Overview
- Description
- administrator.cfc in Adobe ColdFusion 9.0, 9.0.1, 9.0.2, and 10 allows remote attackers to bypass authentication and possibly execute arbitrary code by logging in to the RDS component using the default empty password and leveraging this session to access the administrative web interface, as exploited in the wild in January 2013.
- Source
- psirt@adobe.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
CVSS 2.0
- Type
- Primary
- Base score
- 10
- Impact score
- 10
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:C/A:C
Known exploits
Data from CISA
- Vulnerability name
- Adobe ColdFusion Authentication Bypass Vulnerability
- Exploit added on
- Mar 3, 2022
- Exploit action due
- Mar 24, 2022
- Required action
- Apply updates per vendor instructions.
Weaknesses
- nvd@nist.gov
- CWE-276
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:coldfusion:9.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "113431FB-E4BE-4416-800C-6B13AD1C0E92" }, { "criteria": "cpe:2.3:a:adobe:coldfusion:9.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7FBC38B4-D957-4645-BA96-E99975271482" }, { "criteria": "cpe:2.3:a:adobe:coldfusion:9.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CD9AAAA5-231A-43BE-AD00-0918F0C9F90C" }, { "criteria": "cpe:2.3:a:adobe:coldfusion:10.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3FAE2BA4-7CD9-4CBD-9D77-56D591FBDB24" } ], "operator": "OR" } ] } ]