Skip to content

Pagerduty API Test

ID: api-pagerduty

Severity: info

Author: zzeitlin

Tags: token-spray,pagerduty

id: api-pagerduty
info:
name: Pagerduty API Test
author: zzeitlin
severity: info
reference:
- https://developer.pagerduty.com/api-reference
metadata:
max-request: 1
tags: token-spray,pagerduty
self-contained: true
http:
- method: GET
path:
- "https://api.pagerduty.com/schedules"
headers:
Accept: application/vnd.pagerduty+json;version=2
Authorization: Token token={{token}}
matchers:
- type: word
part: body
words:
- '"schedules":'
- '"id":'
condition: and
# digest: 4a0a00473045022100ed03222d0314af04055d3282451075a9964e488b12f6986e9736e35c975e87d10220623d00c643d6e754f167d9796f1b82fb64853ae683ac5442b30d956f6b3342a0:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/token-spray/api-pagerduty.yaml"

View on Github