CVE-2023-26360 – Adobe ColdFusion Arbitrary Code Execution
No PoC has been released so far, however, after further investigation, the Imperva Threat Research team created effective mitigation against this vulnerability.
Over the past few days, we observed hundreds of exploitation attempts successfully thwarted by Imperva Cloud WAF and Imperva WAF Gateway (customer-managed WAF).
Most exploitation attempts were carried out by automated hacking tools written in the Go programming language.
The attackers tried to read sensitive files from the ColdFusion servers like:
- Neo-runtime.xml
- Seed.properties
- Password.properties
We also observed attempts to upload a malicious web shell onto the servers. These files were stored as text, however, once uploaded to the server, it was converted into a CFM script that could result in remote code execution.Given existing blocking rules that mitigate the CVE-2023-26360 Adobe ColdFusion vulnerability, this new CVE is mitigated by both Imperva Cloud WAF and Imperva WAF Gateway.
As always, Imperva Threat Research is monitoring the situation and will provide updates as new information emerges.
Comments
Post a Comment