Adobe ColdFusion Authentication Bypass (APSB13-13)

critical Nessus Plugin ID 66407


A web management interface on the remote host has an authentication bypass vulnerability.


The version of Adobe ColdFusion running on the remote host has an authentication bypass vulnerability. When RDS is disabled and not configured with password protection, it is possible to authenticate as an administrative user without providing a username or password. A remote, unauthenticated attacker can exploit this to gain administrative access to the ColdFusion Administrator interface. After authenticating, it is possible to write arbitrary files to the host, resulting in arbitrary code execution.

All versions of ColdFusion 10 are affected. ColdFusion 9, 9.0.1, and 9.0.2 are only affected when the hotfixes for APSB13-03 have been applied and web.xml is configured to allow access to the RDS servlet.


Apply the appropriate hotfix referenced in Adobe security bulletin APSB13-13.

See Also

Plugin Details

Severity: Critical

ID: 66407

File Name: coldfusion_apsb13-13.nasl

Version: 1.13

Type: remote

Family: CGI abuses

Published: 5/14/2013

Updated: 1/19/2021

Risk Information


Risk Factor: Medium

Score: 5.9


Risk Factor: Critical

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:adobe:coldfusion

Required KB Items: installed_sw/ColdFusion

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Patch Publication Date: 5/14/2013

Vulnerability Publication Date: 5/14/2013

Reference Information

CVE: CVE-2013-1389

BID: 59849