[15240] in bugtraq

home help back first fref pref prev next nref lref last post

New Allaire ColdFusion DoS

daemon@ATHENA.MIT.EDU (stuart.mcclure@FOUNDSTONE.COM)
Thu Jun 8 04:06:37 2000

Mime-Version: 1.0
Content-Type: multipart/alternative;
              boundary="----_=_NextPart_001_01BFD045.95E69D30"
Message-Id:  <2153DBA073F0D311911100B0D01A826F05B66E@mail.foundstone.com>
Date:         Wed, 7 Jun 2000 01:59:45 -0400
Reply-To: stuart.mcclure@FOUNDSTONE.COM
From: stuart.mcclure@FOUNDSTONE.COM
To: BUGTRAQ@SECURITYFOCUS.COM

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01BFD045.95E69D30
Content-Type: text/plain;
	charset="ISO-8859-1"

                                Foundstone, Inc.
                           http://www.foundstone.com
                          "Securing the Dot Com World"

                               Security Advisory

                             Allaire's ColdFusion

----------------------------------------------------------------------------
---------
FS Advisory ID:         FS-060700-1-CFM

Release Date:           June 7, 2000

Product:                ColdFusion Web Application Server

Vendor:                 Allaire Corporation (http://www.allaire.com)

Vendor Advisory:        http://www.allaire.com/security

Type:                   Denial of service attack

Severity:               Medium to High

Author:                 Stuart McClure (stuart.mcclure@foundstone.com)
                        Foundstone, Inc. (http://www.foundstone.com)

Operating Systems:      Windows NT, Solaris, HP-UX

Vulnerable versions:    All ColdFusion versions up through and including
4.5.1.

Foundstone advisory:    http://www.foundstone.com
----------------------------------------------------------------------------
---------

Description

        A denial of service vulnerability exists within the Allaire
ColdFusion
        web application server which allows an attacker to overwhelm the web
server
        and deny legitimate web page requests.

Details

        The problem lies within the ColdFusion mechanism that manages the
parsing of
        passwords within authentication requests. This problem makes the
ColdFusion
        Administrator login page vulnerable to a denial of service attack.
The denial
        of service occurs during the process of converting the input
password and the
        stored password into forms suitable for comparison when the input
password is
        very large (>40,000 characters).

Proof of Concept

        Use the well-known HTML tag field overflow technique to overflow the
HTML
        password field on the Administrator login page:

                http://vulnerable.server.here/cfide/administrator/index.cfm

        The attacker simply changes the field size and POST action in the
HTML tags on
        the page to allow a large string (over 40,000 characters) to be
submitted to
        the ColdFusion server. Small input strings may not immediately crash
the
        system but large enough strings will bring the system to a halt.

Solution

        Workaround

        Allaire provides the following workaround: Customers should back up
all
        existing data and implement the recommendations made in the article,

        'Securing the ColdFusion Administrator (10954)'. This should resolve
the
        issue. The article can be found at

        http://www.allaire.com/Handlers/index.cfm?ID=10954&Method=Full

        Fix

        A fix is expected in the future release of ColdFusion 4.6 (Q4,2000).

Credit

        We would like to thank Allaire for their prompt and serious
attention to the
        problem.

Disclaimer

        THE INFORMATION CONTAINED IN THIS ADVISORY IS THE COPYRIGHT (C) 2000
OF
        FOUNDSTONE, INC. AND BELIEVED TO BE ACCURATE AT THE TIME OF
PRINTING,
        BUT NO REPRESENTATION OR WARRANTY IS GIVEN, EXPRESS OR IMPLIED, AS
TO
        ITS ACCURACY OR COMPLETENESS.  NEITHER THE AUTHOR NOR THE PUBLISHER
        ACCEPTS ANY LIABILITY WHATSOEVER FOR ANY DIRECT, INDIRECT OR
        CONSEQUENTIAL LOSS OR DAMAGE ARISING IN ANY WAY FROM ANY USE OF, OR
        RELIANCE PLACED ON, THIS INFORMATION FOR ANY PURPOSE. THIS ADVISORY
MAY BE
        REDISTRIBUTED PROVIDED THAT NO FEE IS ASSIGNED AND THAT THE ADVISORY
IS NOT
        MODIFIED IN ANY WAY.


