Adobe ColdFusion Improper Access Control Security feature bypass
CVE-2023-29298
Key Information:
- Vendor
- Adobe
- Status
- Vendor
- CVE Published:
- 12 July 2023
Badges
Summary
An improper access control vulnerability in Adobe ColdFusion allows an attacker to bypass security features, potentially granting unauthorized access to sensitive administration endpoints, including CFM and CFC. This vulnerability affects specific versions of Adobe ColdFusion and could be exploited without user interaction, making it critical for organizations using these versions to apply the recommended security measures as outlined in Adobe's security advisory.
CISA Reported
CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed as being exploited but is not known by the CISA to be used in ransomware campaigns. This is subject to change at pace
The CISA's recommendation is: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Affected Version(s)
ColdFusion 0 <= 2023.0.0.330468
News Articles
CISA warns govt agencies to patch Adobe ColdFusion servers
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has given federal agencies three weeks to secure Adobe ColdFusion servers on their networks against two critical security flaws exploited in attacks, one of them as a zero-day.
1 year ago
Adobe ColdFusion vulnerabilities exploited to deliver web shells (CVE-2023-29298, CVE-2023-38203) - Help Net Security
Attackers are exploiting 2 Adobe ColdFusion flaws (CVE-2023-29298, CVE-2023-38203) to breach servers and install web shells.
1 year ago
Exploited 0-days, an incomplete fix, and a botched disclosure: Infosec snafu reigns
The exploited code-execution flaws are the kind coveted by ransomware and nation-state hackers.
1 year ago
References
EPSS Score
97% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
- π¦
CISA Reported
- πΎ
Exploit known to exist
- π°
First article discovered by BleepingComputer
Vulnerability published
Vulnerability Reserved