Skip to content

AEM UserInfo Servlet Credentials Exposure

ID: aem-userinfo-servlet

Severity: info

Author: DhiyaneshDk

Tags: aem,misconfig

Adobe Experience Manager UserInfoServlet is exposed which allows an attacker to bruteforce credentials. You can get valid usernames from jcr:createdBy, jcr:lastModifiedBy, cq:LastModifiedBy attributes of any JCR node.

id: aem-userinfo-servlet
info:
name: AEM UserInfo Servlet Credentials Exposure
author: DhiyaneshDk
severity: info
description: "Adobe Experience Manager UserInfoServlet is exposed which allows an attacker to bruteforce credentials. You can get valid usernames from jcr:createdBy, jcr:lastModifiedBy, cq:LastModifiedBy attributes of any JCR node."
classification:
cpe: cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: adobe
product: experience_manager
shodan-query: http.component:"Adobe Experience Manager"
tags: aem,misconfig
http:
- method: GET
path:
- '{{BaseURL}}/libs/cq/security/userinfo.json'
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: word
part: body
words:
- '"userID":'
- '"userName":'
condition: and
- type: word
part: header
words:
- 'application/json'
# digest: 4b0a00483046022100dd62a59a51a300adb377ec1877503967853f751c57196bc1ae0f2f10b3d1642f0221009dc5b3c1a0626500872922659b78cfd0376e03c16038a083f435eb8ea400d817:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/misconfiguration/aem/aem-userinfo-servlet.yaml"

View on Github