CVE-2024-43720

5.4 MEDIUM

📋 TL;DR

This DOM-based XSS vulnerability in Adobe Experience Manager allows attackers to inject malicious scripts that execute in victims' browsers when they interact with manipulated links. It affects all users of Adobe Experience Manager versions 6.5.21 and earlier. Successful exploitation requires user interaction but can lead to session hijacking or data theft.

💻 Affected Systems

Products:
  • Adobe Experience Manager
Versions: 6.5.21 and earlier
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments with affected versions are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains full control of victim's browser session, leading to account takeover, data exfiltration, or further attacks within the AEM environment.

🟠

Likely Case

Session hijacking, cookie theft, or redirection to malicious sites resulting in credential harvesting.

🟢

If Mitigated

Limited impact due to Content Security Policy (CSP) implementation, input validation, and user awareness reducing click-through rates.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction (clicking malicious link) but is technically simple once the DOM manipulation vector is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.5.22 or later

Vendor Advisory: https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html

Restart Required: Yes

Instructions:

1. Download Adobe Experience Manager 6.5.22 or later from Adobe's distribution portal. 2. Apply the service pack following Adobe's installation guide. 3. Restart all AEM instances. 4. Verify the update was successful.

🔧 Temporary Workarounds

Implement Content Security Policy

all

Add strict CSP headers to prevent script execution from untrusted sources.

Add 'Content-Security-Policy: default-src 'self'; script-src 'self'' to web server configuration

Input Validation Filter

all

Deploy custom servlet filter to sanitize user inputs that affect DOM.

Implement Java servlet filter that validates and encodes user-controlled parameters

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to detect and block XSS payloads
  • Educate users about phishing risks and safe browsing practices

🔍 How to Verify

Check if Vulnerable:

Check AEM version via CRXDE Lite or OSGi console. If version is 6.5.21 or earlier, system is vulnerable.

Check Version:

curl -u admin:password http://localhost:4502/system/console/status-productinfo | grep 'Adobe Experience Manager'

Verify Fix Applied:

Confirm version is 6.5.22 or later and test DOM manipulation vectors are no longer exploitable.

📡 Detection & Monitoring

Log Indicators:

  • Unusual parameter values containing script tags or JavaScript in request logs
  • Multiple failed XSS attempts from same source

Network Indicators:

  • HTTP requests with suspicious parameters containing script payloads
  • Outbound connections to unknown domains following AEM access

SIEM Query:

source="aem-access.log" AND ("<script" OR "javascript:" OR "onerror=" OR "onload=")

🔗 References

📤 Share & Export