CVE-2024-54036

9.3 CRITICAL

📋 TL;DR

This stored Cross-Site Scripting (XSS) vulnerability in Adobe Connect allows attackers to inject malicious JavaScript into vulnerable form fields. When victims visit pages containing the injected scripts, attackers can steal session cookies and take over user sessions. Organizations using Adobe Connect versions 12.6, 11.4.7 and earlier are affected.

💻 Affected Systems

Products:
  • Adobe Connect
Versions: 12.6, 11.4.7 and earlier
Operating Systems: All platforms running Adobe Connect
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments with vulnerable versions are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of admin accounts leading to full system takeover, data exfiltration, and lateral movement within the organization's network.

🟠

Likely Case

Session hijacking of regular users leading to unauthorized access to meetings, recordings, and sensitive collaboration data.

🟢

If Mitigated

Limited impact with proper input validation, output encoding, and Content Security Policy (CSP) headers in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Stored XSS vulnerabilities are commonly exploited and require minimal technical skill to weaponize once details are known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to Adobe Connect 12.7 or 11.4.8

Vendor Advisory: https://helpx.adobe.com/security/products/connect/apsb24-99.html

Restart Required: Yes

Instructions:

1. Download the latest Adobe Connect version from Adobe's official site
2. Backup current configuration and data
3. Install the update following Adobe's deployment guide
4. Restart the Adobe Connect service
5. Verify the update was successful

🔧 Temporary Workarounds

Implement Content Security Policy

all

Add strict CSP headers to prevent execution of injected scripts

Add 'Content-Security-Policy: default-src 'self'; script-src 'self'' to web server headers

Input Validation Filter

all

Implement server-side input validation for all form fields

Implement input sanitization using libraries like OWASP Java Encoder or similar for your platform

🧯 If You Can't Patch

  • Implement Web Application Firewall (WAF) rules to block XSS payloads
  • Disable vulnerable form fields or implement strict access controls

🔍 How to Verify

Check if Vulnerable:

Check Adobe Connect version in admin console or via version file in installation directory

Check Version:

Check admin panel or view /version.txt in web root

Verify Fix Applied:

Verify version is 12.7 or 11.4.8 or later, and test form fields with basic XSS payloads

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to form endpoints with script tags
  • Multiple failed login attempts from new locations after form submissions

Network Indicators:

  • Outbound connections to suspicious domains after visiting Connect pages
  • Unusual traffic patterns to form submission endpoints

SIEM Query:

source="adobe_connect" AND (http_method="POST" AND uri="*/forms/*" AND (body="<script>" OR body="javascript:"))

🔗 References

📤 Share & Export