[原文]ColdFusion 6.1 Updater 1 places Java .class files under the web root in the /WEB-INF/cfclasses directory, which allows remote attackers to obtain sensitive information.
Macromedia ColdFusion MX Updater 1, for JRun4 configurations only, contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered when requests compile .cfms and .cfcs and place the .class files under the web server root in a newly created /WEB-INF/cfclassess directory, which will disclose sensitive class file information resulting in a loss of confidentiality.
-
时间线
2005-04-07
Unknow
2005-04-07
Unknow
-
解决方案
Currently, there are no known upgrades or patches to correct this issue. It is possible to correct the flaw by implementing the following workaround(s):
1 - Stop ColdFusion MX 6.1 server.
2 - Install the ColdFusion MX 6.1 Updater
If the ColdFusion MX 6.1 updater has previously been applied, delete the existing /WEB-INF/ directory under the web server root.
For Microsoft IIS, the default is /inetpub/wwwroot/, for Apache, /apache/htdocs/ and for IPlanet/SunOne /{iPlanet | SunOne}/servers/docs/
3 - Create the /servers/cfusion/cfusion-ear/cfusion-war/WEB-INF/cfclasses directory
4 - Start ColdFusion MX 6.1 server.
Verify that when .cfms are invoked, the .class files are placed in the /servers/cfusion/cfusion-ear/cfusion-war/WEB-INF/cfclasses directory.
Sean Waddell is credited with the discovery of this issue.
-
受影响的程序版本
Macromedia ColdFusion Server MX 6.1
-
漏洞讨论
A remote file disclosure vulnerability affects Macromedia ColdFusion MX. The problem presents itself due to a design error that causes potentially sensitive files to be stored in insecure locations.
An attacker may leverage this issue to gain access to compiled Java class files processed by the affected application server. This may facilitate further attacks and application code disclosure.
-
漏洞利用
No exploit is required to leverage this issue.
-
解决方案
The vendor has reported that this issue will be resolved in the next release of the affected Updater. This BID will be updated as details are released.
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.