Secunia Security Advisory - Some vulnerabilities have been reported in Adobe ColdFusion, which can be exploited by malicious, local users to disclose sensitive information and by malicious people to conduct cross-site scripting attacks.
a24e753247b4d38ea21a686c7eec281f807e6be3390920639a30ee1015940843
----------------------------------------------------------------------
Looking for a job?
Secunia is hiring skilled researchers and talented developers.
http://secunia.com/company/jobs/
----------------------------------------------------------------------
TITLE:
Adobe ColdFusion Cross-Site Scripting and Information Disclosure
SECUNIA ADVISORY ID:
SA39790
VERIFY ADVISORY:
http://secunia.com/advisories/39790/
DESCRIPTION:
Some vulnerabilities have been reported in Adobe ColdFusion, which
can be exploited by malicious, local users to disclose sensitive
information and by malicious people to conduct cross-site scripting
attacks.
1) Certain unspecified input is not properly sanitised by a
ColdFusion method before being returned to the user. This can be
exploited to execute arbitrary HTML and script code in a user's
browser session in context of an affected site.
2) Certain unspecified input passed to the ColdFusion Administrator
page is not properly sanitised before being returned to the user.
This can be exploited to execute arbitrary HTML and script code in a
user's browser session in context of an affected site.
3) An unspecified error can be exploited to disclose certain data.
The vulnerabilities are reported in versions 8.0, 8.0.1, 9.0, and
prior.
SOLUTION:
Apply vendor patches.
http://kb2.adobe.com/cps/841/cpsid_84102.html
PROVIDED AND/OR DISCOVERED BY:
1) The vendor credits Eric Stevens of Sanofi Pasteur, Inc.
2) The vendor credits Pete Freitag of Foundeo, Inc.
3) Reported by the vendor.
ORIGINAL ADVISORY:
Adobe:
http://www.adobe.com/support/security/bulletins/apsb10-11.html
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------