Subject ColdFusion Information Exposure
9f05488d3199549cd5b73fd441867429c61693422a555cb74c5e8ff180fc7100
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
===============================================================================
>> CERT-NL, 01-Mar-2000 <<
>> All CERT-NL information has been moved to http://cert.surfnet.nl. Links <<
>> to CERT-NL information contained in this advisory are therefore outdated. <<
>> <<
>> CERT-NL also has stopped the CERT-CC-Mirror service. Due to this the <<
>> links to the CERT-CC mirror are obsolete. Visit the CERT-CC site for the <<
>> complete CERT-CC advisory texts: http://www.cert.org <<
===============================================================================
===============================================================================
Security Advisory CERT-NL
===============================================================================
Author/Source : Jan Meijer Index : S-00-04
Distribution : World Page : 1
Classification: External Version: 1
Subject : ColdFusion Information Exposure
(CFCACHE Tag) Date :24-Jan-2000
===============================================================================
By courtesy of CIAC we received information on a vulnerability in ColdFusion.
CERT-NL recommends to follow the procedure mentioned in the advisory. Follow
the enclosed URL to view the whole original advisory.
==============================================================================
January 18, 2000 17:00 GMT Number K-015
______________________________________________________________________________
PROBLEM: Certain files that are not normally publicly available may be
downloaded and used as system reconnaissance information by
users with malicious intent.
PLATFORM: Systems running ColdFusion Server 4.0x (all editions).
DAMAGE: The information about a server's web document directory
structure and URL parameters used to call site pages can
provide useful information for planning an attack on that
server.
SOLUTION: Download the new CFCACHE.CFM file and follow the directions
given in the advisory. The solution has been incorporated in
ColdFusion 4.5.
______________________________________________________________________________
VULNERABILITY The risk is MEDIUM. The information about the vulnerability
ASSESSMENT: is publically available.
______________________________________________________________________________
http://www.ciac.org/ciac/bulletins/k-015.shtml
______________________________________________________________________________
CIAC wishes to acknowledge the contributions of Beyond-Security's
SecuriTeam.com for the information contained in this bulletin.
______________________________________________________________________________
==============================================================================
CERT-NL is the Computer Emergency Response Team for SURFnet customers. SURFnet
is the Dutch network for educational, research and related institutes. CERT-NL
is a member of the Forum of Incident Response and Security Teams (FIRST).
All CERT-NL material is available under:
http://cert.surfnet.nl/
In case of computer or network security problems please contact your local
CERT/security-team or CERT-NL (if your institute is NOT a SURFnet customer
please address the appropriate (local) CERT/security-team).
CERT-NL is one/two hour(s) ahead of UTC (GMT) in winter/summer,
i.e. UTC+0100 in winter and UTC+0200 in summer (DST).
Email: cert-nl@surfnet.nl ATTENDED REGULARLY ALL DAYS
Phone: +31 302 305 305 BUSINESS HOURS ONLY
Fax: +31 302 305 329 BUSINESS HOURS ONLY
Snailmail: SURFnet bv
Attn. CERT-NL
P.O. Box 19035
NL - 3501 DA UTRECHT
The Netherlands
NOODGEVALLEN: 06 22 92 35 64 ALTIJD BEREIKBAAR
EMERGENCIES : +31 6 22 92 35 64 ATTENDED AT ALL TIMES
CERT-NL'S EMERGENCY PHONENUMBER IS ONLY TO BE USED IN CASE OF EMERGENCIES:
THE SURFNET HELPDESK OPERATING THE EMERGENCY NUMBER HAS A *FIXED*
PROCEDURE FOR DEALING WITH YOUR ALERT AND WILL IN REGULAR CASES RELAY IT
TO CERT-NL IN AN APPROPRIATE MANNER. CERT-NL WILL THEN CONTACT YOU.
===============================================================================
-----BEGIN PGP SIGNATURE-----
Version: PGP 6.5.1i
iQA/AwUBOL6IBjSYjBqwfc9jEQIG5gCeK2VSmHxzFt1G0qRHbTcBLXxNG3kAnR55
1jgjf9703CBXNIxu2OV6UEL5
=K0xk
-----END PGP SIGNATURE-----