Web Design - Publish.com
Publish.com Ziff-Davis Enterprise  
SEARCH · ONLINE MEDIA · MOBILE · WEB DESIGN · GRAPHICS TOOLS · PRINTING · PHOTO · TIPS · OPINIONS
Home arrow Web Design arrow ColdFusion Holes Allow Security Bypass, Info Exposure
ColdFusion Holes Allow Security Bypass, Info Exposure
By Lisa Vaas

Rate This Article:
Add This Article To:
Flaws in multiple versions of Macromedia ColdFusion could allow remote or local attackers to bypass security restrictions, according to a Secunia advisory.

Flaws have been found in multiple versions of Adobe Systems Inc.'s Macromedia ColdFusion that could allow remote or local attackers to bypass security restrictions. Malicious local users can also disclose potentially sensitive information, according to a Secunia Inc. advisory.

One of the flaws, which Secunia has dubbed moderately critical, is in the Sandbox Security function. It fails silently without giving an exception when ColdFusion is running on a JRun 4 cluster member with the Java SecurityManager disabled.

According to the alert, this could allow the bypass of some security controls in applications that rely on Sandbox Security.

Another flaw has to do with an input validation error when handling the "Subject" field of the CFMAIL tag. The flaw "can be exploited in an application that uses the tag to attach arbitrary files and send mails with any content," according to Secunia's advisory.

Click here to read about a trio of security patches from Macromedia.

A third vulnerability has been found in the enforcement of the "CFOBJECT/CreateObject(Java)" setting in Sandbox Security. This flaw may be exploited to call restricted methods through an object of a specially crafted class written to the ColdFusion library directory even when the setting has been disabled.

According to Secunia, this flaw may be related to an earlier reported vulnerability, SA12693, which concerned a security bypass for Macromedia ColdFusion MX.

For advice on how to secure your network and applications, as well as the latest security news, visit Ziff Davis Internet's Security IT Hub.

Finally, a flaw has been discovered through which the password hash used to authenticate ColdFusion Administrator can be obtained by developers via an API call.

This can be exploited by malicious developers to obtain the hash and authenticate as Administrator.

All of the reported flaws are to be found in Version 7.0. In addition, ColdFusion MX 6.0, 6.1 and 6.1 with JRun are affected by the first two vulnerabilities.

For ColdFusion MX 7.0, the solution is to update to Version 7.0.1, according to a Macromedia advisory.

For ColdFusion MX 6.0, users are advised by Macromedia to update to Version 6.1 and then apply the hot fix for Version 6.1 (here as a download.)

Check out eWEEK.com's for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzer's Weblog.


Discuss ColdFusion Holes Allow Security Bypass, Info Exposure
 
>>> Be the FIRST to comment on this article!
 

 
 
>>> More Web Design Articles          >>> More By Lisa Vaas
 


Buyer's Guide
Explore hundreds of products in our Publish.com Buyer's Guide.
Web design
Content management
Graphics Software
Streaming Media
Video
Digital photography
Stock photography
Web development
View all >

ADVERTISEMENT


FREE ZIFF DAVIS ENTERPRISE ESEMINARS AT ESEMINARSLIVE.COM
  • Dec 10, 4 p.m. ET
    Eliminate the Drawbacks of Traditional Backup/Replication for Linux
    with Michael Krieger. Sponsored by InMage
  • Dec 11, 1 p.m. ET
    Data Modeling and Metadata Management with PowerDesigner
    with Joel Shore. Sponsored by Sybase
  • Dec 12, 12 p.m. ET
    Closing the IT Business Gap: Monitoring the End-User Experience
    with Michael Krieger. Sponsored by Compuware
  • Dec 12, 2 p.m. ET
    Enabling IT Consolidation
    with Michael Krieger. Sponsored by Riverbed & VMWare
  • VTS
    Join us on Dec. 19 for Discovering Value in Stored Data & Reducing Business Risk. Join this interactive day-long event to learn how your enterprise can cost-effectively manage stored data while keeping it secure, compliant and accessible. Disorganized storage can prevent your enterprise from extracting the maximum value from information assets. Learn how to organize enterprise data so vital information assets can help your business thrive. Explore policies, strategies and tactics from creation through deletion. Attend live or on-demand with complimentary registration!
    FEATURED CONTENT
    IT LINK DISCUSSION - MIGRATION
    A Windows Vista® migration introduces new and unique challenges to any IT organization. It's important to understand early on whether your systems, hardware, applications and end users are ready for the transition.
    Join the discussion today!



    .NAME Charging For Whois
    Whois has always been a free service, but the .NAME registry is trying to change that.
    Read More >>

    Sponsored by Ziff Davis Enterprise Group

    NEW FROM ZIFF DAVIS ENTERPRISE


    Delivering the latest technology news & reviews straight to your handheld device

    Now you can get the latest technology news & reviews from the trusted editors of eWEEK.com on your handheld device
    mobile.eWEEK.com

     


    RSS 2.0 Feed


    internet
    rss graphic Publish.com
    rss graphic Google Watch

    Video Interviews


    streaming video
    Designing Apps for Usability
    DevSource interviews usability pundit Dr. Jakob Nielsen on everything from the proper attitude for programmers to the importance of prototyping in design to the reasons why PDF, Flash and local search engines can hurt more than they help.
    ADVERTISEMENT