Hello Everyone,
One of my clients is utilizing AEM Cloud, but our internal team has discovered a critical vulnerability that has not been communicated by the Adobe Cloud team.
Here are the steps to replicate the issue:
I would like to know if anyone else has encountered this vulnerability. If so, how was it addressed?
Has Adobe Cloud provided a solution (please include the security patch number or Adobe link), or did your development team handle it?
Please share the details of any solutions that were implemented.
Note : Though I find the blog but need to understand which Adobe Security Patch is linked to it.
Topics help categorize Community content and increase your ability to discover relevant content.
Views
Replies
Total Likes
HI @avesh_narang ,
May be you can try authenticating access to the AEM Query Builder and GraphQL endpoints, including the specific URL provided, using following methods:
/bin/querybuilder.json or GraphQL endpoints directly from within an AEM-managed environment (e.g., from a custom component or backend service), the request typically inherits the existing AEM user session.
-Tarun
Views
Replies
Total Likes
Thanks @TarunKumar ,
I see that this could be a possible solution, but there may be additional patterns that could bypass this validation.
Given that dispatcher settings are default when establishing the maven repository and affect all Adobe clients, Adobe might have encountered this issue and could provided a security patch for it.
I would appreciate community assistance in guiding me to the correct security patch, ensuring it is a foolproof solution and endorsed by Adobe.
Thanks
Views
Replies
Total Likes