what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Packet Storm Advisory 2013-0819-2 - Adobe ColdFusion 9 Administrative Login Bypass

Packet Storm Advisory 2013-0819-2 - Adobe ColdFusion 9 Administrative Login Bypass
Posted Aug 19, 2013
Authored by Scott Buckel | Site packetstormsecurity.com

Adobe ColdFusion versions 9.0, 9.0.1, and 9.0.2 do not properly check the "rdsPasswordAllowed" field when accessing the Administrator API CFC that is used for logging in. The login function never checks if RDS is enabled when rdsPasswordAllowed="true". This means that if RDS was not configured, the RDS user does not have a password associated with their username. This means by setting rdsPasswordAllowed to "true", we can bypass the admin login to use the rdsPassword, which in most cases, is blank. These details were purchased through the Packet Storm Bug Bounty program and are being released to the community.

tags | exploit, remote, bug bounty, packet storm
advisories | CVE-2013-0632
SHA-256 | 8267635397115a7b25f386e8ba0802efb22e55b7e7adf3d4e3cdb5c91b1eb2f6

Packet Storm Advisory 2013-0819-2 - Adobe ColdFusion 9 Administrative Login Bypass

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

+------------------------------------------------------------------------------+
| Packet Storm Advisory 2013-0819-2 |
| http://packetstormsecurity.com/ |
+------------------------------------------------------------------------------+
| Title: Adobe ColdFusion 9 Administrative Login Bypass |
+--------------------+---------------------------------------------------------+
| Release Date | 2013/08/19 |
| Advisory Contact | Packet Storm (advisories@packetstormsecurity.com) |
| Researcher | Scott Buckel |
+--------------------+---------------------------------------------------------+
| System Affected | ColdFusion |
| Versions Affected | 9.0, 9.0.1, 9.0.2 |
| Related Advisory | APSB13-03 |
| Related CVE Number | CVE-2013-0632 |
| Vendor Patched | 2013/01/15 |
| Classification | 1-day |
+--------------------+---------------------------------------------------------+

+----------+
| OVERVIEW |
+----------+

The release of this advisory provides exploitation details in relation to a
known patched vulnerability in Adobe ColdFusion 9. These details were
obtained through the Packet Storm Bug Bounty program and are being released
to the community.

The details of this issue were already leaked in the following Metasploit
module:

http://packetstormsecurity.com/1304-exploits/adobe_coldfusion_apsb13_03.rb.txt

+------------------------------------------------------------------------------+

+---------+
| DETAILS |
+---------+

Adobe ColdFusion versions 9.0, 9.0.1, and 9.0.2 do not properly check the
"rdsPasswordAllowed" field when accessing the Administrator API CFC that is
used for logging in. That CFC "Contains basic Administrator functionality,
including login, logout, the Migration wizard, and the Setup wizard. You must
call the login method before calling any other methods in the Administrator
API."

The login function never checks if RDS is enabled when rdsPasswordAllowed="true".
This means that if RDS was not configured, the RDS user does not have a password
associated with their username. This means by setting rdsPasswordAllowed to
"true", we can bypass the admin login to use the rdsPassword, which in most
cases, is blank.

By default (and in most production environments), RDS will be disabled thus
never have been configured. If a user can access the ColdFusion 9.0
administrator located at /CFIDE/administrator/index.cfm and also access the
file /CFIDE/adminapi/administrator.cfc, it is possible to fully bypass the
admin login. ColdFusion 9.0, 9.0.1, and 9.0.2 do not properly check if RDS
was ever enabled.


+------------------------------------------------------------------------------+

+------------------+
| PROOF OF CONCEPT |
+------------------+

Sample code below; no changes are needed except to substitute
[HOSTNAME]/CFIDE/adminapi/administrator.cfc with the proper location
of the adminapi/administrator.cfc. You may save this file as test.html on
your desktop and open it from there. After submitting this page, you will be
logged in when going to the ColdFusion administrator page located at
http://[HOSTNAME]/CFIDE/administrator/index.cfm

<form action="http://[HOSTNAME]/CFIDE/adminapi/administrator.cfc?method=login" method="post">
<input type="hidden" name="adminpassword" value="">
<input type="hidden" name="rdsPasswordAllowed" value="1">
<input type="submit">
</form>

+------------------------------------------------------------------------------+

+---------------+
| RELATED LINKS |
+---------------+

https://www.adobe.com/support/security/bulletins/apsb13-03.html
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0632
http://packetstormsecurity.com/1304-exploits/adobe_coldfusion_apsb13_03.rb.txt

+------------------------------------------------------------------------------+


+----------------+
| SHAMELESS PLUG |
+----------------+

The Packet Storm Bug Bounty program gives researchers the ability to profit
from their discoveries. You can get paid thousands of dollars for one day
and zero day exploits. Get involved by contacting us at
getpaid@packetstormsecurity.com or visit the bug bounty page at:

http://packetstormsecurity.com/bugbounty/




-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (GNU/Linux)

iEYEARECAAYFAlISpjAACgkQrM7A8W0gTbECxACeMh0JNfER2VdpgaFpym+9wPoq
2BUAoKzUuYrUifpSv5Oo/p01Y1j++jQu
=wy6j
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close