Skip to content

Zomato User Name Information - Detect

ID: zomato

Severity: info

Author: dwisiswant0

Tags: osint,osint-social,zomato

Zomato user name information check was conducted.

id: zomato
info:
name: Zomato User Name Information - Detect
author: dwisiswant0
severity: info
description: Zomato user name information check was conducted.
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0
cwe-id: CWE-200
metadata:
max-request: 1
tags: osint,osint-social,zomato
self-contained: true
http:
- method: GET
path:
- "https://www.zomato.com/{{user}}/foodjourney"
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: word
part: body
words:
- "| Zomato"
# digest: 4a0a004730450221008bcc2767b6e5164ae29a212d9eea91debf42d06bcce20860f1a7319ab537f42302201646eec94758c24e7c1a6b33e3a37c6e1b91a70922e9b2fc187ec5608d293d1c:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/osint/user-enumeration/zomato.yaml"

View on Github