CVE-2024-43738

5.4 MEDIUM

📋 TL;DR

This DOM-based Cross-Site Scripting (XSS) vulnerability in Adobe Experience Manager allows attackers to execute arbitrary JavaScript code in victims' browsers when they visit malicious pages or links. The vulnerability affects users of Adobe Experience Manager versions 6.5.21 and earlier. Attackers could steal session cookies, redirect users, or perform actions on their behalf.

💻 Affected Systems

Products:
  • Adobe Experience Manager
Versions: 6.5.21 and earlier
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments of affected versions are vulnerable by default. Requires user interaction (clicking malicious link or visiting malicious page).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete account takeover, data theft, or malicious actions performed as authenticated users, potentially leading to administrative compromise of the AEM instance.

🟠

Likely Case

Session hijacking, credential theft, or defacement of web pages viewed by users who click malicious links.

🟢

If Mitigated

Limited impact with proper Content Security Policy (CSP) headers and input validation, though some user interface manipulation may still occur.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction but is technically simple once malicious payload is crafted. No authentication required to trigger the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.5.22 or later

Vendor Advisory: https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html

Restart Required: Yes

Instructions:

1. Download Adobe Experience Manager 6.5.22 or later from Adobe's official distribution. 2. Follow Adobe's upgrade documentation for your deployment type (on-premise or cloud). 3. Apply the update to all affected instances. 4. Restart the AEM service after patching.

🔧 Temporary Workarounds

Implement Content Security Policy

all

Add strict CSP headers to prevent execution of inline scripts and restrict script sources to trusted domains only.

Add 'Content-Security-Policy: script-src 'self'' to web server configuration

Input Validation Filter

all

Implement server-side input validation to sanitize all user-supplied data before processing.

Configure AEM's XSS protection filters and custom servlet filters for additional validation

🧯 If You Can't Patch

  • Implement strict Content Security Policy headers to limit script execution
  • Deploy web application firewall (WAF) rules to detect and block XSS payloads

🔍 How to Verify

Check if Vulnerable:

Check AEM version via the Welcome screen or system/console/status-productinfo endpoint. If version is 6.5.21 or earlier, system is vulnerable.

Check Version:

curl -k https://<aem-host>:<port>/system/console/status-productinfo | grep 'Adobe Experience Manager'

Verify Fix Applied:

Verify AEM version is 6.5.22 or later. Test with safe XSS payloads to confirm proper sanitization.

📡 Detection & Monitoring

Log Indicators:

  • Unusual JavaScript payloads in request parameters
  • Multiple failed XSS attempts in access logs
  • Requests with encoded script tags in URLs

Network Indicators:

  • HTTP requests containing script tags or JavaScript event handlers in parameters
  • Traffic patterns showing users being redirected to external sites

SIEM Query:

source="aem_access.log" AND ("<script" OR "javascript:" OR "onerror=" OR "onload=")

🔗 References

📤 Share & Export