Skip to content

Adobe AEM ACS Common Exposure

ID: aem-acs-common

Severity: medium

Author: dhiyaneshDk

Tags: misconfig,aem,adobe

Adobe AEM ACS Common pages exposed.

id: aem-acs-common
info:
name: Adobe AEM ACS Common Exposure
author: dhiyaneshDk
severity: medium
description: Adobe AEM ACS Common pages exposed.
reference:
- https://raw.githubusercontent.com/danielmiessler/SecLists/master/Discovery/Web-Content/aem2.txt
classification:
cpe: cpe:2.3:a:adobe:acs_aem_commons:*:*:*:*:*:*:*:*
metadata:
max-request: 4
vendor: adobe
product: acs_aem_commons
shodan-query:
- http.title:"AEM Sign In"
- http.component:"Adobe Experience Manager"
tags: misconfig,aem,adobe
http:
- method: GET
path:
- "{{BaseURL}}/etc/acs-commons/jcr-compare.html"
- "{{BaseURL}}/etc/acs-commons/workflow-remover.html"
- "{{BaseURL}}/etc/acs-commons/version-compare.html"
- "{{BaseURL}}/etc/acs-commons/oak-index-manager.html"
stop-at-first-match: true
matchers:
- type: word
part: body
words:
- '<title>Version Compare | ACS AEM Commons</title>'
- '<title>Oak Index Manager | ACS AEM Commons</title>'
- '<title>JCR Compare | ACS AEM Commons</title>'
- '<title>Workflow Remover | ACS AEM Commons</title>'
condition: or
# digest: 490a004630440220354d8565bd4bb6249145f7167b219d7cac17a9b5db372e30248bbe99454fee20022038395d49e41e2966bf750297942adabb1c516832ecc39efcddddcacaf0174b6d:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/misconfiguration/aem/aem-acs-common.yaml"

View on Github