Adobe has released security updates for Adobe Experience Manager. These updates resolve a reflected cross-site scripting vulnerability rated moderate in the HtmlRendererServlet (CVE-2017-3109), an information disclosure vulnerability (CVE-2017-3111) rated important in which a sensitive token is included in an http GET request under certain circumstances, and a cross-site scripting vulnerability (CVE-2017-11296) in Apache Sling Servlets Post 2.3.20 rated important.
The HtmlRendererServlet should be disabled in production systems. Please see Running AEM in Production Ready Mode for more details.
Adobe categorizes these updates with the following priority ratings and recommends users update their installation to the newest version:
|Adobe Experience Manager
Please contact Adobe customer care for assistance with earlier AEM versions.
|Vulnerability Category||Vulnerability Impact||Severity||CVE Numbers||Affected Version||Download Package|
|Reflected cross-site scripting||Information disclosure
||AEM 6.3 and earlier|
|Sensitive token in HTTP GET request||Information disclosure||Important||CVE-2017-3111
||AEM 6.1, AEM 6.2||Cumulative Fix Pack for 6.1 SP2 - AEM-6.1-SP2-CFP12
Cumulative Fix Pack for 6.2 SP1 - AEM-6.2-SP1-CFP2
||Information disclosure||Important||CVE-2017-11296||AEM 6.3 and earlier||
The packages listed in the table above are the minimum fix packs to address the listed vulnerability. For the latest versions, please see the release notes links referenced above.
Adobe would like to thank the following individuals and organizations for reporting the relevant issues and for working with Adobe to help protect our customers:
- Nagamarimuthu of Cognizant Technology Solutions - Enterprise Risk & Security Solutions (CVE-2017-3109)