CVE-2024-43712

5.4 MEDIUM

📋 TL;DR

This DOM-based XSS vulnerability in Adobe Experience Manager allows attackers to execute arbitrary JavaScript in victims' browsers by tricking users into clicking malicious links. It affects AEM versions 6.5.21 and earlier. Successful exploitation requires user interaction but could lead to session hijacking or data theft.

💻 Affected Systems

Products:
  • Adobe Experience Manager
Versions: 6.5.21 and earlier
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments of affected versions are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker steals admin session cookies, gains administrative access to AEM, and potentially compromises the entire content management system and associated data.

🟠

Likely Case

Attacker steals user session cookies, performs actions as authenticated users, and potentially accesses sensitive content or user data.

🟢

If Mitigated

With proper input validation and output encoding, the attack fails to execute malicious scripts, limiting impact to failed exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction (clicking malicious link) but no authentication to AEM is needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.5.22 or later

Vendor Advisory: https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html

Restart Required: Yes

Instructions:

1. Download AEM 6.5.22 or later from Adobe's distribution portal. 2. Apply the service pack following Adobe's upgrade documentation. 3. Restart all AEM instances. 4. Verify the update was successful.

🔧 Temporary Workarounds

Content Security Policy Implementation

all

Implement strict CSP headers to prevent execution of inline scripts and restrict script sources

Add 'Content-Security-Policy: script-src 'self';' to web server configuration

Input Validation Filter

all

Implement custom servlet filters to sanitize user input before DOM manipulation

Implement Java servlet filter with OWASP Java Encoder library for output encoding

🧯 If You Can't Patch

  • Implement Web Application Firewall (WAF) with XSS protection rules
  • Disable or restrict user-controllable input fields in vulnerable components

🔍 How to Verify

Check if Vulnerable:

Check AEM version via CRXDE Lite or OSGi console. If version is 6.5.21 or earlier, system is vulnerable.

Check Version:

curl -u admin:password http://localhost:4502/system/console/status-productinfo | grep 'Adobe Experience Manager'

Verify Fix Applied:

Verify AEM version is 6.5.22 or later and test vulnerable endpoints with XSS payloads that should be sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual JavaScript payloads in request parameters
  • Multiple failed XSS attempts from same IP

Network Indicators:

  • Requests containing script tags or JavaScript events in URL parameters
  • External script loads from suspicious domains

SIEM Query:

source="aem-access.log" AND ("<script>" OR "javascript:" OR "onerror=" OR "onload=")

🔗 References

📤 Share & Export