CVE-2024-36172
📋 TL;DR
Adobe Experience Manager versions 6.5.20 and earlier contain a stored Cross-Site Scripting (XSS) vulnerability where attackers can inject malicious JavaScript into form fields. When users visit pages containing these compromised fields, their browsers execute the malicious scripts. This affects all organizations running vulnerable AEM versions.
💻 Affected Systems
- Adobe Experience Manager
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers could steal administrator session cookies, perform actions as authenticated users, deface websites, or redirect users to malicious sites.
Likely Case
Attackers inject malicious scripts to steal user session data or credentials from authenticated users accessing compromised pages.
If Mitigated
With proper input validation and output encoding, malicious scripts would be neutralized before execution.
🎯 Exploit Status
Exploitation requires ability to submit data to vulnerable form fields, which typically requires some level of access.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 6.5.21 or later
Vendor Advisory: https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html
Restart Required: Yes
Instructions:
1. Download AEM 6.5.21 or later from Adobe distribution. 2. Follow Adobe's upgrade procedures. 3. Restart AEM instances after upgrade.
🔧 Temporary Workarounds
Input Validation Filter
allImplement server-side input validation to sanitize form field inputs
Configure AEM filters to validate and sanitize user inputs
Content Security Policy
allImplement CSP headers to restrict script execution
Add Content-Security-Policy HTTP headers to restrict script sources
🧯 If You Can't Patch
- Implement web application firewall (WAF) rules to block XSS payloads
- Disable or restrict access to vulnerable form fields until patching is possible
🔍 How to Verify
Check if Vulnerable:
Check AEM version via admin console or CRXDE. If version is 6.5.20 or earlier, system is vulnerable.
Check Version:
Check AEM welcome page or use CRXDE to view version information
Verify Fix Applied:
Verify AEM version is 6.5.21 or later and test form fields for XSS payload acceptance.
📡 Detection & Monitoring
Log Indicators:
- Unusual form submissions with script tags
- Multiple failed XSS attempts in request logs
Network Indicators:
- HTTP requests containing script injection patterns to form endpoints
SIEM Query:
source="aem_logs" AND ("<script>" OR "javascript:" OR "onerror=" OR "onload=")