TUCoPS :: Web :: Servers :: cf02.htm

ColdFusion Application Server 2.0 (all editions) retrieve/delete arbitrary files
Vulnerability

    cold fusion

Affected

    Cold Fusion Application Server 2.0 (all editions)
    Cold Fusion Application Server 3.0 (all editions)
    Cold Fusion Application Server 3.1 (all editions)
    ColdFusion Server 4.0 (all editions)

Description

    Following  is  based  on  Allaire  Security  Bulletin.  One of the
    sample  applications   installed  with   ColdFusion  Server,   the
    Expression Evaluator, exposes the ability to read and delete files
    on the server.   A range of  sample code and  example applications
    are  provided  with  ColdFusion  Server  to  assist  customers  in
    learning and  using the  product.   Among these  is an application
    called  the  Expression  Evaluator,  which  is  installed  in  the
    //CFDOCS/expeval/ directory.  The Expression Evaluator lets  users
    process expressions such as 1 + 1 to see how ColdFusion expression
    evaluation works.  Used normally, the application is restricted to
    access from the local machine  based on the 127.0.0.1 IP  address.
    However, some pages  in the Expression  Evaluator can be  accessed
    directly, exposing the ability  to read and delete  files anywhere
    on the server where the evaluator is installed.

Solution

    Allaire  has  released  a  patch  that  modifies  the   Expression
    Evaluator so that all the pages in the Evaluator are restricted to
    access from the  local machine where  the Expression Evaluator  is
    installed based on the 127.0.0.1  IP address.  Furthermore, it  is
    recommended that  customers remove  (or not  install in  the first
    place) all documentation,  sample code, example  applications, and
    tutorials from production servers (e.g. servers accessible by  end
    users  via  the  Internet,  intranets  or  extranets).  The CFDOCS
    directory  should  be  secured  on  developer  workstations.   The
    examples that are installed  with ColdFusion are installed  in the
    CFDOCS  directory,  which  is  normally  installed in the root Web
    server directory.  These examples  can be removed by deleting  the
    CFDOCS directory.   Instead of  deleting these  files, the  entire
    CFDOCS directory can be secured with standard Web server security.

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH