Adobe Experience Manager versions 6.5.18 and earlier are impacted by a stored Cross-Site Scripting (XSS) vulnerability, allowing attackers to inject malicious scripts and compromise system integrity.
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be exploited by a low-privileged attacker to inject malicious scripts into vulnerable form fields. This could lead to the execution of malicious JavaScript in a victim’s browser when they access the page with the vulnerable field.
Understanding CVE-2023-48521
This section provides insight into the specifics of CVE-2023-48521.
What is CVE-2023-48521?
CVE-2023-48521 details a stored XSS vulnerability in Adobe Experience Manager versions 6.5.18 and earlier, posing a risk of injecting harmful scripts into susceptible form fields.
The Impact of CVE-2023-48521
The vulnerability allows low-privileged attackers to execute malicious JavaScript on victims' browsers, compromising the security and integrity of the system.
Technical Details of CVE-2023-48521
Here are the technical aspects of CVE-2023-48521.
Vulnerability Description
The vulnerability resides in
libs/cq/tagging/gui/components/movetag/clientlibs/movetag/js/movetag.js
of Adobe Experience Manager, enabling the injection of malicious scripts through vulnerable form fields.
Affected Systems and Versions
Adobe Experience Manager versions 6.5.18 and earlier are impacted by this stored XSS vulnerability.
Exploitation Mechanism
Low-privileged attackers can abuse this vulnerability to embed malicious scripts into vulnerable form fields, leading to the execution of these scripts on victims' browsers.
Mitigation and Prevention
To address CVE-2023-48521, follow these recommended steps:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Refer to advisory APSB23-72 from Adobe for detailed instructions on patching and securing Adobe Experience Manager against CVE-2023-48521.