News Stay informed about the latest enterprise technology news and product updates.

Adobe ColdFusion websites being compromised

Popular websites run by Simon & Schuster, Crayola, FAO Schwarz and others could be at risk. A flaw in the ColdFusion rich text editor is being actively exploited, Adobe says.
To get security news and tips delivered to your inbox, click here to sign up for our free newsletter.

Adobe Systems Inc. is warning users of its ColdFusion application development platform of a vulnerability being actively targeted by attackers to compromise websites.

A zero-day vulnerability in theColdFusion FCKeditor rich text editor enables users to compromise websites and view and edit files, Adobe said in its Adobe Product Security Incident Response Team (PSIRT) blog. The rich text editor is installed with ColdFusion 8. It is also used in earlier versions. A patch is expected to be released next week, Adobe said.

The SANS Internet Storm Center reported last week that attackers have been exploiting websites which have older installations of some ColdFusion applications.

"The vulnerable installations allow the attackers to upload ASP or Cold Fusion shells which further allow them to take complete control over the server," wrote Bojan Zdrnja, a SANS ISC handler.

Zdrnja said a common application that has been seen in attacks is CFWebstore, a popular e-commerce application for ColdFusion.

The application development platform was acquired by Adobe in 2005. It is used in many websites that use rich forms to collect and share data. It supports Ajax applications and frameworks and integrates with dynamic PDF documents. Popular websites run by Simon & Schuster Inc., Crayola LLC and FAO Schwarz Inc. are run using ColdFusion.

The software maker issued a workaround until a fix is released.

  • Disable connectors by setting config.Enabled to false in the editor/filemanager/connectors/cfm/config.cfm file.
  • Remove unused cfm files under editor/filemanager/connectors/cfm directory of the FCKeditor.
  • Inspect FCKeditor directories for content that has already been uploaded. The uploaded files go under the directory specified in the config.UserFilesPath set in config.cfm.

Dig Deeper on Application attacks (buffer overflows, cross-site scripting)

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.