Files
nuclei-templates/http/misconfiguration/aem/aem-security-users.yaml
2024-12-01 13:57:55 +00:00

38 lines
1.0 KiB
YAML

id: aem-security-users
info:
name: Adobe AEM Security Users Exposure
author: dhiyaneshDk
severity: medium
description: Adobe AEM Security Users are exposed.
reference:
- https://raw.githubusercontent.com/danielmiessler/SecLists/master/Discovery/Web-Content/aem2.txt
metadata:
max-request: 1
shodan-query:
- http.title:"AEM Sign In"
- http.component:"Adobe Experience Manager"
tags: misconfig,aem,adobe,exposure
http:
- method: GET
path:
- "{{BaseURL}}/libs/granite/security/content/useradmin.html"
matchers-condition: and
matchers:
- type: word
words:
- 'AEM Security | Users'
- 'trackingelement="create user"'
condition: and
- type: word
part: header
words:
- text/html
- type: status
status:
- 200
# digest: 490a004630440220093662b9039fc305b4d8b4b917e2aac21bb60a494ac4924cff36d43f0db2989f02205f5717ef5012f3911729929a4b22c011472c01fc296cbdc281df1d076541dddd:922c64590222798bb761d5b6d8e72950