Skip to content

Heroku API Test

ID: api-heroku

Severity: info

Author: zzeitlin

Tags: token-spray,heroku

id: api-heroku
info:
name: Heroku API Test
author: zzeitlin
severity: info
reference:
- https://devcenter.heroku.com/articles/platform-api-quickstart#calling-the-api
metadata:
max-request: 1
tags: token-spray,heroku
self-contained: true
http:
- method: POST
path:
- "https://api.heroku.com/apps"
headers:
Accept: application/vnd.heroku+json; version=3
Authorization: Bearer {{token}}
matchers:
- type: word
part: body
words:
- '"created_at":'
- '"git_url":'
condition: and
# digest: 4a0a004730450221008176de1bfb74ad46411f367c3197bc0aa6ed4967cb279b6eb7a5e5266c7ea00902205914e4715cb17a23a7fd7094beede6fa1987e78075bba9ca5e5ba237c8995311:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/token-spray/api-heroku.yaml"

View on Github