PT-2023-3961 · Adobe · Coldfusion
Published
2023-07-19
·
Updated
2024-12-26
·
CVE-2023-38205
CVSS v2.0
7.8
7.8
High
| Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:N/A:N |
Name of the Vulnerable Software and Affected Versions
Adobe ColdFusion versions 2018u18 (and earlier), 2021u8 (and earlier) and 2023u2 (and earlier)
Description
The issue is related to an improper access control vulnerability that could result in a security feature bypass. An attacker could leverage this vulnerability to access the administration CFM and CFC endpoints, such as "/pms" module, without requiring user interaction. It is estimated that about 255,541 results are potentially affected. There are reports of this issue being exploited in the wild.
Recommendations
For Adobe ColdFusion versions 2018u18 (and earlier), update to a version later than 2018u18 to resolve the issue.
For Adobe ColdFusion versions 2021u8 (and earlier), update to a version later than 2021u8 to resolve the issue.
For Adobe ColdFusion versions 2023u2 (and earlier), update to a version later than 2023u2 to resolve the issue.
As a temporary workaround, consider restricting access to the administration CFM and CFC endpoints until a patch is available.
Fix
Improper Access Control
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2023-04256
CVE-2023-38205
Affected Products
Coldfusion
References · 21
- https://bdu.fstec.ru/vul/2023-04256 · Security Note
- https://safe-surf.ru/specialists/bulletins-nkcki/696887/?sphrase_id=45691 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2023-38205 · Security Note
- https://helpx.adobe.com/security/products/coldfusion/apsb23-47.html · Security Note, Vendor Advisory
- https://safe-surf.ru/specialists/bulletins-nkcki/696887 · Security Note
- https://twitter.com/zoomeye_team/status/1693926893542879296 · Twitter Post
- https://twitter.com/ComputerPunks/status/1689213065299099648 · Twitter Post
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38205 · Note
- https://t.me/true_secator/6588 · Telegram Post
- https://t.me/thehackernews/3620 · Telegram Post
- https://twitter.com/RootMoksha/status/1748382310955966635 · Twitter Post
- https://twitter.com/thecyberneh/status/1776604892989116748 · Twitter Post
- https://twitter.com/thecyberneh/status/1776604890258715080 · Twitter Post
- https://twitter.com/h1Disclosed/status/1700208414113280369 · Twitter Post
- https://twitter.com/priyanshu58/status/1742184486593495208 · Twitter Post