module

ColdFusion Server Check

Disclosed
N/A
Created
2018-05-30

Description

This module attempts to exploit the directory traversal in the 'locale'
attribute. According to the advisory the following versions are vulnerable:

ColdFusion MX6 6.1 base patches,
ColdFusion MX7 7,0,0,91690 base patches,
ColdFusion MX8 8,0,1,195765 base patches,
ColdFusion MX8 8,0,1,195765 with Hotfix4.

Adobe released patches for ColdFusion 8.0, 8.0.1, and 9 but ColdFusion 9 is reported
to have directory traversal protections in place, subsequently this module does NOT
work against ColdFusion 9. Adobe did not release patches for ColdFusion 6.1 or
ColdFusion 7.

It is not recommended to set FILE when doing scans across a group of servers where the OS
may vary; otherwise, the file requested may not make sense for the OS

Authors

CG cg@carnal0wnage.com
nebulus

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use auxiliary/scanner/http/coldfusion_locale_traversal
msf auxiliary(coldfusion_locale_traversal) > show actions
...actions...
msf auxiliary(coldfusion_locale_traversal) > set ACTION < action-name >
msf auxiliary(coldfusion_locale_traversal) > show options
...show and set options...
msf auxiliary(coldfusion_locale_traversal) > run

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.