CVE-2020-9645

7.5 HIGH

📋 TL;DR

Adobe Experience Manager versions 6.5 and earlier contain a blind server-side request forgery (SSRF) vulnerability that allows attackers to make unauthorized requests from the server to internal systems. This could lead to sensitive information disclosure from internal services. Organizations running affected Adobe Experience Manager instances are at risk.

💻 Affected Systems

Products:
  • Adobe Experience Manager
Versions: 6.5 and earlier versions
Operating Systems: All platforms running Adobe Experience Manager
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments of affected versions are vulnerable unless specifically patched or mitigated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access sensitive internal systems, retrieve credentials or data from internal APIs, and potentially pivot to other network resources.

🟠

Likely Case

Information disclosure from internal services accessible to the server, potentially exposing configuration data, internal API responses, or metadata.

🟢

If Mitigated

Limited impact if network segmentation restricts server access to sensitive internal systems and proper input validation is implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires specific conditions and knowledge of internal systems, but SSRF vulnerabilities are commonly exploited in real-world attacks.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Adobe Experience Manager 6.5 Service Pack 5 (6.5.5.0) or later

Vendor Advisory: https://helpx.adobe.com/security/products/experience-manager/apsb20-31.html

Restart Required: Yes

Instructions:

1. Download the latest service pack from Adobe's distribution portal. 2. Backup your current installation. 3. Apply the service pack following Adobe's installation guide. 4. Restart the AEM service. 5. Verify the update was successful.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict the AEM server's network access to only necessary internal services

Input Validation

all

Implement strict input validation for all URL parameters and user inputs

🧯 If You Can't Patch

  • Implement strict network segmentation to limit the AEM server's access to internal systems
  • Deploy a web application firewall (WAF) with SSRF protection rules

🔍 How to Verify

Check if Vulnerable:

Check your Adobe Experience Manager version via the AEM welcome page or system console

Check Version:

Check the AEM welcome page at http://[host]:[port]/libs/granite/operations/content/systemoverview.html or use the AEM system console

Verify Fix Applied:

Verify you are running version 6.5.5.0 or later and check that the patch has been applied

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP requests from the AEM server
  • Requests to internal IP addresses or services from the AEM application

Network Indicators:

  • AEM server making unexpected HTTP requests to internal systems
  • Traffic from AEM server to non-standard internal ports

SIEM Query:

source_ip=AEM_SERVER_IP AND (dest_ip=INTERNAL_RANGE OR dest_port!=80,443) AND protocol=HTTP

🔗 References

📤 Share & Export