Skip to content

Adobe AEM Sling User Info Servlet Exposure

ID: aem-sling-userinfo

Severity: info

Author: DhiyaneshDk

Tags: misconfig,aem,adobe,exposure

id: aem-sling-userinfo
info:
name: Adobe AEM Sling User Info Servlet Exposure
author: DhiyaneshDk
severity: info
reference:
- https://raw.githubusercontent.com/danielmiessler/SecLists/master/Discovery/Web-Content/aem2.txt
classification:
cpe: cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*
metadata:
max-request: 2
vendor: adobe
product: experience_manager
shodan-query:
- http.title:"AEM Sign In"
- http.component:"Adobe Experience Manager"
tags: misconfig,aem,adobe,exposure
http:
- method: GET
path:
- "{{BaseURL}}/system/sling/info.sessionInfo.json"
- "{{BaseURL}}/system/sling/info.sessionInfo.txt"
stop-at-first-match: true
matchers-condition: and
matchers:
- type: word
words:
- 'userID:'
- type: word
part: header
words:
- "text/plain"
- type: status
status:
- 200
# digest: 490a004630440220275a3bf30e4443c05daca52c5cb38de10d6db6123a3e3047fe09ea24a71643dc02203ff29ab35c79c9bed529a4f42ca5c019d70106e26b03be9e94fbe66417053d16:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/misconfiguration/aem/aem-sling-userinfo.yaml"

View on Github