Adobe ColdFusion Multiple Security Vulnerabilities Notification

Adobe ColdFusion Multiple Security Vulnerabilities Notification

July 13, 2023 | NSFOCUS

Overview

Recently, NSFOCUS CERT monitored that Adobe has officially released security notices and fixed multiple Adobe ColdFusion vulnerabilities. Affected users should take measures as soon as possible. The key vulnerabilities are as follows:

Adobe ColdFusion Access Control Bypass Vulnerability (CVS 2023-29298):

Adobe ColdFusion has an access control bypass vulnerability that allows attackers to access management endpoints by inserting unexpected additional forward slash characters in the requested URL. Unauthenticated remote attackers can exploit this vulnerability to execute arbitrary code on the target system. At present, the details of the vulnerability have been disclosed on the internet, with a CVSS score of 7.5.

Adobe ColdFusion Deserialization Vulnerability (CVS 2023-29300):

Due to a flaw in Adobe ColdFusion’s deserialization security check, unauthenticated remote attackers can carry out deserialization attacks by constructing malicious data packets, ultimately enabling the execution of arbitrary code on the target system, with a CVSS score of 9.8.

Reference link: https://helpx.adobe.com/security/products/coldfusion/apsb23-40.html

Scope of Impact

Affected version:

  • Adobe ColdFusion 2018<=Update 16
  • Adobe ColdFusion 2021<=Update 6
  • Adobe ColdFusion 2023=GA Release (2023.0.0.330468)

Unaffected version:

  • Adobe ColdFusion 2018>=Update 17
  • Adobe ColdFusion 2021>=Update 7
  • Adobe ColdFusion 2023>=Update1

Detection

Relevant users can use version detection to determine whether the current application is at risk.

Method 1: After logging into the system, access/CFIDE/administrator/index.cfm to view the version in the system information

Method 2: Execute the cfinfo – version (info) command in bin of the Adobe ColdFusion installation directory to view the version.

If the current version is within the affected range, there may be a security risk.

Mitigation

Official upgrade

At present, the official has fixed this vulnerability in the latest version. Affected users are requested to upgrade the version as soon as possible for protection. The reference link is as follows:

VersionLink
Adobe ColdFusion 2018https://helpx.adobe.com/coldfusion/kb/coldfusion-2018-update-17.html
Adobe ColdFusion 2021https://helpx.adobe.com/coldfusion/kb/coldfusion-2021-update-7.html
Adobe ColdFusion 2023https://helpx.adobe.com/coldfusion/kb/coldfusion-2023-update-1.html

Manual upgrade

For Adobe ColdFusion 2018/2021/2023:

Step 1: Visit the following link to download the patch

VersionPatch download link
Adobe ColdFusion 2018https://cfdownload.adobe.com/pub/adobe/coldfusion/2018/updates/hotfix-017-330143.jar
Adobe ColdFusion 2021https://cfdownload.adobe.com/pub/adobe/coldfusion/2021/updates/hotfix-007-330142.jar
Adobe ColdFusion 2023https://cfdownload.adobe.com/pub/adobe/coldfusion/2023/updates/hotfix-001-330480.jar

Step 2: Execute the following corresponding commands based on the downloaded patch file (must have the ability to start or stop the ColdFusion service and full access to the ColdFusion root directory.)

Execute under Windows:

<cf_ Root>/jre/bin/java.exe – jar<jar file dir>/hotfix – *. jar

Execute under Linux:

<cf_ Root>/jre/bin/Java jar<jar file dir>/hotfix – *. jar

Ensure that the JRE bundled with ColdFusion is used to execute the downloaded JAR. For an independent ColdFusion, it must be located in<cf_ Root>/jre/bin.

For more information, please refer to the official tutorial: https://helpx.adobe.com/coldfusion/configuring-administering/using-the-coldfusion-administrator.html#serverupdate

Statement

This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and/or indirect consequences and losses caused by transmitting and/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add/delete any information to/from it, or use this advisory for commercial purposes without permission from NSFOCUS.

About NSFOCUS

NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks. The company’s Intelligent Hybrid Security strategy utilizes both cloud and on-premises security platforms, built on a foundation of real-time global threat intelligence, to provide multi-layered, unified and dynamic protection against advanced cyber attacks.

NSFOCUS works with Fortune Global 500 companies, including four of the world’s five largest financial institutions, organizations in insurance, retail, healthcare, critical infrastructure industries as well as government agencies. NSFOCUS has technology and channel partners in more than 60 countries, is a member of both the Microsoft Active Protections Program (MAPP), and the Cloud Security Alliance (CSA).

A wholly owned subsidiary of NSFOCUS Technologies Group Co., Ltd., the company has operations in the Americas, Europe, the Middle East and Asia Pacific.