CVE-2017-3066 - Deserialization of Untrusted Data

Severity

98%

Complexity

39%

Confidentiality

98%

Adobe ColdFusion 2016 Update 3 and earlier, ColdFusion 11 update 11 and earlier, ColdFusion 10 Update 22 and earlier have a Java deserialization vulnerability in the Apache BlazeDS library. Successful exploitation could lead to arbitrary code execution.

Adobe ColdFusion 2016 Update 3 and earlier, ColdFusion 11 update 11 and earlier, ColdFusion 10 Update 22 and earlier have a Java deserialization vulnerability in the Apache BlazeDS library. Successful exploitation could lead to arbitrary code execution.

CVSS 3.0 Base Score 9.8. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

CVSS 2.0 Base Score 7.5. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P).

CVSS 3.1 Base Score 9.8. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

CVSS 2.0 Base Score 9.9. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C).

Demo Examples

Deserialization of Untrusted Data

CWE-502

This code snippet deserializes an object from a file and uses it as a UI button:


               
}
in.close();

This code does not attempt to verify the source or contents of the file before deserializing it. An attacker may be able to replace the intended file with a file that contains arbitrary malicious code which will be executed when the button is pressed.

To mitigate this, explicitly define final readObject() to prevent deserialization. An example of this is:


               
throw new java.io.IOException("Cannot be deserialized"); }

Deserialization of Untrusted Data

CWE-502

In Python, the Pickle library handles the serialization and deserialization processes. In this example derived from [R.502.7], the code receives and parses data, and afterwards tries to authenticate a user based on validating a token.


               
}
raise AuthFail

Unfortunately, the code does not verify that the incoming data is legitimate. An attacker can construct a illegitimate, serialized object "AuthToken" that instantiates one of Python's subprocesses to execute arbitrary commands. For instance,the attacker could construct a pickle that leverages Python's subprocess module, which spawns new processes and includes a number of arguments for various uses. Since Pickle allows objects to define the process for how they should be unpickled, the attacker can direct the unpickle process to call Popen in the subprocess module and execute /bin/sh.

Overview

Type

Adobe ColdFusion

First reported 7 years ago

2017-04-27 14:59:00

Last updated 4 years ago

2020-05-15 14:29:00

Affected Software

Adobe ColdFusion 10.0

10.0

Adobe ColdFusion 10.0 Update 1

10.0

Adobe ColdFusion 10.0 Update 10

10.0

Adobe ColdFusion 10.0 Update 11

10.0

Adobe ColdFusion 10.0 Update 12

10.0

Adobe ColdFusion 10.0 Update 13

10.0

Adobe ColdFusion 10.0 Update 14

10.0

Adobe ColdFusion 10.0 Update 15

10.0

Adobe ColdFusion 10.0 Update 16

10.0

Adobe ColdFusion 10.0 Update 17

10.0

Adobe ColdFusion 10.0 Update 18

10.0

Adobe ColdFusion 10.0 Update 19

10.0

Adobe ColdFusion 10.0 Update 2

10.0

Adobe ColdFusion 10.0 Update 20

10.0

Adobe ColdFusion 10.0 Update 21

10.0

Adobe ColdFusion 10.0 Update 22

10.0

Adobe ColdFusion 10.0 Update 3

10.0

Adobe ColdFusion 10.0 Update 4

10.0

Adobe ColdFusion 10.0 Update 5

10.0

Adobe ColdFusion 10.0 Update 6

10.0

Adobe ColdFusion 10.0 Update 7

10.0

Adobe ColdFusion 10.0 Update 8

10.0

Adobe ColdFusion 10.0 Update 9

10.0

Adobe ColdFusion 11.0

11.0

Adobe ColdFusion 11.0 Update 1

11.0

Adobe ColdFusion 11.0 Update 10

11.0

Adobe ColdFusion 11.0 Update 11

11.0

Adobe ColdFusion 11.0 Update 2

11.0

Adobe ColdFusion 11.0 Update 3

11.0

Adobe ColdFusion 11.0 Update 4

11.0

Adobe ColdFusion 11.0 Update 5

11.0

Adobe ColdFusion 11.0 Update 6

11.0

Adobe ColdFusion 11.0 Update 7

11.0

Adobe ColdFusion 11.0 Update 8

11.0

Adobe ColdFusion 11.0 Update 9

11.0

Adobe ColdFusion 2016

2016

Adobe ColdFusion 2016 Update 1

2016

Adobe ColdFusion 2016 Update 2

2016

Adobe ColdFusion 2016 Update 3

2016

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.