7.5
CVSSv3

CVE-2018-12809

Published: 20/07/2018 Updated: 17/09/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 446
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

Adobe Experience Manager versions 6.4 and previous versions have a Server-Side Request Forgery vulnerability. Successful exploitation could lead to sensitive information disclosure.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

adobe experience manager

Github Repositories

AEM hacker toolset Tools to identify vulnerable Adobe Experience Manager (AEM) webapps AEM is an enterprise-grade CMS I built these tools to automate bughunting and pentesting of AEM webapps I included checks for previously known vulnerabilities and misconfigurations, as well as for new ones, discovered by me in 2018 All discovered vulnerabilities were responsibly reported

Adobe Experience Manager Vulnerability Scanner

aemscan Adobe Experience Manager Vulnerability Scanner raz0rname/releases/adobe-experience-manager-vulnerability-scanner/ Features Default credentials bruteforce Info leak via default error page WebDav support check (WebDav OSGI XXE CVE-2015-1833) Version detection Useful paths scanner Installation $ python setuppy install Usage $ aemscan <url> TODO C

Edited version of aemscan

aemscan Adobe Experience Manager Vulnerability Scanner raz0rname/releases/adobe-experience-manager-vulnerability-scanner/ Features Default credentials bruteforce Info leak via default error page WebDav support check (WebDav OSGI XXE CVE-2015-1833) Version detection Useful paths scanner Installation $ python setuppy install Usage $ aemscan <url> TODO C

Adobe Experience Manager Vulnerability Scanner

aemscan Adobe Experience Manager Vulnerability Scanner raz0rname/releases/adobe-experience-manager-vulnerability-scanner/ Features Default credentials bruteforce Info leak via default error page WebDav support check (WebDav OSGI XXE CVE-2015-1833) Version detection Useful paths scanner Installation $ python setuppy install Usage $ aemscan <url> TODO C