Skip to content

Adobe AEM Explorer NodeTypes Exposure

ID: aem-explorer-nodetypes

Severity: high

Author: dhiyaneshDk

Tags: misconfig,aem,adobe,exposure

Adobe AEM Explorer NodeTypes is exposed.

id: aem-explorer-nodetypes
info:
name: Adobe AEM Explorer NodeTypes Exposure
author: dhiyaneshDk
severity: high
description: Adobe AEM Explorer NodeTypes is exposed.
reference:
- https://raw.githubusercontent.com/danielmiessler/SecLists/master/Discovery/Web-Content/aem2.txt
classification:
cpe: cpe:2.3:a:adobe:experience_manager_cloud_service:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: adobe
product: experience_manager_cloud_service
shodan-query:
- http.title:"AEM Sign In"
- http.component:"Adobe Experience Manager"
tags: misconfig,aem,adobe,exposure
http:
- method: GET
path:
- "{{BaseURL}}/crx/explorer/nodetypes/index.jsp"
matchers-condition: and
matchers:
- type: word
words:
- 'nodetypeadmin'
- 'Registered Node Types'
condition: and
- type: word
part: header
words:
- text/html
- type: status
status:
- 200
# digest: 490a0046304402205150b7e0c6d6b001cda119173974beb16e9bdc7ba18b9bbada81b28c4b623668022072df8a760f1d123af48d1e9bb28f03d888bbd2cc7496b85544287336ec4d2a0e:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/misconfiguration/aem/aem-explorer-nodetypes.yaml"

View on Github