Rapid7 Vulnerability & Exploit Database

ColdFusion Server Check

Back to Search

ColdFusion Server Check

Created
05/30/2018

Description

This module attempts to exploit the directory traversal in the 'locale' attribute. According to the advisory the following versions are vulnerable: ColdFusion MX6 6.1 base patches, ColdFusion MX7 7,0,0,91690 base patches, ColdFusion MX8 8,0,1,195765 base patches, ColdFusion MX8 8,0,1,195765 with Hotfix4. Adobe released patches for ColdFusion 8.0, 8.0.1, and 9 but ColdFusion 9 is reported to have directory traversal protections in place, subsequently this module does NOT work against ColdFusion 9. Adobe did not release patches for ColdFusion 6.1 or ColdFusion 7. It is not recommended to set FILE when doing scans across a group of servers where the OS may vary; otherwise, the file requested may not make sense for the OS

Author(s)

  • CG <cg@carnal0wnage.com>
  • nebulus

Development

References

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use auxiliary/scanner/http/coldfusion_locale_traversal
msf auxiliary(coldfusion_locale_traversal) > show actions
    ...actions...
msf auxiliary(coldfusion_locale_traversal) > set ACTION < action-name >
msf auxiliary(coldfusion_locale_traversal) > show options
    ...show and set options...
msf auxiliary(coldfusion_locale_traversal) > run 

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security

;