nuclei-templates/http/misconfiguration/aem/aem-security-users.yaml

40 lines
1.0 KiB
YAML
Raw Normal View History

2022-08-27 19:54:21 +00:00
id: aem-security-users
info:
name: Adobe AEM Security Users Exposure
author: dhiyaneshDk
2022-08-29 07:56:15 +00:00
severity: medium
2024-01-03 06:08:41 +00:00
description: Adobe AEM Security Users are exposed.
2022-08-27 19:54:21 +00:00
reference:
- https://raw.githubusercontent.com/danielmiessler/SecLists/master/Discovery/Web-Content/aem2.txt
metadata:
max-request: 1
2022-08-27 19:54:21 +00:00
shodan-query:
- http.title:"AEM Sign In"
- http.component:"Adobe Experience Manager"
2022-08-29 07:56:15 +00:00
tags: misconfig,aem,adobe,exposure
2022-08-27 19:54:21 +00:00
http:
2022-08-27 19:54:21 +00:00
- method: GET
path:
- "{{BaseURL}}/libs/granite/security/content/useradmin.html"
matchers-condition: and
matchers:
- type: word
words:
2022-08-29 07:56:15 +00:00
- 'AEM Security | Users'
2022-08-27 19:54:21 +00:00
- 'trackingelement="create user"'
condition: and
- type: word
part: header
words:
- text/html
- type: status
status:
- 200
# digest: 4a0a00473045022100e310d37ec435146aedc642b026970d6f4748ae4562cae8b48592403df333ae6f0220156e1b1807c107f176a5903c0c3df950058cda98acc78c872f5482648bc6c776:922c64590222798bb761d5b6d8e72950