{"id":18889,"date":"2024-01-09T15:56:38","date_gmt":"2024-01-09T15:56:38","guid":{"rendered":"https:\/\/gridinsoft.com\/blogs\/?p=18889"},"modified":"2024-01-09T15:56:38","modified_gmt":"2024-01-09T15:56:38","slug":"two-coldfusion-vulnerabilities-exploited","status":"publish","type":"post","link":"https:\/\/gridinsoft.com\/blogs\/two-coldfusion-vulnerabilities-exploited\/","title":{"rendered":"Two Adobe ColdFusion Vulnerabilities Exploited in The Wild"},"content":{"rendered":"<p>Two vulnerabilities in Adobe ColdFusion <strong>are exploited in real-world attacks<\/strong>, the Cybersecurity &#038; Infrastructure Security Agency (CISA) warns. Both issues are related to the possibility of arbitrary code execution, caused by poor validation of deserialized data. <strong>Adobe released patches for both of these vulnerabilities<\/strong> back in mid-July 2023, when they were originally detected.<\/p>\n<h2>ColdFusion ACE Vulnerabilities Exploited in Real-World Attacks<\/h2>\n<p>On January 8, <strong>CISA released their regular notice on new exploited vulnerabilities<\/strong>, specifying among others 2 security breaches in Adobe ColdFusion. Both of them are dated summer 2023, with the patches being available at around the same time. Nonetheless, the organization states about the exploitation, which is not doubtful considering the trends. And <strong>as both vulnerabilities score the CVSS rating of 9.8<\/strong>, the very fact of its usage in cyberattacks is concerning.<\/p>\n<p>As I said in the introduction, both <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-29300\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-29300<\/a> and <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-38203\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-38203<\/a> are about the <strong>poor data validation upon deserialization that leads to the arbitrary code execution (ACE)<\/strong>. Interestingly enough, both of them touch the same string versions of ColdFusion \u2013 2018, 2021 and 2023. By sending a specifically crafted data package, targeted on the vulnerable ColdFusion server, adversaries can make the server execute the code they need. No user interaction is needed for this trick, <strong>which increases the severity of the vulnerability even more<\/strong>.<\/p>\n<p>Arbitrary code execution vulnerabilities <strong>may serve as both initial access points and opportunities for lateral movement<\/strong>. The fact that this particular vulnerability works as is, without the need for user input, <a href=\"https:\/\/gridinsoft.com\/exploits\">makes the exploitation<\/a> just a piece of cake. And since ColdFusion is a rather popular app server solution, it is not hard to reach something important after compromising it, <strong>not to mention how easy it is to find a victim<\/strong>.<\/p>\n<h3>List of Affected ColdFusion Versions<\/h3>\n<div class=\"su-table su-table-alternate\">\n<table>\n<thead>\n<tr>\n<th>Vulnearbility<\/th>\n<th>Affected ColdFusion versions<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>CVE-2023-29300<br \/>\nCVE-2023-38203<\/td>\n<td>ColdFusion 2018, 2021, 2023<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<h2>Adobe ColdFusion Vulnerability Patches &#038; Mitigation<\/h2>\n<p><strong>Upon uncovering the vulnerabilities back in June 2023, Adobe released the updates<\/strong><span id='easy-footnote-1-18889' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gridinsoft.com\/blogs\/two-coldfusion-vulnerabilities-exploited\/#easy-footnote-bottom-1-18889\" title=\"Adobe Security Bulletin &lt;a href=&quot;https:\/\/helpx.adobe.com\/security\/products\/coldfusion\/apsb23-40.html&quot; rel=&quot;noopener noreferrer nofollow&quot; target=&quot;_blank&quot;&gt;regarding CVE-2023-29300&lt;\/a&gt;.\"><sup>1<\/sup><\/a><\/span> <span id='easy-footnote-2-18889' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gridinsoft.com\/blogs\/two-coldfusion-vulnerabilities-exploited\/#easy-footnote-bottom-2-18889\" title=\"Adobe Security Bulletin &lt;a href=&quot;https:\/\/helpx.adobe.com\/security\/products\/coldfusion\/apsb23-41.html&quot; rel=&quot;noopener noreferrer nofollow&quot; target=&quot;_blank&quot;&gt;regarding CVE-2023-38203&lt;\/a&gt;.\"><sup>2<\/sup><\/a><\/span> which have these issues fixed. The company insisted on users <a href=\"https:\/\/gridinsoft.com\/patch\">to install these patches<\/a> as soon as possible. And well, it cannot be a better moment to update than right now, after the official notification regarding the exploitation. Here is <strong>the list of ColdFusion versions that are no longer vulnerable<\/strong> to the said exploits:<\/p>\n<div class=\"su-table su-table-alternate\">\n<table>\n<thead>\n<tr>\n<th>Version<\/th>\n<th>Fixed in<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>ColdFusion 2023<\/td>\n<td>Update 1<\/td>\n<\/tr>\n<tr>\n<td>ColdFusion 2021<\/td>\n<td>Update 7<\/td>\n<\/tr>\n<tr>\n<td>ColdFusion 2018<\/td>\n<td>Update 17<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p>At the same time, <strong>no workarounds or mitigations are available<\/strong>. This was expected though, as the nature of these vulnerabilities does not suppose the ability to fix it without the intrusion into the program code. In fact, there was over half a year of time to update, so <strong>applying any makeshift fixes now is irrational in any case<\/strong>.<\/p>\n<p>Still, <strong>there is the ability to preventively protect the network<\/strong> from any kind of intrusion. By using <a href=\"https:\/\/gridinsoft.com\/ndr\">Network Detection and Response (NDR) solutions<\/a>, you make it much less likely that illicit traffic will reach your servers. By combining this with all-encompassing protective solutions, <a href=\"https:\/\/gridinsoft.com\/xdr\">like Extended Detection and Response (XDR)<\/a>, you will receive <strong>a reliable shield against known threats, as well as ones that are only to be discovered<\/strong>.<\/p>\n<p style=\"padding-top:15px;padding-bottom:15px;\"><a href=\"\/download\/antimalware\" rel=\"nofollow\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"\/blogs\/wp-content\/uploads\/2022\/07\/env01.webp\" alt=\"Two Adobe ColdFusion Vulnerabilities Exploited in The Wild\" width=\"798\" height=\"336\" class=\"aligncenter size-full\" title=\"\"><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Two vulnerabilities in Adobe ColdFusion are exploited in real-world attacks, the Cybersecurity &#038; Infrastructure Security Agency (CISA) warns. Both issues are related to the possibility of arbitrary code execution, caused by poor validation of deserialized data. Adobe released patches for both of these vulnerabilities back in mid-July 2023, when they were originally detected. ColdFusion ACE [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":18895,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[15],"tags":[244,619,315,374],"class_list":{"0":"post-18889","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security-news","8":"tag-adobe","9":"tag-cybersecurity","10":"tag-exploit","11":"tag-vulnerability"},"featured_image_src":"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/01\/Adobe-Coldfusion-vulnerabilities-featured.webp","author_info":{"display_name":"Stephanie Adlam","author_link":"https:\/\/gridinsoft.com\/blogs\/author\/adlam\/"},"_links":{"self":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/18889","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/comments?post=18889"}],"version-history":[{"count":5,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/18889\/revisions"}],"predecessor-version":[{"id":18898,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/18889\/revisions\/18898"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media\/18895"}],"wp:attachment":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media?parent=18889"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/categories?post=18889"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/tags?post=18889"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}