id: aem-custom-script info: name: Adobe AEM Custom Scripts Exposure author: DhiyaneshDK severity: unknown reference: - https://www.slideshare.net/0ang3el/hacking-aem-sites classification: cpe: cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:* metadata: max-request: 2 vendor: adobe product: experience_manager shodan-query: - http.title:"AEM Sign In" - http.component:"Adobe Experience Manager" tags: misconfig,aem,adobe http: - method: GET path: - "{{BaseURL}}/apps.tidy.infinity.json" - "{{BaseURL}}{{path}}" iterate-all: true extractors: - type: json part: body name: path json: - '.[]' internal: true stop-at-first-match: true matchers-condition: and matchers: - type: word part: body words: - '"jcr:primaryType":' - '"jcr:createdBy":' condition: and - type: word part: header words: - application/json - type: status status: - 200 # digest: 490a0046304402200366267e65f49c494343dda60ab7f1600f252f2745a83ae47a899488c02bf98702202b81d74366c272f4075edc5a5c5f2b74c35998180499833c8e68901014353ebb:922c64590222798bb761d5b6d8e72950