CVE-2024-43745

5.4 MEDIUM

📋 TL;DR

This reflected Cross-Site Scripting (XSS) vulnerability in Adobe Experience Manager allows attackers to execute malicious JavaScript in victims' browsers by tricking them into visiting specially crafted URLs. The vulnerability affects Adobe Experience Manager versions 6.5.21 and earlier, potentially compromising user sessions and data.

💻 Affected Systems

Products:
  • Adobe Experience Manager
Versions: 6.5.21 and earlier
Operating Systems: All platforms running Adobe Experience Manager
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both AEM Author and Publish instances. Requires user interaction (visiting malicious URL).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, perform actions as authenticated users, redirect to malicious sites, or install malware through drive-by downloads.

🟠

Likely Case

Session hijacking, credential theft, or defacement of the application interface through injected content.

🟢

If Mitigated

Limited impact with proper input validation, output encoding, and Content Security Policy (CSP) headers in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Reflected XSS typically requires social engineering to trick users into clicking malicious links.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.5.22 or later

Vendor Advisory: https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html

Restart Required: Yes

Instructions:

1. Download Adobe Experience Manager 6.5.22 or later from Adobe's distribution portal. 2. Apply the service pack following Adobe's upgrade documentation. 3. Restart all AEM instances. 4. Verify the fix by testing previously vulnerable endpoints.

🔧 Temporary Workarounds

Implement Content Security Policy

all

Add CSP headers to restrict script execution sources and mitigate XSS impact

Add 'Content-Security-Policy' header with appropriate directives in web server configuration

Input Validation Filter

all

Deploy a web application firewall or input validation filter to block malicious payloads

Configure WAF rules to detect and block XSS patterns in URL parameters

🧯 If You Can't Patch

  • Implement strict input validation and output encoding on all user-controllable inputs
  • Deploy a web application firewall (WAF) with XSS protection rules enabled

🔍 How to Verify

Check if Vulnerable:

Test URL parameters with XSS payloads like <script>alert('XSS')</script> and check if they execute in browser

Check Version:

Check AEM version via CRXDE Lite interface or system/console/status-productinfo endpoint

Verify Fix Applied:

After patching, retest with XSS payloads to confirm they are properly sanitized or blocked

📡 Detection & Monitoring

Log Indicators:

  • Unusual URL parameters containing script tags or JavaScript code
  • Multiple failed XSS attempts from same source

Network Indicators:

  • HTTP requests with suspicious parameters containing script elements or encoded payloads

SIEM Query:

web.url:*<script* OR web.url:*javascript:* OR web.url:*%3Cscript%3E*

🔗 References

📤 Share & Export