First published: Thu Apr 21 2022(Updated: )
ACS Commons version 5.1.x (and earlier) suffers from a Reflected Cross-site Scripting (XSS) vulnerability in /apps/acs-commons/content/page-compare.html endpoint via the a and b GET parameters. User input submitted via these parameters is not validated or sanitised. An attacker must provide a link to someone with access to AEM Author, and could potentially exploit this vulnerability to inject malicious JavaScript content into vulnerable form fields and execute it within the context of the victim's browser. The exploitation of this issue requires user interaction in order to be successful.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Consulting Services Commons | <5.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-28820 is considered a high severity vulnerability due to its ability to allow reflected cross-site scripting (XSS).
To mitigate CVE-2022-28820, upgrade ACS Commons to version 5.2.0 or later, which incorporates proper validation and sanitization of user input.
CVE-2022-28820 affects users of Adobe ACS Commons version 5.1.x and earlier.
CVE-2022-28820 exploits the /apps/acs-commons/content/page-compare.html endpoint through unvalidated user input in the a and b GET parameters.
Yes, CVE-2022-28820 can be easily exploited by attackers who can craft a malicious request to the vulnerable endpoint.