Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

Adobe AEM ACS Common Exposure

By kannthu

Medium
Vidoc logoVidoc Module
#misconfig#aem#adobe
Description

What is the "Adobe AEM ACS Common Exposure?"

The "Adobe AEM ACS Common Exposure" module is designed to detect misconfigurations in Adobe Experience Manager (AEM) instances that use the ACS Commons library. AEM is a content management system that allows organizations to create, manage, and deliver digital experiences across various channels. The severity of this module is classified as medium.

This module was authored by dhiyaneshDk.

Impact

If a misconfiguration is detected using this module, it could potentially expose sensitive information or allow unauthorized access to the AEM instance. This can lead to data breaches, unauthorized modifications, or other security risks.

How the module works?

The "Adobe AEM ACS Common Exposure" module works by sending HTTP requests to specific endpoints in the AEM instance. It then matches the response body against predefined conditions to determine if a misconfiguration is present.

For example, one of the HTTP requests sent by this module is a GET request to the following endpoints:

/etc/acs-commons/jcr-compare.html
/etc/acs-commons/workflow-remover.html
/etc/acs-commons/version-compare.html
/etc/acs-commons/oak-index-manager.html

The module expects the response body to contain specific HTML titles, such as "Version Compare | ACS AEM Commons" or "Workflow Remover | ACS AEM Commons". If any of these titles are found, it indicates a potential misconfiguration.

The matching conditions for this module are defined using the "matchers" field in the JSON definition. In this case, the module uses a "word" matcher to search for specific titles in the response body. The conditions are combined using an "or" condition, meaning that if any of the titles are found, the module will consider it a match.

It's important to note that this module does not perform any active exploitation or modification of the AEM instance. It solely focuses on detecting misconfigurations and vulnerabilities.

For more information, you can refer to the reference provided.

Metadata: shodan-query: http.title:"AEM Sign In",http.component:"Adobe Experience Manager"

Module preview

Concurrent Requests (1)
1. HTTP Request template
GET/etc/acs-commons/jcr.../etc/acs-commons/wor.../etc/acs-commons/ver...(+1 paths)
Matching conditions
word: <title>Version Compare | ACS AEM Commons...
Passive global matcher
No matching conditions.
On match action
Report vulnerability