Summary
Detail | |||
---|---|---|---|
Vendor | Macromedia | First view | 2001-07-11 |
Product | Coldfusion | Last view | 2006-08-09 |
Version | Type | Application | |
Update | |||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
Related : CVE
Date | Alert | Description | |
---|---|---|---|
7.2 | 2006-08-09 | CVE-2006-3979 | The AdminAPI of ColdFusion MX 7 allows attackers to bypass authentication by using "programmatic access" to the adminAPI instead of the ColdFusion Administrator. |
5.8 | 2006-05-15 | CVE-2006-2364 | Cross-site scripting (XSS) vulnerability in the validation feature in Macromedia ColdFusion 5 and earlier allows remote attackers to inject arbitrary web script or HTML via a "_required" field when the associated normal field is missing or empty, which is not sanitized before being presented in an error message. |
7.2 | 2005-12-18 | CVE-2005-4345 | Adobe (formerly Macromedia) ColdFusion MX 7.0 exposes the password hash of the Administrator in an API call, which allows local developers to obtain the hash and gain privileges. |
2.1 | 2005-12-18 | CVE-2005-4344 | Adobe (formerly Macromedia) ColdFusion MX 7.0 does not honor when the CFOBJECT /CreateObject(Java) setting is disabled, which allows local users to create an object despite the specified configuration. |
5 | 2005-12-18 | CVE-2005-4343 | Adobe (formerly Macromedia) ColdFusion MX 6.0, 6.1, 6.1 with JRun, and 7.0 allows remote attackers to attach arbitrary files and send mail via a crafted Subject field, which is not properly handled by the CFMAIL tag in applications that use ColdFusion, aka "CFMAIL injection Vulnerability". |
7.5 | 2005-12-18 | CVE-2005-4342 | ColdFusion Sandbox on Adobe (formerly Macromedia) ColdFusion MX 6.0, 6.1, 6.1 with JRun, and 7.0 does not throw an exception if the SecurityManager is disabled, which might allow remote attackers to "bypass security controls," aka "JRun Clustered Sandbox Security Vulnerability." |
3.7 | 2005-07-19 | CVE-2005-2306 | Race condition in Macromedia JRun 4.0, ColdFusion MX 6.1 and 7.0, when under heavy load, causes JRun to assign a duplicate authentication token to multiple sessions, which could allow authenticated users to gain privileges as other users. |
4.3 | 2005-05-10 | CVE-2005-1555 | Cross-site scripting (XSS) vulnerability in the JRun Web Server in ColdFusion MX 7.0 allows remote attackers to inject arbitrary script or HTML via the URL, which is not properly quoted in the resulting default 404 error page. |
5 | 2005-05-02 | CVE-2005-1022 | ColdFusion 6.1 Updater 1 places Java .class files under the web root in the /WEB-INF/cfclasses directory, which allows remote attackers to obtain sensitive information. |
5 | 2004-12-31 | CVE-2004-2505 | Macromedia ColdFusion MX before 6.1 does not restrict the size of error messages, which allows remote attackers to cause a denial of service (memory consumption and crash) by sending repeated GET or POST requests that trigger error messages that use long strings of data. |
5.5 | 2004-12-31 | CVE-2004-2331 | ColdFusion MX 6.1 and 6.1 J2EE allows local users to bypass sandbox security restrictions and obtain sensitive information by using Java reflection methods to access trusted Java objects without using the CreateObject function or cfobject tag. |
5 | 2004-12-31 | CVE-2004-2330 | ColdFusion MX 6.1 and 6.1 J2EE allows remote attackers to cause a denial of service via an HTTP request containing a large number of form fields. |
7.2 | 2004-12-31 | CVE-2004-2204 | Macromedia ColdFusion MX 6.0 and 6.1 application server, when running with the CreateObject function or CFOBJECT tag enabled, allows local users to conduct unauthorized activities and obtain administrative passwords by creating CFML scripts that use CreateObject or CFOBJECT. |
7.5 | 2004-12-31 | CVE-2004-1478 | JRun 4.0 does not properly generate and handle the JSESSIONID, which allows remote attackers to perform a session fixation attack and hijack a user's HTTP session. |
10 | 2004-12-23 | CVE-2004-0646 | Buffer overflow in the WriteToLog function for JRun 3.0 through 4.0 web server connectors, such as (1) mod_jrun and (2) mod_jrun20 for Apache, with verbose logging enabled, allows remote attackers to execute arbitrary code via a long HTTP header Content-Type field or other fields. |
5 | 2004-10-05 | CVE-2004-0928 | The Microsoft IIS Connector in JRun 4.0 and Macromedia ColdFusion MX 6.0, 6.1, and 6.1 J2EE allows remote attackers to bypass authentication and view source files, such as .asp, .pl, and .php files, via an HTTP request that ends in ";.cfm". |
2.6 | 2004-06-01 | CVE-2004-0407 | The HTML form upload capability in ColdFusion MX 6.1 does not reclaim disk space if an upload is interrupted, which allows remote attackers to cause a denial of service (disk consumption) by repeatedly uploading files and interrupting the uploads before they finish. |
5 | 2004-03-15 | CVE-2004-1815 | Unknown vulnerability in ColdFusion MX 6.0 and 6.1, and JRun 4.0, when a SOAP web service expects an array of objects as an argument, allows remote attackers to cause a denial of service (memory consumption). |
