Skip Ribbon Commands
Skip to main content
Computer Emergency Response Team of Mauritius (CERT-MU)

VN-2017-63


Adobe ColdFusion Java Deserialization Bug May Let Remote Users Execute Arbitrary Code and Input Validation Flaw Lets Remote Users Conduct Cross-Site Scripting
Severity Rating: High
Systems Affected:
  • Adobe ColdFusion version  10, 11
Description
Two vulnerabilities have been identified in Adobe ColdFusion and can be exploited by remote attackers to cause execution of arbitrary code and conduct cross-site scripting attacks on the target system. The vulnerabilities reported are as follows:
 
1.     A vulnerability exists because the software does not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the Adobe ColdFusion software and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.
 
2.     Another vulnerability exists that can allow a remote user to send specially crafted data to exploit a Java deserialization flaw in the Apache BlazeDS library and potentially execute arbitrary code on the target system.
 
Solution
Users are advised to apply updates.
More information is available on:
 
Vendor Information
Adobe
 
CVE Information
 
References
 
Security Tracker
 
Adobe Security Bulletin
 
Contact Information
 
Postal address
Mauritian Computer Emergency Response Team (CERT-MU)
National Computer Board
7th Floor, Stratton Court
La Poudriere Street
Port Louis