In association with heise online

09 January 2013, 10:46

Adobe warns of unpatched vulnerabilities in ColdFusion

  • Twitter
  • Facebook
  • submit to slashdot
  • StumbleUpon
  • submit to reddit

ColdFusion logo Adobe is warning users of its ColdFusion application server that there are three vulnerabilities which are already being actively exploited for attacks. Versions 9.0, 9.0.1, 9.0.2 and 10 on all supported operating systems are vulnerable. There is no patch yet, but Adobe is suggesting some steps to mitigate the issues.

One of the vulnerabilities can allow an attacker to remotely bypass authentication, potentially allowing that attacker to take control of the affected server. The second vulnerability permits unauthorised users to view the contents of restricted directories. The final issue affects already compromised servers and could result in further information disclosure.

According to Adobe, the first two vulnerabilities can only be exploited if ColdFusion's password protection is not active, or is active but no password has been set. The company says it is working on a patch and plans to release it on 15 January.

In the interim, it offers instructions how to ensure a ColdFusion server is not taken over by malicious parties. Adobe recommends that a username and password should be set on RDS (Remote Development Services) and that these should be different from those on the administrator account. Once the username and password are set, Adobe then says users should disable RDS. The company also suggests disabling external access to /CFIDE/administrator, /CFIDE/adminapi and /CFIDE/componentutils and removing any unknown or unused ColdFusion components from the /CFIDE and webroot directories.


Print Version | Send by email | Permalink:

  • July's Community Calendar

The H Open

The H Security

The H Developer

The H Internet Toolkit