SB2018091106 - Multiple vulnerabilities in Adobe ColdFusion



SB2018091106 - Multiple vulnerabilities in Adobe ColdFusion

Published: September 11, 2018 Updated: October 6, 2022

Security Bulletin ID SB2018091106
Severity
Critical
Patch available
YES
Number of vulnerabilities 9
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Critical 11% High 56% Low 33%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 9 secuirty vulnerabilities.


1) Deserialization of untrusted data (CVE-ID: CVE-2018-15965)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to input validation error when processing serialized data. A remote unauthenticated attacker can pass specially crafted serialized data to the affected application and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


2) Deserialization of untrusted data (CVE-ID: CVE-2018-15957)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to input validation error when processing serialized data. A remote unauthenticated attacker can pass specially crafted serialized data to the affected application and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


3) Deserialization of untrusted data (CVE-ID: CVE-2018-15958)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to input validation error when processing serialized data. A remote unauthenticated attacker can pass specially crafted serialized data to the affected application and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


4) Deserialization of untrusted data (CVE-ID: CVE-2018-15959)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to input validation error when processing serialized data. A remote unauthenticated attacker can pass specially crafted serialized data to the affected application and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


5) Information disclosure (CVE-ID: CVE-2018-15964)

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to usage of a vulnerable component. A remote unauthenticated attacker can gain access to sensitive information via unknown vectors.


6) Arbitrary file deletion (CVE-ID: CVE-2018-15963)

The vulnerability allows a local attacker to delete arbitrary files on the system.

The vulnerability exists due to unknown error that allows a local attacker to delete arbitrary files on the target system.


7) Directory listing (CVE-ID: CVE-2018-15962)

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to an error that allows a remote attacker to view directory listing and obtain names of folders and files on the system.


8) Unrestricted file upload (CVE-ID: CVE-2018-15961)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to input validation error when processing file uploads in "/cf_scripts/scripts/ajax/ckeditor/plugins/filemanager/upload.cfm". A remote non-authenticated attacker can upload and execute arbitrary file on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Note: this vulnerability is being actively exploited in the wild to upload a China Chopper webshell.


9) Arbitrary file overwrite (CVE-ID: CVE-2018-15960)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to usage of a vulnerable component. A remote unauthenticated attacker can overwrite arbitrary file on the system.

Successful exploitation of vulnerability may allow an attacker to compromise vulnerable system.


Remediation

Install update from vendor's website.