Adobe has released security updates for Adobe Experience Manager (AEM). These updates resolve multiple vulnerabilities in AEM versions 6.3, 6.4 and 6.5. Successful exploitation could result in unauthorized access to the AEM environment.
Adobe categorizes these updates with the following priority ratings and recommends users update their installation to the newest version:
Product |
Version |
Platform |
Priority |
Availability |
Adobe Experience Manager |
6.5 |
All |
2 |
|
6.4 |
All |
2 |
||
6.3 |
All |
2 |
Please contact Adobe customer care for assistance with earlier AEM versions.
Vulnerability Category |
Vulnerability Impact |
Severity |
CVE Number |
Affected Versions | Download Package |
Cross-Site Request Forgery | Sensitive Information disclosure | Important | CVE-2019-8234
|
AEM 6.2 AEM 6.3 AEM 6.4 |
|
Reflected Cross Site Scripting | Sensitive Information disclosure
|
Moderate | CVE-2019-8078 | AEM 6.2 AEM 6.3 AEM 6.4 |
|
Stored Cross Site Scripting | Sensitive Information disclosure | Important | CVE-2019-8079 | AEM 6.0 AEM 6.1 AEM 6.2 AEM 6.3 AEM 6.4 |
|
Stored Cross Site Scripting | Privilege Escalation | Important | CVE-2019-8080
|
AEM 6.3 AEM 6.4 |
|
Authentication Bypass
|
Sensitive Information disclosure | Important | CVE-2019-8081 | AEM 6.2 AEM 6.3 AEM 6.4 AEM 6.5 |
Cumulative Fix Pack for 6.3 SP3 – AEM-6.3.3.6 |
XML External Entity Injection | Sensitive Information disclosure
|
Important | CVE-2019-8082 | AEM 6.2 AEM 6.3 AEM 6.4 |
|
Cross Site Scripting | Sensitive Information disclosure
|
Moderate
|
CVE-2019-8083
|
AEM 6.3 AEM 6.4 AEM 6.5 |
Cumulative Fix Pack for 6.3 SP3 – AEM-6.3.3.6 |
Reflected Cross Site Scripting | Sensitive Information disclosure
|
Moderate
|
CVE-2019-8084
|
AEM 6.2 AEM 6.3 AEM 6.4 AEM 6.5 |
Cumulative Fix Pack for 6.3 SP3 – AEM-6.3.3.6 |
Reflected Cross Site Scripting
|
Sensitive Information disclosure
|
Moderate
|
CVE-2019-8085
|
AEM 6.2 AEM 6.3 AEM 6.4 AEM 6.5 |
Cumulative Fix Pack for 6.3 SP3 – AEM-6.3.3.6 |
XML External Entity Injection
|
Sensitive Information disclosure
|
Important
|
CVE-2019-8086
|
AEM 6.2 AEM 6.3 AEM 6.4 AEM 6.5
|
Cumulative Fix Pack for 6.3 SP3 – AEM-6.3.3.6 |
XML External Entity Injection
|
Sensitive Information disclosure
|
Important
|
CVE-2019-8087
|
AEM 6.2 AEM 6.3 AEM 6.4 AEM 6.5 |
Cumulative Fix Pack for 6.3 SP3 – AEM-6.3.3.6 |
JavaScript Code Injection
|
Arbitrary Code Execution
|
Critical
|
CVE-2019-8088*
|
AEM 6.2 AEM 6.3 AEM 6.4 AEM 6.5
|
Cumulative Fix Pack for 6.3 SP3 – AEM-6.3.3.6 |
Note:
JavaScript code execution (CVE-2019-8088) impacts version 6.2 only. Beginning with 6.3, the strictly sandboxed Rhino engine is used to execute JavaScript, which reduces the impact of CVE-2019-8088 to blind Server-Side Request Forgery (SSRF) attacks and denial-of-service (DoS).
Note:
Note: the packages listed in the table above are the minimum fix packs to address the relevant vulnerability. For the latest versions, please see the release notes links referenced above.
Adobe would like to thank the following individuals and organizations for reporting the relevant issues and for working with Adobe to help protect our customers:
Lorenzo Pirondini (Netcentric, a Cognizant Digital Business) (CVE-2019-8078, CVE-2019-8079, CVE-2019-8080, CVE-2019-8083, CVE-2019-8084, CVE-2019-8085)
Pankaj Upadhyay of T. Rowe Price Associates, Inc. (https://pankajupadhyay.in) (CVE-2019-8081)
Mikhail Egorov @0ang3el (CVE-2019-8086, CVE-2019-8087, CVE-2019-8088)