ColdFusion MX Null Byte Tag XSS Protection Bypass

medium Nessus Plugin ID 24279

Synopsis

A web-based application running on the remote web server is affected by a cross-site scripting vulnerability.

Description

The version of Adobe ColdFusion running on the remote host is affected by a cross-site scripting vulnerability due to a failure to completely sanitize user-supplied input before using it to generate dynamic content. A remote, unauthenticated attacker can leverage this issue to inject arbitrary HTML or script code into a user's browser to be executed within the security context of the affected site.

Solution

Update to ColdFusion MX 7.0.2 if necessary and apply the hotfix referenced in the vendor advisory above.

See Also

https://seclists.org/fulldisclosure/2006/Dec/210

https://www.adobe.com/support/security/bulletins/apsb07-06.html

Plugin Details

Severity: Medium

ID: 24279

File Name: coldfusion_xss_protection_bypass.nasl

Version: 1.25

Type: remote

Published: 2/6/2007

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.0

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: cpe:/a:adobe:coldfusion

Required KB Items: installed_sw/ColdFusion

Exploit Ease: No exploit is required

Exploited by Nessus: true

Patch Publication Date: 3/13/2007

Vulnerability Publication Date: 12/10/2006

Reference Information

CVE: CVE-2006-6483

BID: 21532

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990