Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> ColdFusion Path Disclosure


Vulnerability Assessment Details

ColdFusion Path Disclosure

Vulnerability Assessment Summary
Checks for a ColdFusion vulnerability

Detailed Explanation for this Vulnerability Assessment

It is possible to make the remote web server
disclose the physical path to its web root by
requesting a MS-DOS device ending in .dbm (as
in nul.dbm).

Solution :
The vendor suggests turning on 'Check that file exists' :

Windows 2000:
1. Open the Management console
2. Click on 'Internet Information Services'
3. Right-click on the website and select 'Properties'
4. Select 'Home Directory'
5. Click on 'Configuration'
6. Select '.cfm'
7. Click on 'Edit'
8. Make sure 'Check that file exists' is checked
9. Do the same for '.dbm'

Network Security Threat Level: Low

Networks Security ID: 4542

Vulnerability Assessment Copyright: This script is Copyright (C) 2003 Renaud Deraison

Cables, Connectors

LSI Logic SAS3801E 8-Port External Raid Adapter Controller Card L3-01123-04D
$8.99
LSI Logic SAS3801E 8-Port External Raid Adapter Controller Card L3-01123-04D pictureLSI Logic SAS3801E 8-Port External Raid Adapter Controller Card L3-01123-04E
$8.99
LSI Logic SAS3801E 8-Port External Raid Adapter Controller Card L3-01123-04E pictureSupermicro AOC-USAS2-L8e 6Gb/s 8-Port SAS Internal RAID Adapter
$29.86
Supermicro AOC-USAS2-L8e 6Gb/s 8-Port SAS Internal RAID Adapter pictureDell Adaptec AAR-2610SA/64MB 6 Port PCI-X SATA RAID Controller with 6 Cables
$9.3
Dell Adaptec AAR-2610SA/64MB 6 Port PCI-X SATA RAID Controller with 6 Cables  picture


Discussions

No Discussions have been posted on this vulnerability.