CVE-2024-43714

5.4 MEDIUM

📋 TL;DR

This DOM-based XSS vulnerability in Adobe Experience Manager allows attackers to execute arbitrary JavaScript in victims' browsers by manipulating DOM elements through crafted URLs or inputs. Attackers could steal session cookies, redirect users, or perform actions on their behalf. Organizations running Adobe Experience Manager versions 6.5.21 or earlier are affected.

💻 Affected Systems

Products:
  • Adobe Experience Manager
Versions: 6.5.21 and earlier
Operating Systems: All platforms running AEM
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments of affected versions are vulnerable regardless of configuration

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete account takeover, session hijacking, data theft, or malicious actions performed as the authenticated user

🟠

Likely Case

Session cookie theft leading to unauthorized access, defacement of web pages, or credential harvesting

🟢

If Mitigated

Limited impact due to input validation, output encoding, and Content Security Policy preventing script execution

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires user interaction (clicking malicious link or submitting crafted input)

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.5.22 or later

Vendor Advisory: https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html

Restart Required: Yes

Instructions:

1. Download Adobe Experience Manager 6.5.22 or later from Adobe's distribution portal. 2. Follow Adobe's upgrade documentation for your deployment type (AEM as a Cloud Service, AMS, or on-premise). 3. Apply the update to all affected instances. 4. Restart the AEM service.

🔧 Temporary Workarounds

Implement Content Security Policy

all

Add strict CSP headers to prevent inline script execution and restrict script sources

Add 'Content-Security-Policy: script-src 'self';' to web server configuration

Input Validation Filter

all

Implement server-side input validation to sanitize user inputs before processing

Configure AEM's XSS API filters or implement custom servlet filters

🧯 If You Can't Patch

  • Implement Web Application Firewall (WAF) rules to block XSS payloads in URLs and parameters
  • Disable or restrict user input fields that could be vulnerable, and implement strict output encoding

🔍 How to Verify

Check if Vulnerable:

Check AEM version via OSGi console (http://[host]:[port]/system/console/bundles) or CRXDE Lite

Check Version:

curl -s http://localhost:4502/system/console/bundles | grep 'Adobe Experience Manager'

Verify Fix Applied:

Verify version is 6.5.22 or later and test vulnerable endpoints with XSS payloads

📡 Detection & Monitoring

Log Indicators:

  • Unusual URL parameters with script tags or JavaScript code
  • Requests containing <script>, javascript:, or eval() patterns

Network Indicators:

  • HTTP requests with suspicious parameters containing script payloads

SIEM Query:

source="aem_access.log" AND ("<script" OR "javascript:" OR "onerror=" OR "onload=")

🔗 References

📤 Share & Export