Bulletin ID
Security updates available for Adobe Experience Manager | APSB19-48
|
Date Published |
Priority |
---|---|---|
APSB19-48 |
October 15, 2019 |
2 |
Summary
Adobe has released security updates for Adobe Experience Manager (AEM). These updates resolve multiple vulnerabilities in AEM versions 6.3, 6.4 and 6.5. Successful exploitation could result in unauthorized access to the AEM environment.
Affected product versions
Product |
Version |
Platform |
---|---|---|
Adobe Experience Manager |
6.5 6.4 6.3 6.2 6.1 6.0 |
All |
Solution
Adobe categorizes these updates with the following priority ratings and recommends users update their installation to the newest version:
Product |
Version |
Platform |
Priority |
Availability |
---|---|---|---|---|
Adobe Experience Manager |
6.5 |
All |
2 |
|
6.4 |
All |
2 |
||
6.3 |
All |
2 |
Please contact Adobe customer care for assistance with earlier AEM versions.
Vulnerability details
Vulnerability Category |
Vulnerability Impact |
Severity |
CVE Number |
Affected Versions | Download Package |
---|---|---|---|---|---|
Cross-Site Request Forgery | Sensitive Information disclosure | Important | CVE-2019-8234
|
AEM 6.2 AEM 6.3 AEM 6.4 |
|
Reflected Cross Site Scripting | Sensitive Information disclosure
|
Moderate | CVE-2019-8078 | AEM 6.2 AEM 6.3 AEM 6.4 |
|
Stored Cross Site Scripting | Sensitive Information disclosure | Important | CVE-2019-8079 | AEM 6.0 AEM 6.1 AEM 6.2 AEM 6.3 AEM 6.4 |
|
Stored Cross Site Scripting | Privilege Escalation | Important | CVE-2019-8080
|
AEM 6.3 AEM 6.4 |
|
Authentication Bypass
|
Sensitive Information disclosure | Important | CVE-2019-8081 | AEM 6.2 AEM 6.3 AEM 6.4 AEM 6.5 |
Cumulative Fix Pack for 6.3 SP3 – AEM-6.3.3.6 |
XML External Entity Injection | Sensitive Information disclosure
|
Important | CVE-2019-8082 | AEM 6.2 AEM 6.3 AEM 6.4 |
|
Cross Site Scripting | Sensitive Information disclosure
|
Moderate
|
CVE-2019-8083
|
AEM 6.3 AEM 6.4 AEM 6.5 |
Cumulative Fix Pack for 6.3 SP3 – AEM-6.3.3.6 |
Reflected Cross Site Scripting | Sensitive Information disclosure
|
Moderate
|
CVE-2019-8084
|
AEM 6.2 AEM 6.3 AEM 6.4 AEM 6.5 |
Cumulative Fix Pack for 6.3 SP3 – AEM-6.3.3.6 |
Reflected Cross Site Scripting
|
Sensitive Information disclosure
|
Moderate
|
CVE-2019-8085
|
AEM 6.2 AEM 6.3 AEM 6.4 AEM 6.5 |
Cumulative Fix Pack for 6.3 SP3 – AEM-6.3.3.6 |
XML External Entity Injection
|
Sensitive Information disclosure
|
Important
|
CVE-2019-8086
|
AEM 6.2 AEM 6.3 AEM 6.4 AEM 6.5
|
Cumulative Fix Pack for 6.3 SP3 – AEM-6.3.3.6 |
XML External Entity Injection
|
Sensitive Information disclosure
|
Important
|
CVE-2019-8087
|
AEM 6.2 AEM 6.3 AEM 6.4 AEM 6.5 |
Cumulative Fix Pack for 6.3 SP3 – AEM-6.3.3.6 |
JavaScript Code Injection
|
Arbitrary Code Execution
|
Critical
|
CVE-2019-8088*
|
AEM 6.2 AEM 6.3 AEM 6.4 AEM 6.5
|
Cumulative Fix Pack for 6.3 SP3 – AEM-6.3.3.6 |
JavaScript code execution (CVE-2019-8088) impacts version 6.2 only. Beginning with 6.3, the strictly sandboxed Rhino engine is used to execute JavaScript, which reduces the impact of CVE-2019-8088 to blind Server-Side Request Forgery (SSRF) attacks and denial-of-service (DoS).
Note: the packages listed in the table above are the minimum fix packs to address the relevant vulnerability. For the latest versions, please see the release notes links referenced above.
Acknowledgments
Adobe would like to thank the following individuals and organizations for reporting the relevant issues and for working with Adobe to help protect our customers:
Lorenzo Pirondini (Netcentric, a Cognizant Digital Business) (CVE-2019-8078, CVE-2019-8079, CVE-2019-8080, CVE-2019-8083, CVE-2019-8084, CVE-2019-8085)
Pankaj Upadhyay of T. Rowe Price Associates, Inc. (https://pankajupadhyay.in) (CVE-2019-8081)
Mikhail Egorov @0ang3el (CVE-2019-8086, CVE-2019-8087, CVE-2019-8088)
Revisions
October 15, 2019: Updated CVE id from CVE-2019-8077 to CVE-2019-8234.
March 11, 2020: Added a note to clarify that JavaScript code execution (CVE-2019-8088) only impacts AEM 6.2.