Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> ColdFusion Path Disclosure


Vulnerability Assessment Details

ColdFusion Path Disclosure

Vulnerability Assessment Summary
Checks for a ColdFusion vulnerability

Detailed Explanation for this Vulnerability Assessment

It is possible to make the remote web server
disclose the physical path to its web root by
requesting a MS-DOS device ending in .dbm (as
in nul.dbm).

Solution :
The vendor suggests turning on 'Check that file exists' :

Windows 2000:
1. Open the Management console
2. Click on 'Internet Information Services'
3. Right-click on the website and select 'Properties'
4. Select 'Home Directory'
5. Click on 'Configuration'
6. Select '.cfm'
7. Click on 'Edit'
8. Make sure 'Check that file exists' is checked
9. Do the same for '.dbm'

Network Security Threat Level: Low

Networks Security ID: 4542

Vulnerability Assessment Copyright: This script is Copyright (C) 2003 Renaud Deraison

Cables, Connectors

Cisco VT Camera II Computer Web Cam CUVA-V2/74-4600-01
$18.97
Cisco VT Camera II Computer Web Cam CUVA-V2/74-4600-01 pictureCisco Linksys WRT120N Wireless-N Home Router
$0.99
Cisco Linksys WRT120N Wireless-N Home Router pictureCisco Lab, Two Cisco 2611 Routers with Serial WIC, One 2950-12 Switch,
$110.0
Cisco Lab, Two Cisco 2611 Routers with Serial WIC, One 2950-12 Switch,  pictureCisco M20 Valet Plus 4-Port Wireless Router - White
$18.99
Cisco M20 Valet Plus 4-Port Wireless Router - White picture


Discussions

No Discussions have been posted on this vulnerability.