Skip to content

Adobe AEM CRX Namespace Editor Exposure

ID: aem-crx-namespace

Severity: low

Author: dhiyaneshDk

Tags: exposure,aem,adobe,misconfig

Adobe AEM CRX Namespace Editor is exposed.

id: aem-crx-namespace
info:
name: Adobe AEM CRX Namespace Editor Exposure
author: dhiyaneshDk
severity: low
description: Adobe AEM CRX Namespace Editor is exposed.
reference:
- https://raw.githubusercontent.com/danielmiessler/SecLists/master/Discovery/Web-Content/aem2.txt
classification:
cpe: cpe:2.3:a:adobe:experience_manager_cloud_service:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: adobe
product: experience_manager_cloud_service
shodan-query:
- http.title:"AEM Sign In"
- http.component:"Adobe Experience Manager"
tags: exposure,aem,adobe,misconfig
http:
- method: GET
path:
- "{{BaseURL}}/crx/explorer/ui/namespace_editor.jsp"
matchers-condition: and
matchers:
- type: word
words:
- '<title>Namespaces</title>'
- 'The following namespaces are registered in the repository:'
condition: and
- type: word
part: header
words:
- text/html
- type: status
status:
- 200
# digest: 4a0a00473045022100f151c03639fb2046fcb0367c8b097e69f9c1ecc5e34cd5b3278a20628c050bd0022061b2b29c78f3d64ee76aa1e67a6909d265644fae6e25f029fa806078cc5f1ad8:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/misconfiguration/aem/aem-crx-namespace.yaml"

View on Github