Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-43762— Adobe Experience Manager Unicode normalization leads to dispatcher bypass

CVSS 6.5 · Medium EPSS 2.34% · P85
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-43762

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Adobe Experience Manager Unicode normalization leads to dispatcher bypass
Source: NVD (National Vulnerability Database)
Vulnerability Description
AEM's Cloud Service offering, as well as version 6.5.10.0 (and below) are affected by a dispatcher bypass vulnerability that could be abused to evade security controls. Sensitive areas of the web application may be exposed through exploitation of the vulnerability.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
输入验证不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
Adobe Experience Manager 输入验证错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Adobe Experience Manager(AEM)是美国奥多比(Adobe)公司的一套可用于构建网站、移动应用程序和表单的内容管理解决方案。该方案支持移动内容管理、营销销售活动管理和多站点管理等。 Adobe Experience Manager 存在输入验证错误漏洞,该漏洞源于攻击者可以利用该漏洞触发安全功能绕过。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
AdobeExperience Manager unspecified ~ 6.5.10.0 -

II. Public POCs for CVE-2021-43762

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-43762

登录查看更多情报信息。

Same Patch Batch · Adobe · 2022-01-13 · 15 CVEs total

CVE-2021-407229.8 CRITICALAEM Forms Improper Restriction of XML External Entity Reference
CVE-2021-437658.1 HIGHAdobe Experience Manager Stored XSS in the Carousel Set
CVE-2021-441778.1 HIGHAdobe Experience Manager Stored XSS in user name parameter in the package manager
CVE-2021-441768.1 HIGHAdobe Experience Manager Stored XSS in workflow Stages parameter
CVE-2021-437618.0 HIGHAdobe Experience Manager Stored XSS on Edit Tag page via Localization input
CVE-2021-437648.0 HIGHAdobe Experience Manager Stored XSS in the Spin Set
CVE-2021-441785.4 MEDIUMAdobe Experience Manager Reflected XSS in /bin/wcm/contentfinder/page/view.html
CVE-2021-450543.3 LOWAdobe InCopy JPEG2000 Parsing Use-After-Free Information Disclosure Vulnerability
CVE-2021-450593.3 LOWAdobe InDesign JPEG2000 Parsing Use-After-Free Information Disclosure Vulnerability
CVE-2021-45053Adobe InCopy JPEG2000 Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
CVE-2021-45056Adobe InCopy JPEG File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
CVE-2021-45055Adobe InCopy TIF File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability
CVE-2021-45058Adobe InDesign JPEG File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
CVE-2021-45057Adobe InDesign JPEG2000 Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability

IV. Related Vulnerabilities

V. Comments for CVE-2021-43762

No comments yet


Leave a comment