Skip to content

Adobe AEM CRX Browser Exposure

ID: aem-crx-browser

Severity: unknown

Author: dhiyaneshDk

Tags: misconfig,aem,adobe,exposure

id: aem-crx-browser
info:
name: Adobe AEM CRX Browser Exposure
author: dhiyaneshDk
severity: unknown
reference:
- https://raw.githubusercontent.com/danielmiessler/SecLists/master/Discovery/Web-Content/aem2.txt
metadata:
max-request: 1
shodan-query:
- http.title:"AEM Sign In"
- http.component:"Adobe Experience Manager"
tags: misconfig,aem,adobe,exposure
http:
- method: GET
path:
- "{{BaseURL}}/crx/explorer/browser/index.jsp"
matchers-condition: and
matchers:
- type: word
words:
- '<title>Content Explorer - UserID: anonymous | Workspace: crx.default</title>'
- type: word
part: header
words:
- text/html
- type: status
status:
- 200
# digest: 4a0a0047304502203b9ad4f3f49d57a28401e926a7b9fc377b0b0a2857ea447dbdc240ef6e96dbda022100b916869d06e355823d424f8fd742cd5c8060ec82144b5eb8c2237525b074205f:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/misconfiguration/aem/aem-crx-browser.yaml"

View on Github