Skip to content

Vault Batch Token

ID: vault-batch-token

Severity: info

Author: DhiyaneshDK

Tags: vault,exposure,tokens

id: vault-batch-token
info:
name: Vault Batch Token
author: DhiyaneshDK
severity: info
reference:
- https://github.com/semgrep/semgrep-rules/blob/develop/generic/secrets/gitleaks/vault-batch-token.go
- https://github.com/semgrep/semgrep-rules/blob/develop/generic/secrets/gitleaks/vault-batch-token.yaml
metadata:
verified: true
max-request: 1
tags: vault,exposure,tokens
http:
- method: GET
path:
- "{{BaseURL}}"
extractors:
- type: regex
part: body
regex:
- (?i)\b(hvb\.[a-z0-9_-]{138,212})(?:['|\"|\n|\r|\s|\x60|;]|$)
# digest: 4a0a00473045022100af44a66e2468efa60625fe60b8dffca6905d833226754ae66a79ea6470c0a90c022000ebed913d9d845efac4ed8b9b0b49e7efdfbb30a85d561d5c59f5a9a77f3629:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposures/tokens/vault/vault-batch-token.yaml"

View on Github