Adobe ColdFusion login.cfm Query String XSS (APSB11-04)

medium Nessus Plugin ID 51955
New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it is different from CVSS.

VPR Score: 3

Synopsis

A web application on the remote host has is affected by a cross-site scripting vulnerability.

Description

The version of Adobe ColdFusion running on the remote host has is affected by a cross-site scripting vulnerability in the administrative web interface. Input to the query string of 'administrator/login.cfm' is not properly sanitized before being returned in an HTML response.

A remote attacker can exploit this by tricking a user into making a specially crafted request, resulting in the execution of arbitrary script code.

This version of ColdFusion likely has several other vulnerabilities, although Nessus has not checked for those issues.

Solution

Apply the hotfix referenced in Adobe's advisory.

See Also

https://www.adobe.com/support/security/bulletins/apsb11-04.html

http://www.nessus.org/u?9dd494b2

Plugin Details

Severity: Medium

ID: 51955

File Name: coldfusion_login_querystring_xss.nasl

Version: 1.16

Type: remote

Published: 2/11/2011

Updated: 1/19/2021

Risk Information

Risk Factor: Medium

VPR Score: 3

CVSS v2.0

Base Score: 4.3

Temporal Score: 3.7

Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Temporal Vector: E:H/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:adobe:coldfusion

Required KB Items: installed_sw/ColdFusion

Exploit Ease: No exploit is required

Exploited by Nessus: true

Patch Publication Date: 2/8/2011

Vulnerability Publication Date: 2/8/2011

Reference Information

CVE: CVE-2011-0580

BID: 46273

CWE: 20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990