AEM Application
Sr.no Findings Severity Observation
It is observer that appication plans pdf
download directly, In which the user
1 Direct URL Access Medium
policy details and plan money are also
detected.
It is observed that application is using
2 Using known vulnerability LOW
vulnerable jQuery version
This information might help an attacker
gain a greater understanding of the
3 Server version disclosed LOW systems in use and potentially develop
further attacks targeted at the specific
version of AkamaiGhost.
It is observed that application allowed
the options method.Which provides a list
4 HTTP method enabled LOW
of methods that are supported by web
server.
EM Application
Instance Recommendation Status
you can use appropriate
permissions or ACLs to
disallow anonymous reading.
PRODUCTION Also, do not allow OPEN
anonymous web visitors user
read permissions to any
sensitive data files.
PRODUCTION Update to latest version OPEN
Configure your web server to
prevent information leakage
PRODUCTION OPEN
from the server header of its
HTTP response.
https://hostadvice.com/how-
to/how-to-disable-the-
PRODUCTION OPEN
vulnerability-of-options-
method-in-iis-and-apache/