nuclei-templates/misconfiguration/aem-groovyconsole.yaml

31 lines
953 B
YAML
Raw Normal View History

2020-12-26 19:20:25 +00:00
id: aem-groovyconsole
info:
2020-12-28 10:34:12 +00:00
name: AEM Groovy console enabled
2020-12-26 19:20:25 +00:00
author: twitter.com/Dheerajmadhukar
severity: critical
description: Groovy console is exposed, RCE is possible.
reference: https://hackerone.com/reports/672243
2021-03-12 08:57:14 +00:00
tags: aem
2020-12-28 14:39:15 +00:00
2020-12-26 19:20:25 +00:00
requests:
- method: GET
path:
- "{{BaseURL}}/groovyconsole"
headers:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Language: en-US,en;q=0.9,hi;q=0.8
User-Agent: Mozilla/5.0 (Linux; Android 6.0; Nexus 5 Build/MRA58N) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.88 Mobile Safari/537.36
2020-12-28 14:39:15 +00:00
2020-12-26 19:20:25 +00:00
matchers-condition: and
matchers:
- type: word
words:
- "<title>Groovy Console</title>"
- "Run Script"
- "Groovy Web Console"
part: body
2020-12-28 14:39:15 +00:00
condition: and
2020-12-26 19:20:25 +00:00
- type: status
status:
2020-12-28 14:39:15 +00:00
- 200