aem-custom-script: Adobe AEM Custom Scripts Exposure

日期: 2025-08-01 | 影响软件: Adobe AEM | POC: 已公开

漏洞描述

PoC代码[已公开]

id: aem-custom-script

info:
  name: Adobe AEM Custom Scripts Exposure
  author: DhiyaneshDK
  severity: unknown
  reference:
    - https://www.slideshare.net/0ang3el/hacking-aem-sites
  classification:
    cpe: cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*
  metadata:
    max-request: 2
    vendor: adobe
    product: experience_manager
    shodan-query:
      - http.title:"AEM Sign In"
      - http.component:"Adobe Experience Manager"
  tags: misconfig,aem,adobe,vuln

http:
  - method: GET
    path:
      - "{{BaseURL}}/apps.tidy.infinity.json"
      - "{{BaseURL}}{{path}}"

    iterate-all: true

    extractors:
      - type: json
        part: body
        name: path
        json:
          - '.[]'
        internal: true
    stop-at-first-match: true

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - '"jcr:primaryType":'
          - '"jcr:createdBy":'
        condition: and

      - type: word
        part: header
        words:
          - application/json

      - type: status
        status:
          - 200
# digest: 4a0a0047304502203629462ee3143ba9b2854bbcc5389d0bc5b4498d48836e551638a25557a403460221008cb6affcb5267313535ff6b3018fbd150ece2c06d9a87ae0f2f67d5ad234a39e:922c64590222798bb761d5b6d8e72950

相关漏洞推荐