CVE-2024-36238

5.4 MEDIUM

📋 TL;DR

This DOM-based Cross-Site Scripting vulnerability in Adobe Experience Manager allows attackers to execute arbitrary JavaScript in victims' browsers by tricking users into clicking malicious links. It affects AEM versions 6.5.20 and earlier, potentially compromising user sessions and data.

💻 Affected Systems

Products:
  • Adobe Experience Manager
Versions: 6.5.20 and earlier
Operating Systems: All platforms running AEM
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments of affected versions are vulnerable by default

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete account takeover, data theft, or malware deployment through the victim's authenticated session

🟠

Likely Case

Session hijacking, credential theft, or defacement of user-facing content

🟢

If Mitigated

Limited impact with proper input validation and output encoding controls

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires user interaction (clicking malicious link) and knowledge of specific DOM manipulation

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.5.21 or later

Vendor Advisory: https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html

Restart Required: Yes

Instructions:

1. Download AEM 6.5.21 or later from Adobe distribution. 2. Backup current installation. 3. Apply the update following Adobe's upgrade documentation. 4. Restart AEM services.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement custom servlet filters to sanitize user input before DOM processing

Implement Java servlet filter with input validation logic

Content Security Policy

all

Deploy strict CSP headers to limit script execution

Add 'Content-Security-Policy' header with script-src directives

🧯 If You Can't Patch

  • Implement WAF rules to detect and block XSS payloads in requests
  • Restrict user access to only trusted domains and implement clickjacking protection

🔍 How to Verify

Check if Vulnerable:

Check AEM version via CRXDE Lite or system console, confirm if version is 6.5.20 or earlier

Check Version:

curl -u admin:password http://localhost:4502/system/console/status-productinfo

Verify Fix Applied:

Verify AEM version is 6.5.21 or later and test DOM manipulation attempts

📡 Detection & Monitoring

Log Indicators:

  • Unusual JavaScript payloads in request logs
  • Multiple failed DOM manipulation attempts

Network Indicators:

  • Requests containing script tags or JavaScript events in parameters

SIEM Query:

source="aem-access.log" AND ("<script>" OR "javascript:" OR "onclick=" OR "onload=")

🔗 References

📤 Share & Export