CVE-2024-43749

5.4 MEDIUM

📋 TL;DR

This CVE describes a stored Cross-Site Scripting (XSS) vulnerability in Adobe Experience Manager (AEM) versions 6.5.21 and earlier, allowing attackers to inject malicious scripts into vulnerable form fields. When users browse pages containing these fields, the scripts execute in their browsers, potentially leading to session hijacking, data theft, or unauthorized actions. Organizations using affected AEM versions are at risk, especially if the instance is internet-facing or handles sensitive user data.

💻 Affected Systems

Products:
  • Adobe Experience Manager
Versions: 6.5.21 and earlier
Operating Systems: All supported OS for AEM
Default Config Vulnerable: ⚠️ Yes
Notes: This affects AEM instances with vulnerable form fields; custom configurations or additional security controls may reduce risk.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could steal administrator session cookies, compromise user accounts, deface websites, or redirect users to malicious sites, leading to full system compromise or data breaches.

🟠

Likely Case

Attackers exploit this to hijack user sessions, steal sensitive data like login credentials, or perform actions on behalf of users, such as posting unauthorized content.

🟢

If Mitigated

With proper input validation, output encoding, and Content Security Policy (CSP) in place, the impact is reduced to minimal, preventing script execution and limiting damage to low-severity issues.

🌐 Internet-Facing: HIGH, as internet-facing AEM instances are directly accessible to attackers, increasing the likelihood of exploitation and broader impact on users.
🏢 Internal Only: MEDIUM, as internal instances may still be targeted via phishing or insider threats, but exposure is more limited compared to internet-facing systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation typically requires an attacker to have access to inject scripts into form fields, which may involve authenticated access or social engineering; no public proof-of-concept is known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Adobe Experience Manager 6.5.22 or later

Vendor Advisory: https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html

Restart Required: Yes

Instructions:

1. Review the vendor advisory for details. 2. Backup your AEM instance. 3. Apply the patch by upgrading to version 6.5.22 or later. 4. Restart the AEM service to apply changes. 5. Verify the fix by testing vulnerable form fields.

🔧 Temporary Workarounds

Implement Content Security Policy (CSP)

all

Add a CSP header to restrict script execution from untrusted sources, reducing the impact of XSS attacks.

Add 'Content-Security-Policy: default-src 'self'; script-src 'self'' to HTTP headers

Enable Input Validation and Output Encoding

all

Configure AEM to sanitize user inputs and encode outputs in form fields to prevent script injection.

Use AEM's built-in XSS protection filters and configure custom validation rules as per Adobe documentation

🧯 If You Can't Patch

  • Restrict access to vulnerable form fields by implementing strict authentication and authorization controls.
  • Monitor and audit logs for suspicious activity related to form submissions and script injections.

🔍 How to Verify

Check if Vulnerable:

Check the AEM version via the admin console or by running 'java -jar aem-quickstart.jar -version' and compare to affected versions (6.5.21 or earlier).

Check Version:

java -jar aem-quickstart.jar -version

Verify Fix Applied:

After patching, verify the version is 6.5.22 or later and test form fields for XSS by attempting to inject scripts and checking if they are sanitized or blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual form submissions with script tags or JavaScript code in request logs
  • Errors related to XSS filter violations in AEM logs

Network Indicators:

  • HTTP requests containing malicious script payloads to AEM endpoints
  • Unexpected redirects or script loads in user browser traffic

SIEM Query:

source="aem_logs" AND ("script" OR "javascript" OR "onerror") AND status="200"

🔗 References

📤 Share & Export