There have been a couple of posts describing the vulnerability using the websocket functionality in ColdFusion 10. The Adobe Product Security Incident Response Team (PSIRT) is aware of this issue and is actively engaged with the ColdFusion Product Team to release a fix. Adobe PSIRT is not aware of this issue being exploited in the wild.
There will be a new update released soon that directly prevents the ability to invoke non-remote methods on the CFC using Websockets.
Awdhesh commented here yesterday but the comment has gone.
I have replied to it on my blog: http://cfmlblog.adamcameron.me/2013/07/response-to-comment-since-redacted-it.html
Fair enough. I raised two issues for the other ones, but flagged them as “security” so I didn’t get the bug IDs and cannot see them. If they’ve not considered part of the security hole, can they be revised so they’re public so I can keep an eye on what you’re doing (or not doing 😉 with them? I created them y/day.
—
Adam
@Aaron: Any action, if required, will come from PSIRT. I will post an update to this blog post if there is an announcement regarding this from PSIRT.
@Adam: Accessing public methods is the root cause. So the fix will most likely focus on addressing that.
Hi Rakshith: that’s good news!
Can you please detail which of these issues you are dealing with:
* web socket requests can access public methods
* web socket requests can access non-web-browsable CFCs
* web socket requests do not trigger Application.cfc event handlers
* web socket requests error if a method have security roles specified
Cheers.
—
Adam
You must be logged in to post a comment.