exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

asb99-01.expression_evaluator

asb99-01.expression_evaluator
Posted Sep 23, 1999

asb99-01.expression_evaluator

SHA-256 | ca6018ad1790f79ad7ac3c9d99ae04577fe614ac5bf49bc8d222b8d203351d96

asb99-01.expression_evaluator

Change Mirror Download
   
Allaire Security Bulletin (ASB99-01)
Expression Evaluator Security Issues

Originally Posted: February 4, 1999
Last Updated: April 30, 1999

Summary
One of the sample applications installed with ColdFusion Server, the
Expression Evaluator, exposes the ability to read, upload, and delete
files on the server. Allaire has released a patch that will limit
access to the Expression Evaluator to page requests made from the
machine where it is installed. As an additional measure of protection,
Allaire recommends that customers not install (or remove existing)
documentation, sample code, example applications and tutorials on
production servers and secure access to these files on workstations.

Issue
A range of sample code and example applications are provided with
ColdFusion Server to assist customers in learning and using the
product. Among these is an application called the Expression
Evaluator, which is installed in the //CFDOCS/expeval/ directory. The
Expression Evaluator lets users process expressions such as 1 + 1 to
see how ColdFusion expression evaluation works.

Used normally, the application is restricted to access from the local
machine based on the 127.0.0.1 IP address. However, some pages in the
Expression Evaluator can be accessed directly, exposing the ability to
read and delete files anywhere on the server where the evaluator is
installed. Additionally, files can be uploaded to the server,
including executable template files.

Affected Software Versions
* Cold Fusion Application Server 2.0 (all editions)
* Cold Fusion Application Server 3.0 (all editions)
* Cold Fusion Application Server 3.1 (all editions)
* ColdFusion Server 4.0 (all editions)

What Allaire is Doing
Allaire has released a patch that modifies the Expression Evaluator so
that all the pages in the Evaluator are restricted to access from the
local machine where the Expression Evaluator is installed based on the
127.0.0.1 IP address.

[4]Download - ColdFusion Expression Evaluator Security Patch (Windows
NT)
[5]Download - ColdFusion Expression Evaluator Security Patch (Solaris)
Additionally, the [6]ColdFusion Server 4.0.1 update, available from
the Allaire site as of April 9, 1999, includes the security patch.
[7]ColdFusion 4.0.1 updates
What Customers Should Do
Customers should run the patch on all of their systems where the
Expression Evaluator is installed.

Furthermore, we recommend that customers remove (or not install in the
first place) all documentation, sample code, example applications, and
tutorials from production servers (e.g. servers accessible by end
users via the Internet, intranets or extranets). The CFDOCS directory
should be secured on developer workstations. The examples that are
installed with ColdFusion are installed in the CFDOCS directory, which
is normally installed in the root Web server directory. These examples
can be removed by deleting the CFDOCS directory. Instead of deleting
these files, the entire CFDOCS directory can be secured with standard
Web server security.

Revisions
February 4, 1999 -- Bulletin first released.
April 30, 1999 -- Bulletin updated to include 4.0.1 release and notice
of file uploading vulnerability.

Reporting Security Issues
Allaire is committed to addressing security issues and providing
customers with the information on how they can protect themselves. If
you identify what you believe may be a security issue with an Allaire
product, please send an email to secure@allaire.com. We will work to
appropriately address and communicate the issue.

Receiving Security Bulletins
When Allaire becomes aware of a security issue that we believe
significantly affects our products or customers, we will notify
customers when appropriate. Typically this notification will be in the
form of a security bulletin explaining the issue and the response.
Allaire customers who would like to receive notification of new
security bulletins when they are released can sign up for our security
notification service.

For additional information on security issues at Allaire, please visit
the Security Zone at:
[8]http://www.allaire.com/security
THE INFORMATION PROVIDED BY ALLAIRE IN THIS BULLETIN IS PROVIDED "AS
IS" WITHOUT WARRANTY OF ANY KIND. ALLAIRE DISCLAIMS ALL WARRANTIES,
EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY
AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL ALLAIRE
CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER
INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF
BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF ALLAIRE CORPORATION OR
ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR
CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY
NOT APPLY.

< a l l a i r e >
Copyright © 1995-99 Allaire Corp., All rights reserved.
[9]Site problems? [10]Service questions? [11]Privacy Policy

References

1. LYNXIMGMAP:http://www1.allaire.com/handlers/index.cfm?ID=8727&Method=Full#allaireHome
2. LYNXIMGMAP:http://www1.allaire.com/handlers/index.cfm?ID=8727&Method=Full#tools
3. javascript:history.back()
4. http://download.allaire.com/patches/coldfusion/cfexpreval.exe
5. http://download.allaire.com/patches/coldfusion/cfexpreval.tar.Z
6. http://www1.allaire.com/handlers/index.cfm?ID=10712&Method=Full
7. http://www1.allaire.com/handlers/index.cfm?ID=10712&Method=Full
8. http://www.allaire.com/security
9. mailto:webmaster@allaire.com
10. mailto:info@allaire.com
11. http://www.allaire.com/privacy/
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close