My Blog

Security updates available for ColdFusion | APSB19-47

Bulletin ID Date Published Priority
APSB19-47 September 24, 2019 2

Summary

Adobe has released security updates for ColdFusion versions 2018 and 2016. These updates resolve two critical and one important vulnerability that could lead to arbitrary code execution.

Affected Versions

Product Affected Versions Platform
ColdFusion 2018 Update 4 and earlier versions All
ColdFusion 2016 Update 11 and earlier versions All

Solution

Adobe categorizes these updates with the following priority rating and recommends users update their installations to the newest versions:

Product Updated Version Platform Priority rating Availability
ColdFusion 2018 Update 5 All 2 Tech note
ColdFusion 2016 Update 12 All 2 Tech note

NOTE:

The security updates referenced in the above Tech Notes require JDK 8u121 or higher (for ColdFusion 2016). Adobe recommends updating your ColdFusion JDK/JRE to the latest version. Applying the ColdFusion update without a corresponding JDK update will NOT secure the server.  See the relevant Tech Notes for more details.

Adobe recommends customers apply the security configuration settings as outlined on the ColdFusion Security page as well as review the respective Lockdown guides.

Vulnerability Details

Vulnerability Category Vulnerability Impact Severity CVE Numbers
Security bypass Information Disclosure Important CVE-2019-8072
Command Injection via Vulnerable component Arbitrary code execution Critical CVE-2019-8073
Path Traversal Vulnerability Access Control Bypass Critical CVE-2019-8074

Acknowledgements

Adobe would like to thank the following individuals and organizations for reporting these issues and for working with Adobe to help protect our customers:

  • Pete Freitag / Foundeo Inc. (https://foundeo.com/) (CVE-2019-8072)
  • Badcode of Knownsec 404 Team (CVE-2019-8073)
  • Daniel Underhay of Aura Information Security (CVE-2019-8074) and special thanks to Ben Reid of Techlegalia Pty. Ltd. and Pete Freitag, Foundeo Inc. (https://foundeo.com/) for their help in the investigation of the issue.

ColdFusion JDK Requirement

COLDFUSION 2018 HF1 and above

For Application Servers

On JEE installations, set the following JVM flag, « -Djdk.serialFilter= !org.mozilla.**;!com.sun.syndication.**;!org.apache.commons.beanutils.** », in the respective startup file depending on the type of Application Server being used.

For example:

Apache Tomcat Application Server: edit JAVA_OPTS in the ‘Catalina.bat/sh’ file

WebLogic Application Server:  edit JAVA_OPTIONS in the ‘startWeblogic.cmd’ file

WildFly/EAP Application Server:  edit JAVA_OPTS in the ‘standalone.conf’ file

Set the JVM flags on a JEE installation of ColdFusion, not on a standalone installation.

COLDFUSION 2016 HF7 and above

This security update requires ColdFusion to be on JDK 8u121 or higher.   Adobe recommends that you must manually update your ColdFusion JDK/JRE to the latest version. In case you do not update the JDK/JRE, simply applying the update would NOT secure the server.

For Application Servers

Additionally, on JEE installations, set the following JVM flag, « -Djdk.serialFilter= !org.mozilla.**;!com.sun.syndication.**;!org.apache.commons.beanutils.** », in the respective startup file depending on the type of Application Server being used.

For example:

On Apache Tomcat Application Server, edit JAVA_OPTS in the ‘Catalina.bat/sh’ file

On WebLogic Application Server, edit JAVA_OPTIONS in the ‘startWeblogic.cmd’ file

On a WildFly/EAP Application Server, edit JAVA_OPTS in the ‘standalone.conf’ file

Set the JVM flags on a JEE installation of ColdFusion, not on a standalone installation

my-tracker_cpteSecurity updates available for ColdFusion | APSB19-47