Hackers found vulnerabilities with 'form' selector
hi folks,
Hackers told us that they can access various urls using a selector "form".
We don't have AEM forms so I am just going to get rid of this selector like this,
I assume this is o.k.?
/0xxx { /type "deny" /url "*" /selectors 'form' }
The hackers told us they could download a truststore file with this url below. However if i look in our Tools -> Security -> Trust store UI,
it is empty as I never put anything into it.
https://www.xxxxx.com/content/dam/jcr:content.form.pdf/etc/truststore/truststore.p12.res
Do you reckon the file is just junk? It is just 1K file and looks like Chinese chars.
thanks all

