Adobe ColdFusion Authentication Bypass (APSB13-13)

critical Nessus Plugin ID 66407

Synopsis

A web management interface on the remote host has an authentication bypass vulnerability.

Description

The version of Adobe ColdFusion running on the remote host has an authentication bypass vulnerability. When RDS is disabled and not configured with password protection, it is possible to authenticate as an administrative user without providing a username or password. A remote, unauthenticated attacker can exploit this to gain administrative access to the ColdFusion Administrator interface. After authenticating, it is possible to write arbitrary files to the host, resulting in arbitrary code execution.

All versions of ColdFusion 10 are affected. ColdFusion 9, 9.0.1, and 9.0.2 are only affected when the hotfixes for APSB13-03 have been applied and web.xml is configured to allow access to the RDS servlet.

Solution

Apply the appropriate hotfix referenced in Adobe security bulletin APSB13-13.

See Also

https://www.tenable.com/security/research/tra-2013-04

https://www.adobe.com/support/security/bulletins/apsb13-13.html

http://www.nessus.org/u?e77cccdb

Plugin Details

Severity: Critical

ID: 66407

File Name: coldfusion_apsb13-13.nasl

Version: 1.13

Type: remote

Family: CGI abuses

Published: 5/14/2013

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:adobe:coldfusion

Required KB Items: installed_sw/ColdFusion

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Patch Publication Date: 5/14/2013

Vulnerability Publication Date: 5/14/2013

Reference Information

CVE: CVE-2013-1389

BID: 59849