekiq Sensitive URL
author: DhiyaneshDK
severity: info
reference:
- https://github.com/semgrep/semgrep-rules/blob/develop/generic/secrets/gitleaks/sidekiq-sensitive-url.go
- https://github.com/semgrep/semgrep-rules/blob/develop/generic/secrets/gitleaks/sidekiq-sensitive-url.yaml
metadata:
max-request: 1
tags: exposure,token,sidekiq
http:
- method: GET
path:
- "{{BaseURL}}"
extractors:
- type: regex
part: body
regex:
- (?i)\b(http(?:s??):\/\/)([a-f0-9]{8}:[a-f0-9]{8})@(?:gems.contribsys.com|enterprise.contribsys.com)(?:[\/|\#|\?|:]|$)
# digest: 4a0a0047304502210097d7bf2edcdc0618021ce99879f1d4ee78fa1fed9e21dc5d8d301e97eeeff92502200ddb63ed21d82cb85f11313bf850d7ffe4765222b82cba10b64aa735cca408dd:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposures/tokens/sidekiq/sidekiq-sensitive-url.yaml"

View on Github