Adobe ColdFusion Java Deserialization Bug May Let Remote Users Execute Arbitrary Code and Input Validation Flaw Lets Remote Users Conduct Cross-Site Scripting
Severity Rating: High
- Adobe ColdFusion version 10, 11
Two vulnerabilities have been identified in Adobe ColdFusion and can be exploited by remote attackers to cause execution of arbitrary code and conduct cross-site scripting attacks on the target system. The vulnerabilities reported are as follows:
1. A vulnerability exists because the software does not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the Adobe ColdFusion software and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.
2. Another vulnerability exists that can allow a remote user to send specially crafted data to exploit a Java deserialization flaw in the Apache BlazeDS library and potentially execute arbitrary code on the target system.
Users are advised to apply updates.
More information is available on:
Adobe Security Bulletin
Mauritian Computer Emergency Response Team (CERT-MU)
National Computer Board
7th Floor, Stratton Court
La Poudriere Street