Adobe ColdFusion Authentication Bypass (APSB13-13) (intrusive check)

high Nessus Plugin ID 66408
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


A web management interface on the remote host has an authentication bypass vulnerability.


The version of Adobe ColdFusion running on the remote host has an authentication bypass vulnerability. When RDS is disabled and not configured with password protection, it is possible to authenticate as an administrative user without providing a username or password. A remote, unauthenticated attacker can exploit this to gain administrative access to the ColdFusion Administrator interface. After authenticating, it is possible to write arbitrary files to the host, resulting in arbitrary code execution.

All versions of ColdFusion 10 are affected. ColdFusion 9, 9.0.1, and 9.0.2 are only affected when the hotfixes for APSB13-03 have been applied and web.xml is configured to allow access to the RDS servlet.

This plugin exploits the vulnerability by creating a .cfm file to execute arbitrary code.


Apply the appropriate hotfix referenced in Adobe security bulletin APSB13-13.

See Also

Plugin Details

Severity: High

ID: 66408

File Name: coldfusion_apsb13-13_rce.nasl

Version: 1.16

Type: remote

Family: CGI abuses

Published: 5/14/2013

Updated: 1/19/2021

Dependencies: coldfusion_detect.nasl, coldfusion_rds_detect.nasl

Risk Information


Risk Factor: Medium

Score: 6.7


Risk Factor: Critical

Base Score: 10

Temporal Score: 7.8

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: E:POC/RL:OF/RC:C


Risk Factor: High

Base Score: 8.8

Temporal Score: 7.9

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:adobe:coldfusion

Required KB Items: installed_sw/ColdFusion

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Patch Publication Date: 5/14/2013

Vulnerability Publication Date: 5/14/2013

Reference Information

CVE: CVE-2013-1389

BID: 59849

TRA: TRA-2013-04

CERT: 113732

EDB-ID: 25305