Multiple vulnerabilities in Adobe Experience Manager



Published: 2017-08-08
Risk High
Patch available YES
Number of vulnerabilities 3
CVE-ID CVE-2017-3108
CVE-2017-3107
CVE-2017-3110
CWE-ID CWE-434
CWE-200
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Adobe Experience Manager
Client/Desktop applications / Office applications

Vendor Adobe

Security Bulletin

This security bulletin contains information about 3 vulnerabilities.

1) Improper file type validation

EUVDB-ID: #VU7698

Risk: High

CVSSv3.1: 8.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-3108

CWE-ID: CWE-434 - Unrestricted Upload of File with Dangerous Type

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to file type validation error when uploading files. A remote attacker can bypass validation process and upload malicious file on vulnerable system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Install the following patches to resolve this vulnerability:
Hotfix 16617 for 6.0.0 version 1.2
Cumulative Fix Pack for 6.1 SP2 -  AEM-6.1-SP2-CFP3
Cumulative Fix Pack for 6.2 SP1 - AEM-6.2-SP1-CFP4

Vulnerable software versions

Adobe Experience Manager: 6.0 - 6.2

External links

http://helpx.adobe.com//security/products/experience-manager/apsb17-26.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Information disclosure

EUVDB-ID: #VU7699

Risk: Low

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-3107

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The vulnerability exists due to unknown error related to software version disclosure. A remote attacker can disclose a product version number.

Mitigation

The vulnerability can be resolved with the following patches:

Hotfix 17203 for 6.0.0

Cumulative Fix Pack for 6.1 SP2 - AEM-6.1-SP2-CFP9

Cumulative Fix Pack for 6.2 SP1- AEM-6.2-SP1-CFP5

Cumulative Fix Pack for 6.3.0.1

Vulnerable software versions

Adobe Experience Manager: 6.0 - 6.3

External links

http://helpx.adobe.com//security/products/experience-manager/apsb17-26.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Information disclosure

EUVDB-ID: #VU7700

Risk: Low

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-3110

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The vulnerability exists due to unknown error. A remote attacker can send a specially crafted request and gain access to potentially sensitive information.

Mitigation

Install the following patches:

Hotfix 16005 for 6.0.0.0

Cumulative Fix Pack for 6.1 SP2 - AEM-6.1-SP2-CFP10

Vulnerable software versions

Adobe Experience Manager: 6.0 - 6.1

External links

http://helpx.adobe.com//security/products/experience-manager/apsb17-26.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###