TUCoPS :: Web :: Apps :: cf16~1.htm

Cold Fusion multiple remote vulnerabilities
COMMAND

    Macromedia ColdFusion Example Applications

SYSTEMS AFFECTED

    Macromedia ColdFusion 4.x

PROBLEM

    Following  is  based  on  a  Internet  Security  Systems  Security
    Advisory.     ISS   X-Force   has   discovered   multiple   remote
    vulnerabilities  in  Macromedia  ColdFusion.   ColdFusion  is   an
    enterprise application used to develop, maintain, administer,  and
    deliver Web sites on the Internet.  The vulnerabilities may  allow
    remote attackers  to execute  arbitrary commands  as a  privileged
    user on a vulnerable ColdFusion installation.

    Macromedia   ColdFusion   ships   with   several   small  "helper"
    applications that are meant to educate users on a small subset  of
    ColdFusion's features.   These applications  are not  installed by
    default, and Macromedia has documented and continues to  recommend
    that production  ColdFusion servers  should not  have the  example
    applications installed.

    ColdFusion  ships  with   two  vulnerable  "Exampleapps".    These
    applications may  be queried  via a  normal Web  browser.  Both of
    these example applications employ a rudimentary security mechanism
    to attempt to block all  access except from the ColdFusion  server
    itself.  It is possible  for remote attackers to spoof  the source
    of the query and bypass this restriction.

    Both vulnerable scripts behave like CGI (Common Gateway Interface)
    applications.  It  is possible for  the attacker to  interact with
    the example applications to  create files, view files,  or execute
    commands on the vulnerable target.

SOLUTION

    ColdFusion Server 5.0 is not vulnerable.

    Macromedia will not release a patch to address the vulnerabilities
    described in this advisory.  Macromedia recommends that  customers
    do not install example applications or documentation on production
    ColdFusion  servers.   Example  applications  are  stored  in  the
    /CFDOCS/exampleapps directory.

    Macromedia recommends  that the  entire /CFDOCS  directory tree be
    removed from production servers and only installed on  development
    installations that  that are  not exposed  to potentially  hostile
    networks.

    All ColdFusion  customers should  familiarize themselves  with the
    ColdFusion  "Best  Security  Practices"  document available at the
    following address:

        http://www.allaire.com/Handlers/index.cfm?ID=16258&Method=Full

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH