exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

coldfusion.dos.txt

coldfusion.dos.txt
Posted Jun 9, 2000
Site allaire.com

A new denial of service The Allaire ColdFusion Web Application Server contains a denial of service vulnerability in all ColdFusion versions up through and including 4.5.1. A very large password at the ColdFusion Administrator login page can bring the system to a halt.

tags | exploit, web, denial of service
SHA-256 | 42daef2c136accb3c2736c9630c8560472e737cbfa6d93ed211648d25c436216

coldfusion.dos.txt

Change Mirror Download

Foundstone, Inc.
http://www.foundstone.com
"Securing the Dot Com World"

Security Advisory

Allaire's ColdFusion

----------------------------------------------------------------------------
---------
FS Advisory ID: FS-060700-1-CFM

Release Date: June 7, 2000

Product: ColdFusion Web Application Server

Vendor: Allaire Corporation (http://www.allaire.com)

Vendor Advisory: http://www.allaire.com/security

Type: Denial of service attack

Severity: Medium to High

Author: Stuart McClure (stuart.mcclure@foundstone.com)
Foundstone, Inc. (http://www.foundstone.com)

Operating Systems: Windows NT, Solaris, HP-UX

Vulnerable versions: All ColdFusion versions up through and including
4.5.1.

Foundstone advisory: http://www.foundstone.com
----------------------------------------------------------------------------
---------

Description

A denial of service vulnerability exists within the Allaire
ColdFusion
web application server which allows an attacker to overwhelm the web
server
and deny legitimate web page requests.

Details

The problem lies within the ColdFusion mechanism that manages the
parsing of
passwords within authentication requests. This problem makes the
ColdFusion
Administrator login page vulnerable to a denial of service attack.
The denial
of service occurs during the process of converting the input
password and the
stored password into forms suitable for comparison when the input
password is
very large (>40,000 characters).

Proof of Concept

Use the well-known HTML tag field overflow technique to overflow the
HTML
password field on the Administrator login page:

http://vulnerable.server.here/cfide/administrator/index.cfm

The attacker simply changes the field size and POST action in the
HTML tags on
the page to allow a large string (over 40,000 characters) to be
submitted to
the ColdFusion server. Small input strings may not immediately crash
the
system but large enough strings will bring the system to a halt.

Solution

Workaround

Allaire provides the following workaround: Customers should back up
all
existing data and implement the recommendations made in the article,

Solution

Workaround

Allaire provides the following workaround: Customers should back up
all
existing data and implement the recommendations made in the article,

'Securing the ColdFusion Administrator (10954)'. This should resolve
the
issue. The article can be found at

http://www.allaire.com/Handlers/index.cfm?ID=10954&Method=Full

Fix

A fix is expected in the future release of ColdFusion 4.6 (Q4,2000).

Credit

We would like to thank Allaire for their prompt and serious
attention to the
problem.

Disclaimer

THE INFORMATION CONTAINED IN THIS ADVISORY IS THE COPYRIGHT (C) 2000
OF
FOUNDSTONE, INC. AND BELIEVED TO BE ACCURATE AT THE TIME OF
PRINTING,
BUT NO REPRESENTATION OR WARRANTY IS GIVEN, EXPRESS OR IMPLIED, AS
TO
ITS ACCURACY OR COMPLETENESS. NEITHER THE AUTHOR NOR THE PUBLISHER
ACCEPTS ANY LIABILITY WHATSOEVER FOR ANY DIRECT, INDIRECT OR
CONSEQUENTIAL LOSS OR DAMAGE ARISING IN ANY WAY FROM ANY USE OF, OR
RELIANCE PLACED ON, THIS INFORMATION FOR ANY PURPOSE. THIS ADVISORY
MAY BE
REDISTRIBUTED PROVIDED THAT NO FEE IS ASSIGNED AND THAT THE ADVISORY
IS NOT
MODIFIED IN ANY WAY.


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close