asb99-01.expression_evaluator
ca6018ad1790f79ad7ac3c9d99ae04577fe614ac5bf49bc8d222b8d203351d96
Allaire Security Bulletin (ASB99-01)
Expression Evaluator Security Issues
Originally Posted: February 4, 1999
Last Updated: April 30, 1999
Summary
One of the sample applications installed with ColdFusion Server, the
Expression Evaluator, exposes the ability to read, upload, and delete
files on the server. Allaire has released a patch that will limit
access to the Expression Evaluator to page requests made from the
machine where it is installed. As an additional measure of protection,
Allaire recommends that customers not install (or remove existing)
documentation, sample code, example applications and tutorials on
production servers and secure access to these files on workstations.
Issue
A range of sample code and example applications are provided with
ColdFusion Server to assist customers in learning and using the
product. Among these is an application called the Expression
Evaluator, which is installed in the //CFDOCS/expeval/ directory. The
Expression Evaluator lets users process expressions such as 1 + 1 to
see how ColdFusion expression evaluation works.
Used normally, the application is restricted to access from the local
machine based on the 127.0.0.1 IP address. However, some pages in the
Expression Evaluator can be accessed directly, exposing the ability to
read and delete files anywhere on the server where the evaluator is
installed. Additionally, files can be uploaded to the server,
including executable template files.
Affected Software Versions
* Cold Fusion Application Server 2.0 (all editions)
* Cold Fusion Application Server 3.0 (all editions)
* Cold Fusion Application Server 3.1 (all editions)
* ColdFusion Server 4.0 (all editions)
What Allaire is Doing
Allaire has released a patch that modifies the Expression Evaluator so
that all the pages in the Evaluator are restricted to access from the
local machine where the Expression Evaluator is installed based on the
127.0.0.1 IP address.
[4]Download - ColdFusion Expression Evaluator Security Patch (Windows
NT)
[5]Download - ColdFusion Expression Evaluator Security Patch (Solaris)
Additionally, the [6]ColdFusion Server 4.0.1 update, available from
the Allaire site as of April 9, 1999, includes the security patch.
[7]ColdFusion 4.0.1 updates
What Customers Should Do
Customers should run the patch on all of their systems where the
Expression Evaluator is installed.
Furthermore, we recommend that customers remove (or not install in the
first place) all documentation, sample code, example applications, and
tutorials from production servers (e.g. servers accessible by end
users via the Internet, intranets or extranets). The CFDOCS directory
should be secured on developer workstations. The examples that are
installed with ColdFusion are installed in the CFDOCS directory, which
is normally installed in the root Web server directory. These examples
can be removed by deleting the CFDOCS directory. Instead of deleting
these files, the entire CFDOCS directory can be secured with standard
Web server security.
Revisions
February 4, 1999 -- Bulletin first released.
April 30, 1999 -- Bulletin updated to include 4.0.1 release and notice
of file uploading vulnerability.
Reporting Security Issues
Allaire is committed to addressing security issues and providing
customers with the information on how they can protect themselves. If
you identify what you believe may be a security issue with an Allaire
product, please send an email to secure@allaire.com. We will work to
appropriately address and communicate the issue.
Receiving Security Bulletins
When Allaire becomes aware of a security issue that we believe
significantly affects our products or customers, we will notify
customers when appropriate. Typically this notification will be in the
form of a security bulletin explaining the issue and the response.
Allaire customers who would like to receive notification of new
security bulletins when they are released can sign up for our security
notification service.
For additional information on security issues at Allaire, please visit
the Security Zone at:
[8]http://www.allaire.com/security
THE INFORMATION PROVIDED BY ALLAIRE IN THIS BULLETIN IS PROVIDED "AS
IS" WITHOUT WARRANTY OF ANY KIND. ALLAIRE DISCLAIMS ALL WARRANTIES,
EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY
AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL ALLAIRE
CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER
INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF
BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF ALLAIRE CORPORATION OR
ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR
CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY
NOT APPLY.
< a l l a i r e >
Copyright © 1995-99 Allaire Corp., All rights reserved.
[9]Site problems? [10]Service questions? [11]Privacy Policy
References
1. LYNXIMGMAP:http://www1.allaire.com/handlers/index.cfm?ID=8727&Method=Full#allaireHome
2. LYNXIMGMAP:http://www1.allaire.com/handlers/index.cfm?ID=8727&Method=Full#tools
3. javascript:history.back()
4. http://download.allaire.com/patches/coldfusion/cfexpreval.exe
5. http://download.allaire.com/patches/coldfusion/cfexpreval.tar.Z
6. http://www1.allaire.com/handlers/index.cfm?ID=10712&Method=Full
7. http://www1.allaire.com/handlers/index.cfm?ID=10712&Method=Full
8. http://www.allaire.com/security
9. mailto:webmaster@allaire.com
10. mailto:info@allaire.com
11. http://www.allaire.com/privacy/