Multiple vulnerabilities in Adobe ColdFusion

Published: 2018-09-11 20:37:39 | Updated: 2018-11-09 10:11:07
Severity Critical
Patch available YES
Number of vulnerabilities 9
CVE ID CVE-2018-15965
CVE-2018-15957
CVE-2018-15958
CVE-2018-15959
CVE-2018-15964
CVE-2018-15963
CVE-2018-15962
CVE-2018-15961
CVE-2018-15960
CVSSv3 8.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
2.9 [CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]
3.2 [CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
9.4 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H/RL:O/RC:C]
8.5 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CWE ID CWE-502
CWE-200
CWE-264
CWE-434
Exploitation vector Network
Public exploit Vulnerability #8 is being exploited in the wild.
Vulnerable software ColdFusion
Vulnerable software versions ColdFusion 2018.0.0.310739
ColdFusion 11 Update 14
ColdFusion 11 Update 13
Show more
Vendor URL Adobe

Security Advisory

UPDATED: 09.11.2018
Added information about in the wild exploitation of the vulnerability #8, raised bulletin risk level to Critical.

1) Deserialization of untrusted data

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to input validation error when processing serialized data. A remote unauthenticated attacker can pass specially crafted serialized data to the affected application and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Remediation

Install update from vendor's website.

External links

https://helpx.adobe.com/security/products/coldfusion/apsb18-33.html

2) Deserialization of untrusted data

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to input validation error when processing serialized data. A remote unauthenticated attacker can pass specially crafted serialized data to the affected application and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Remediation

Install update from vendor's website.

External links

https://helpx.adobe.com/security/products/coldfusion/apsb18-33.html

3) Deserialization of untrusted data

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to input validation error when processing serialized data. A remote unauthenticated attacker can pass specially crafted serialized data to the affected application and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Remediation

Install update from vendor's website.

External links

https://helpx.adobe.com/security/products/coldfusion/apsb18-33.html

4) Deserialization of untrusted data

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to input validation error when processing serialized data. A remote unauthenticated attacker can pass specially crafted serialized data to the affected application and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Remediation

Install update from vendor's website.

External links

https://helpx.adobe.com/security/products/coldfusion/apsb18-33.html

5) Information disclosure

Description

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to usage of a vulnerable component. A remote unauthenticated attacker can gain access to sensitive information via unknown vectors.

Remediation

Install update from vendor's website.

External links

https://helpx.adobe.com/security/products/coldfusion/apsb18-33.html

6) Arbitrary file deletion

Description

The vulnerability allows a local attacker to delete arbitrary files on the system.

The vulnerability exists due to unknown error that allows a local attacker to delete arbitrary files on the target system.

Remediation

Install update from vendor's website.

External links

https://helpx.adobe.com/security/products/coldfusion/apsb18-33.html

7) Directory listing

Description

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to an error that allows a remote attacker to view directory listing and obtain names of folders and files on the system.

Remediation

Install update from vendor's website.

External links

https://helpx.adobe.com/security/products/coldfusion/apsb18-33.html

8) Unrestricted file upload

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to input validation error when processing file uploads in "/cf_scripts/scripts/ajax/ckeditor/plugins/filemanager/upload.cfm". A remote non-authenticated attacker can upload and execute arbitrary file on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Note: this vulnerability is being actively exploited in the wild to upload a China Chopper webshell.

Remediation

Install update from vendor's website.

External links

9) Arbitrary file overwrite

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to usage of a vulnerable component. A remote unauthenticated attacker can overwrite arbitrary file on the system.

Successful exploitation of vulnerability may allow an attacker to compromise vulnerable system.

Remediation

Install update from vendor's website.

External links

https://helpx.adobe.com/security/products/coldfusion/apsb18-33.html

Back to List