CVE-2024-43732

4.6 MEDIUM

📋 TL;DR

Adobe Experience Manager versions 6.5.21 and earlier contain a DOM-based Cross-Site Scripting vulnerability that allows attackers to execute arbitrary JavaScript in victims' browsers when they click malicious links. This affects all users of vulnerable AEM instances. The vulnerability requires user interaction to exploit.

💻 Affected Systems

Products:
  • Adobe Experience Manager
Versions: 6.5.21 and earlier
Operating Systems: All platforms running AEM
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments of affected versions are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker steals session cookies, performs actions as authenticated users, or redirects to phishing sites, potentially leading to account compromise and data theft.

🟠

Likely Case

Session hijacking, credential theft, or defacement of web pages through injected content.

🟢

If Mitigated

Limited impact due to same-origin policy restrictions and user interaction requirement, but still enables client-side attacks.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction (clicking malicious link) but no authentication to the AEM instance.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.5.22 or later

Vendor Advisory: https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html

Restart Required: Yes

Instructions:

1. Download AEM 6.5.22 or later from Adobe Distribution. 2. Backup current instance. 3. Apply the update following Adobe's upgrade documentation. 4. Restart the AEM service.

🔧 Temporary Workarounds

Content Security Policy (CSP)

all

Implement strict CSP headers to prevent execution of inline scripts and restrict script sources.

Add 'Content-Security-Policy: script-src 'self'' to HTTP headers

Input Validation Filter

all

Deploy custom servlet filter to sanitize user inputs before DOM processing.

Implement javax.servlet.Filter to sanitize request parameters

🧯 If You Can't Patch

  • Implement Web Application Firewall (WAF) rules to block XSS payloads
  • Educate users about phishing risks and suspicious links

🔍 How to Verify

Check if Vulnerable:

Check AEM version via /system/console/status-productinfo endpoint or crx-quickstart/logs/error.log for version information.

Check Version:

curl -k https://<aem-host>:<port>/system/console/status-productinfo | grep 'Adobe Experience Manager'

Verify Fix Applied:

Confirm version is 6.5.22 or later and test XSS payloads are properly sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual JavaScript in request parameters
  • Multiple failed XSS attempts in access logs

Network Indicators:

  • Requests containing script tags or JavaScript in URL parameters

SIEM Query:

source="aem_access.log" AND ("<script" OR "javascript:" OR "onerror=" OR "onload=")

🔗 References

📤 Share & Export