exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

coldfusion.dos.txt

coldfusion.dos.txt
Posted Jun 9, 2000
Site allaire.com

A new denial of service The Allaire ColdFusion Web Application Server contains a denial of service vulnerability in all ColdFusion versions up through and including 4.5.1. A very large password at the ColdFusion Administrator login page can bring the system to a halt.

tags | exploit, web, denial of service
SHA-256 | 42daef2c136accb3c2736c9630c8560472e737cbfa6d93ed211648d25c436216

coldfusion.dos.txt

Change Mirror Download

Foundstone, Inc.
https://www.foundstone.com
"Securing the Dot Com World"

Security Advisory

Allaire's ColdFusion

----------------------------------------------------------------------------
---------
FS Advisory ID: FS-060700-1-CFM

Release Date: June 7, 2000

Product: ColdFusion Web Application Server

Vendor: Allaire Corporation (https://www.allaire.com)

Vendor Advisory: https://www.allaire.com/security

Type: Denial of service attack

Severity: Medium to High

Author: Stuart McClure (stuart.mcclure@foundstone.com)
Foundstone, Inc. (https://www.foundstone.com)

Operating Systems: Windows NT, Solaris, HP-UX

Vulnerable versions: All ColdFusion versions up through and including
4.5.1.

Foundstone advisory: https://www.foundstone.com
----------------------------------------------------------------------------
---------

Description

A denial of service vulnerability exists within the Allaire
ColdFusion
web application server which allows an attacker to overwhelm the web
server
and deny legitimate web page requests.

Details

The problem lies within the ColdFusion mechanism that manages the
parsing of
passwords within authentication requests. This problem makes the
ColdFusion
Administrator login page vulnerable to a denial of service attack.
The denial
of service occurs during the process of converting the input
password and the
stored password into forms suitable for comparison when the input
password is
very large (>40,000 characters).

Proof of Concept

Use the well-known HTML tag field overflow technique to overflow the
HTML
password field on the Administrator login page:

https://vulnerable.server.here/cfide/administrator/index.cfm

The attacker simply changes the field size and POST action in the
HTML tags on
the page to allow a large string (over 40,000 characters) to be
submitted to
the ColdFusion server. Small input strings may not immediately crash
the
system but large enough strings will bring the system to a halt.

Solution

Workaround

Allaire provides the following workaround: Customers should back up
all
existing data and implement the recommendations made in the article,

Solution

Workaround

Allaire provides the following workaround: Customers should back up
all
existing data and implement the recommendations made in the article,

'Securing the ColdFusion Administrator (10954)'. This should resolve
the
issue. The article can be found at

https://www.allaire.com/Handlers/index.cfm?ID=10954&Method=Full

Fix

A fix is expected in the future release of ColdFusion 4.6 (Q4,2000).

Credit

We would like to thank Allaire for their prompt and serious
attention to the
problem.

Disclaimer

THE INFORMATION CONTAINED IN THIS ADVISORY IS THE COPYRIGHT (C) 2000
OF
FOUNDSTONE, INC. AND BELIEVED TO BE ACCURATE AT THE TIME OF
PRINTING,
BUT NO REPRESENTATION OR WARRANTY IS GIVEN, EXPRESS OR IMPLIED, AS
TO
ITS ACCURACY OR COMPLETENESS. NEITHER THE AUTHOR NOR THE PUBLISHER
ACCEPTS ANY LIABILITY WHATSOEVER FOR ANY DIRECT, INDIRECT OR
CONSEQUENTIAL LOSS OR DAMAGE ARISING IN ANY WAY FROM ANY USE OF, OR
RELIANCE PLACED ON, THIS INFORMATION FOR ANY PURPOSE. THIS ADVISORY
MAY BE
REDISTRIBUTED PROVIDED THAT NO FEE IS ASSIGNED AND THAT THE ADVISORY
IS NOT
MODIFIED IN ANY WAY.


Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    38 Files
  • 24
    Sep 24th
    65 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close