nuclei-templates/http/misconfiguration/aem/aem-security-users.yaml

38 lines
1.0 KiB
YAML
Raw Normal View History

2022-08-27 19:54:21 +00:00
id: aem-security-users
info:
name: Adobe AEM Security Users Exposure
author: dhiyaneshDk
2022-08-29 07:56:15 +00:00
severity: medium
2024-01-03 06:08:41 +00:00
description: Adobe AEM Security Users are exposed.
2022-08-27 19:54:21 +00:00
reference:
- https://raw.githubusercontent.com/danielmiessler/SecLists/master/Discovery/Web-Content/aem2.txt
metadata:
max-request: 1
2022-08-27 19:54:21 +00:00
shodan-query:
- http.title:"AEM Sign In"
- http.component:"Adobe Experience Manager"
2022-08-29 07:56:15 +00:00
tags: misconfig,aem,adobe,exposure
2022-08-27 19:54:21 +00:00
http:
2022-08-27 19:54:21 +00:00
- method: GET
path:
- "{{BaseURL}}/libs/granite/security/content/useradmin.html"
matchers-condition: and
matchers:
- type: word
words:
2022-08-29 07:56:15 +00:00
- 'AEM Security | Users'
2022-08-27 19:54:21 +00:00
- 'trackingelement="create user"'
condition: and
- type: word
part: header
words:
- text/html
- type: status
status:
- 200
# digest: 490a0046304402207c0ef4a75696a9aa02c97e8339e466eac98a98efa4cc976c23e676607772b6ec022015efbf1e8a140927e639053bd0da7b5eb0a7463bd950d36391f99a51e6aff09c:922c64590222798bb761d5b6d8e72950