NII Advisory - Path Disclosure in Cold Fusion MX Server

2007.10.25
Risk: Low
Local: No
Remote: Yes
CWE: N/A


CVSS Base Score: 5/10
Impact Subscore: 2.9/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

=================================================== Path Disclosure in Macromedia ColdFusion MX Server Vendor: Macromedia http://www.macromedia.com Versions affected: ColdFusion MX Server Operating System: Windows 2000 Date: 26th April 2003 Severity: Low Network Intelligence India Pvt. Ltd. http://www.nii.co.in Online location: http://www.nii.co.in/vuln/pdmac.html =================================================== Background: ========= Macromedia Cold Fusion MX Server is a powerful web application server that lets you create robust sites and applications without a long learning curve. Description: ========= In its default installation, the Macromedia ColdFusion MX Server starts a web server (jrun) on port 8500. This is mainly for administrative purposes. When this server is accessed with the following URL http://host:8500/CFIDE/probe.cfm, an error message is displayed which reveals the Physical path of the location where the MX Server has been installed. Error occured in: C:\CFusionMX\wwwroot\CFIDE\probe.cfm:line56 Vendor Response: ============= The vendor response is that this is a feature controlled by the 'Debugging Settinsg' page in the Administrator console. [X] Enable Robust Exception Information. This checkbox is checked by default on a new installation to allow application development. For a production system the checkbox must be disabled. Impact: ===== Like with any other Path Disclosure, this bug would only allow vital information to be disclosed. By itself, it will not allow for a system compromise, but in conjunction with some other vulnerability in a Web app or in the server, it might be dangerous. Workaround: ========== Disable the checkbox mentioned above in a production environment. Alternatively, firewall the 8500 port to disable outside access to the administrator's console. It looks like the old debate on feature-or-bug, where the default configuration is not secure out-of-the-box. About NII ======== Network Intelligence India Pvt. Ltd. is an IT Security firm specializing in Security Audits, Training and Research. You may read our other advisories at http://www.nii.co.in/research/advisories.html We also develop host-based security auditing software - AuditPro for Windows, Unix, SQL, and Oracle http://www.nii.co.in/products.html Disclaimer: ========= The information contained in this advisory is copyright (c) 2003 Network Intelligence India Pvt. Ltd. This advisory may be redistributed, provided that no fee is assigned and that the advisory is not modified in any way.


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top