5 | 2003-12-31 | CVE-2003-1469 | The default configuration of ColdFusion MX has the "Enable Robust Exception Information" option selected, which allows remote attackers to obtain the full path of the web server via a direct request to CFIDE/probe.cfm, which leaks the path in an error message. |
5 | 2002-12-31 | CVE-2002-1992 | Buffer overflow in jrun.dll in ColdFusion MX, when used with IIS 4 or 5, allows remote attackers to cause a denial of service in IIS via (1) a long template file name or (2) a long HTTP header. |
4.3 | 2002-12-31 | CVE-2002-1700 | Cross-site scripting vulnerability (XSS) in the missing template handler in Macromedia ColdFusion MX allows remote attackers to execute arbitrary script as other users by injecting script into the HTTP request for the name of a template, which is not filtered in the resulting 404 error message. |
7.5 | 2002-11-29 | CVE-2002-1309 | Heap-based buffer overflow in the error-handling mechanism for the IIS ISAPI handler in Macromedia ColdFusion 6.0 allows remote attackers to execute arbitrary via an HTTP GET request with a long .cfm file name. |
10 | 2001-12-31 | CVE-2001-1514 | ColdFusion 4.5 and 5, when running on Windows with the advanced security sandbox type set to "operating system," does not properly pass security context to (1) child processes created with |
7.5 | 2001-07-11 | CVE-2001-1427 | Unknown vulnerability in ColdFusion Server 2.0 through 4.5.1 SP2 allows remote attackers to overwrite templates with zero byte files via unknown attack vectors. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
33% (1) | CWE-470 | Use of Externally-Controlled Input to Select Classes or Code ('Unsa... |
33% (1) | CWE-200 | Information Exposure |
33% (1) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
CAPEC : Common Attack Pattern Enumeration & Classification
id | Name |
---|---|
CAPEC-58 | Restful Privilege Elevation |
CAPEC-198 | Cross-Site Scripting in Error Pages |
SAINT Exploits
Description | Link |
---|---|
JRun mod_jrun WriteToLog buffer overflow | More info here |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
60299 | ColdFusion MX Error Message Handling Remote DoS |
60009 | Macromedia ColdFusion MX on IIS jrun.dll HTTP Header Handling Remote Overflow... |
60008 | Macromedia ColdFusion MX on IIS jrun.dll Template File Name Handling Remote O... |
49951 | ColdFusion MX CFIDE/probe.cfm Direct Request Path Disclosure |
27858 | ColdFusion AdminAPI Programmatic Access Authentication Bypass |
25829 | ColdFusion Validation Feature _required Field Error Message XSS |
22865 | ColdFusion JRun Clustered Sandbox Security Bypass |
21899 | ColdFusion Crafted API Administrator Password Hash Disclosure |
21898 | ColdFusion CFMAIL Tag Subject Field Arbitrary File Access |
21897 | ColdFusion CFOBJECT /CreateObject(Java) Object Creation Restriction Bypass |
21557 | ColdFusion MX Error Message XSS |
20225 | ColdFusion CFEXECUTE / CFOBJECT Child Process Privilege Escalation |
17911 | JRun/ColdFusion Duplicate Authentication Token Generation |
16645 | ColdFusion Server Unspecified Arbitrary File Overwrite DoS |
16493 | ColdFusion MX JRun Error Page XSS |
15814 | ColdFusion Error Page Null Byte XSS Filter Bypass |
15353 | ColdFusion MX .class File Disclosure |
10718 | ColdFusion CFOBJECT Tag Privilege Escalation |
10546 | Macromedia JRun4 mod_jrun Apache Module Remote Overflow |
10240 | Macromedia Multiple Products on IIS Crafted URL Application Source Disclosure |
10238 | Macromedia JRun Server JSESSIONID Generation Weakness |
6639 | Macromedia JRun IIS ISAPI error-handling .cfm File Overflow |
5402 | ColdFusion File Upload DoS |
4285 | ColdFusion MX / JRun SOAP Request DoS |
3753 | ColdFusion MX Crafted Form Field DoS |
OpenVAS Exploits
id | Description |
---|---|
2005-11-03 | Name : Macromedia ColdFusion MX Path Disclosure Vulnerability File : nvt/Macromedia_ColdFusion_MX_Path_Disclosure_Vulnerability.nasl |
Snort® IPS/IDS
Date | Description |
---|---|
2016-03-14 | Multiple Vendors SOAP large array information disclosure attempt RuleID : 37368 - Type : SERVER-OTHER - Revision : 3 |
2014-01-10 | Multiple Vendors SOAP large array parameter DoS attempt RuleID : 23359 - Type : SERVER-OTHER - Revision : 3 |
2014-01-10 | Multiple Vendor server file disclosure attempt RuleID : 15990 - Type : SERVER-WEBAPP - Revision : 10 |
2014-01-10 | Macromedia JRun 4 mod_jrun buffer overflow attempt RuleID : 15978 - Type : SERVER-WEBAPP - Revision : 8 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2004-09-24 | Name: The remote web application server is affected by multiple flaws. File: jrun_multiple_flaws.nasl - Type: ACT_GATHER_INFO |
2003-04-30 | Name: The remote host is running an application that is affected by an information ... File: Macromedia_ColdFusion_MX_Path_Disclosure_Vulnerability.nasl - Type: ACT_GATHER_INFO |
2001-11-30 | Name: The remote web server is affected by a cross-site scripting vulnerability. File: cross_site_scripting.nasl - Type: ACT_ATTACK |