Adobe ColdFusion ComponentFilter Remote Code Execution

high Web App Scanning Plugin ID 113903

Synopsis

Adobe ColdFusion ComponentFilter Remote Code Execution

Description

Adobe ColdFusion versions 2021 below Update 6 and 2018 below Update 16 suffer from a deserialization vulnerability through the `JSONUtils.deserializeJSON` method on `_cfclient` requests. By leveraging this vulnerability, a remote unauthenticated attacker could achieve an arbitrary file read and a remote code execution on the target ColdFusion instance.

Solution

Upgrade to Adobe ColdFusion versions 2018 Update 16, 2021 Update 6 or later.

See Also

https://helpx.adobe.com/security/products/coldfusion/apsb23-25.html

Plugin Details

Severity: High

ID: 113903

Type: remote

Published: 5/31/2023

Updated: 10/5/2023

Scan Template: basic, full, pci, scan

Risk Information

VPR

Risk Factor: High

Score: 7.9

CVSS v2

Risk Factor: High

Base Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:N

CVSS Score Source: CVE-2023-26360

CVSS v3

Risk Factor: High

Base Score: 8.6

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

CVSS Score Source: CVE-2023-26360

Vulnerability Information

CPE: cpe:2.3:a:adobe:coldfusion:*:*:*:*:*:*:*:*

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 3/14/2023

Vulnerability Publication Date: 3/14/2023

CISA Known Exploited Vulnerability Due Dates: 4/5/2023

Reference Information

CVE: CVE-2023-26360