Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> Macromedia ColdFusion MX Path Disclosure Vulnerability


Vulnerability Assessment Details

Macromedia ColdFusion MX Path Disclosure Vulnerability

Vulnerability Assessment Summary
Macromedia ColdFusion MX Path Disclosure Vulnerability

Detailed Explanation for this Vulnerability Assessment

A vulnerability has been reported for Macromedia ColdFusion MX that
may reveal the physical path information to attackers.

When certain malformed URL requests (port 8500) are received by the server, an
error message is returned containing the full path of the ColdFusion
installation.

Solution : Change the 'Debugging Settings' on the Administrator console
of the ColdFusion server. This can be achieved by disabling the 'Enable
Robust Exception Information' option.

Network Security Threat Level: Low

Networks Security ID: 7443

Vulnerability Assessment Copyright: This script is Copyright (C) 2003 A.D.Consulting France

Cables, Connectors

Intel Xeon 5150 2.66 GHz Dual-Core (HH80556KJ0674M) Processor
$40.0
Intel Xeon 5150 2.66 GHz Dual-Core (HH80556KJ0674M) Processor pictureDell PowerEdge R610 2x X5690 3.46GHz 6 Core 32GB 6x 300GB 10K SAS PERC H700
$1362.0
Dell PowerEdge R610 2x X5690 3.46GHz 6 Core 32GB 6x 300GB 10K SAS PERC H700 pictureDELL POWEREDGE R710 X5675 3.06GHZ 24GB 3 X 600GB 10K SAS PERC 6/I
$909.0
DELL POWEREDGE R710 X5675 3.06GHZ 24GB 3 X 600GB 10K SAS PERC 6/I pictureDELL POWEREDGE R730 8 BAY E5-2640V4 2.4GHZ 256GB 3 X 900GB 10K 12G H730
$5929.0
DELL POWEREDGE R730 8 BAY E5-2640V4 2.4GHZ 256GB 3 X 900GB 10K 12G H730 picture


Discussions

No Discussions have been posted on this vulnerability.