Skip to content

AEM BulkEditor

ID: aem-bulkeditor

Severity: unknown

Author: DhiyaneshDK

Tags: misconfig,aem,adobe,editor

id: aem-bulkeditor
info:
name: AEM BulkEditor
author: DhiyaneshDK
severity: unknown
reference:
- https://raw.githubusercontent.com/danielmiessler/SecLists/master/Discovery/Web-Content/aem2.txt
classification:
cpe: cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: adobe
product: experience_manager
shodan-query:
- http.title:"AEM Sign In"
- http.component:"Adobe Experience Manager"
tags: misconfig,aem,adobe,editor
http:
- method: GET
path:
- "{{BaseURL}}/etc/importers/bulkeditor.html"
matchers-condition: and
matchers:
- type: word
part: body
words:
- '<title>AEM BulkEditor</title>'
- type: status
status:
- 200
# digest: 4a0a00473045022053ee0638716e6171bc63ec4bb748b82ee1714ffbf7cda5655a7b487b3fc1d2c0022100c982b1682060f842fb4f08d03b9ecd8a864a28548756401ee4aa91d85f3d69c0:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/misconfiguration/aem/aem-bulkeditor.yaml"

View on Github