Skip to content

AEM Login Status

ID: aem-login-status

Severity: info

Author: DhiyaneshDk

Tags: aem,adobe,misconfig

LoginStatusServlet is exposed, it allows to bruteforce credentials.

id: aem-login-status
info:
name: AEM Login Status
author: DhiyaneshDk
severity: info
description: LoginStatusServlet is exposed, it allows to bruteforce credentials.
reference:
- https://www.slideshare.net/0ang3el/hunting-for-security-bugs-in-aem-webapps-129262212
- https://github.com/thomashartm/burp-aem-scanner/blob/master/src/main/java/burp/actions/dispatcher/LoginStatusServletExposed.java
classification:
cpe: cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*
metadata:
max-request: 3
vendor: adobe
product: experience_manager
shodan-query: http.component:"Adobe Experience Manager"
tags: aem,adobe,misconfig
http:
- method: GET
path:
- '{{BaseURL}}/system/sling/loginstatus'
- '{{BaseURL}}/system/sling/loginstatus.css'
- '{{BaseURL}}///system///sling///loginstatus'
stop-at-first-match: true
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: word
words:
- 'CREDENTIAL_CHALLENGE'
# digest: 4a0a00473045022100fae743747a4ae90464612ab03461897ea19657b43702f609f97d10d2bd05c9a102204ef5eedc3f7794d26dd39494223df77db09af0efbc4e94316d260fc85d4a37fe:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/misconfiguration/aem/aem-login-status.yaml"

View on Github