menu arrow_back 湛蓝安全空间 |狂野湛蓝,暴躁每天 chevron_right All_wiki chevron_right Vulnerability-棱角社区(Vulnerability)项目漏洞-20210715 chevron_right Adobe ColdFusion 远程代码执行漏洞(CVE-2021-21087).md
  • home 首页
  • brightness_4 暗黑模式
  • cloud
    xLIYhHS7e34ez7Ma
    cloud
    湛蓝安全
    code
    Github
    Adobe ColdFusion 远程代码执行漏洞(CVE-2021-21087).md
    1.22 KB / 2021-05-21 09:14:38
        # Adobe ColdFusion 远程代码执行漏洞(CVE-2021-21087)
    
    Adobe ColdFusion是一个快速应用程序开发平台。。Adobe ColdFusion 存在远程代码执行漏洞,由于过滤不严,未经授权的攻击者可构造恶意请求,造成任意代码执行,控制服务器。建议相关用户尽快采取安全措施阻止漏洞攻击。
    
    影响范围
    
    * Adobe ColdFusion 2021 <= Version 2021.0.0.323925
    * Adobe ColdFusion 2018 <= Update 10
    * Adobe ColdFusion 2016 <= Update 16
    
    FOFA:
    
    ```
    app="Adobe-ColdFusion"
    ```
    
    PoC:
    
    ```
      - method: GET
        path:
          - "{{BaseURL}}/cf_scripts/scripts/ajax/package/cfajax.js"
          - "{{BaseURL}}/cf-scripts/scripts/ajax/package/cfajax.js"
          - "{{BaseURL}}/CFIDE/scripts/ajax/package/cfajax.js"
          - "{{BaseURL}}/cfide/scripts/ajax/package/cfajax.js"
          - "{{BaseURL}}/CF_SFSD/scripts/ajax/package/cfajax.js"
          - "{{BaseURL}}/cfide-scripts/ajax/package/cfajax.js"
          - "{{BaseURL}}/cfmx/CFIDE/scripts/ajax/package/cfajax.js"
    
    regex:
              - 'eval\(\"\(\"\+json\+\"\)\"\)'
    ```
    
    ref:
    
    * https://nosec.org/home/detail/4707.html
    * https://github.com/projectdiscovery/nuclei-templates/pull/1128/files
    * https://helpx.adobe.com/security/products/coldfusion/apsb21-16.html
    
    links
    file_download