#VU4563 Authentication bypass in ColdFusion


Published: 2020-03-18

Vulnerability identifier: #VU4563

Vulnerability risk: Critical

CVSSv3.1: 9.4 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H/RL:O/RC:C]

CVE-ID: CVE-2013-0632

CWE-ID: CWE-592

Exploitation vector: Network

Exploit availability: Yes

Vulnerable software:
ColdFusion
Server applications / Application servers

Vendor: Adobe

Description
The vulnerability allows a remote attacker to bypass authentication and gain unauthorized access to vulnerable system.

The vulnerability exists due to an error within administrator.cfc. A remote unauthenticated attacker can access Adobe ColdFusion application using a default empty password, login to the RDS component and leverage this session to access administrative web interface.

Successful exploitation of this vulnerability results in unauthorized access to Adobe ColdFusion.

Note: the vulnerability was being actively exploited.

Mitigation
Install update from vendor's website.

Vulnerable software versions

ColdFusion: 10.0, 9.0 - 9.0.2


External links
http://www.adobe.com/support/security/bulletins/apsb13-03.html
http://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/coldfusion_rd...


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

Yes. This vulnerability is being exploited in the wild.


Latest bulletins with this vulnerability