------_=_NextPart_001_01BFD045.95E69D30
Content-Type: text/html;
	charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3DISO-8859-1">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2650.12">
<TITLE>New Allaire ColdFusion DoS</TITLE>
</HEAD>
<BODY>

<P><FONT =
SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Foundstone, =
Inc.</FONT>
<BR><FONT =
SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp; <A HREF=3D"http://www.foundstone.com" =
TARGET=3D"_blank">http://www.foundstone.com</A></FONT>
<BR><FONT =
SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp; &quot;Securing the Dot Com =
World&quot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </FONT>
<BR><FONT =
SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp; </FONT>
<BR><FONT =
SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Security Advisory</FONT>
</P>

<P><FONT =
SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Allaire's ColdFusion</FONT>
</P>

<P><FONT =
SIZE=3D2>---------------------------------------------------------------=
----------------------</FONT>
<BR><FONT SIZE=3D2>FS Advisory =
ID:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
FS-060700-1-CFM</FONT>
</P>

<P><FONT SIZE=3D2>Release =
Date:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; June =
7, 2000</FONT>
</P>

<P><FONT =
SIZE=3D2>Product:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ColdFusion Web Application =
Server</FONT>
</P>

<P><FONT =
SIZE=3D2>Vendor:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Allaire Corporation (<A =
HREF=3D"http://www.allaire.com" =
TARGET=3D"_blank">http://www.allaire.com</A>)</FONT>
</P>

<P><FONT SIZE=3D2>Vendor =
Advisory:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <A =
HREF=3D"http://www.allaire.com/security" =
TARGET=3D"_blank">http://www.allaire.com/security</A></FONT>
</P>

<P><FONT =
SIZE=3D2>Type:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Denial of service =
attack</FONT>
</P>

<P><FONT =
SIZE=3D2>Severity:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Medium to High</FONT>
</P>

<P><FONT =
SIZE=3D2>Author:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Stuart McClure =
(stuart.mcclure@foundstone.com)</FONT>
<BR><FONT =
SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp; Foundstone, Inc. (<A HREF=3D"http://www.foundstone.com" =
TARGET=3D"_blank">http://www.foundstone.com</A>)</FONT>
</P>

<P><FONT SIZE=3D2>Operating Systems:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
Windows NT, Solaris, HP-UX</FONT>
</P>

<P><FONT SIZE=3D2>Vulnerable versions:&nbsp;&nbsp;&nbsp; All ColdFusion =
versions up through and including 4.5.1.</FONT>
</P>

<P><FONT SIZE=3D2>Foundstone advisory:&nbsp;&nbsp;&nbsp; <A =
HREF=3D"http://www.foundstone.com" =
TARGET=3D"_blank">http://www.foundstone.com</A></FONT>
<BR><FONT =
SIZE=3D2>---------------------------------------------------------------=
----------------------</FONT>
</P>

<P><FONT SIZE=3D2>Description</FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; A denial =
of service vulnerability exists within the Allaire ColdFusion </FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; web =
application server which allows an attacker to overwhelm the web =
server</FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; and deny =
legitimate web page requests.</FONT>
</P>

<P><FONT SIZE=3D2>Details</FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The =
problem lies within the ColdFusion mechanism that manages the parsing =
of </FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; passwords =
within authentication requests. This problem makes the ColdFusion =
</FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
Administrator login page vulnerable to a denial of service attack. The =
denial </FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; of =
service occurs during the process of converting the input password and =
the </FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; stored =
password into forms suitable for comparison when the input password is =
</FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; very =
large (&gt;40,000 characters).</FONT>
</P>

<P><FONT SIZE=3D2>Proof of Concept</FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Use the =
well-known HTML tag field overflow technique to overflow the HTML =
</FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; password =
field on the Administrator login page:</FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </FONT>
<BR><FONT =
SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp; <A =
HREF=3D"http://vulnerable.server.here/cfide/administrator/index.cfm" =
TARGET=3D"_blank">http://vulnerable.server.here/cfide/administrator/inde=
x.cfm</A> </FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The =
attacker simply changes the field size and POST action in the HTML tags =
on </FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; the page =
to allow a large string (over 40,000 characters) to be submitted to =
</FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; the =
ColdFusion server. Small input strings may not immediately crash the =
</FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; system =
but large enough strings will bring the system to a halt.</FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </FONT>
<BR><FONT SIZE=3D2>Solution</FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
Workaround</FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Allaire =
provides the following workaround: Customers should back up all </FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; existing =
data and implement the recommendations made in the article, </FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 'Securing =
the ColdFusion Administrator (10954)'. This should resolve the </FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; issue. =
The article can be found at </FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <A =
HREF=3D"http://www.allaire.com/Handlers/index.cfm?ID=3D10954&Method=3DFu=
ll" =
TARGET=3D"_blank">http://www.allaire.com/Handlers/index.cfm?ID=3D10954&M=
ethod=3DFull</A></FONT>
</P>

<P><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Fix</FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; A fix is =
expected in the future release of ColdFusion 4.6 (Q4,2000).</FONT>
</P>

<P><FONT SIZE=3D2>Credit</FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; We would =
like to thank Allaire for their prompt and serious attention to the =
</FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
problem.</FONT>
</P>

<P><FONT SIZE=3D2>Disclaimer</FONT>
</P>

<P><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; THE =
INFORMATION CONTAINED IN THIS ADVISORY IS THE COPYRIGHT (C) 2000 OF =
</FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
FOUNDSTONE, INC. AND BELIEVED TO BE ACCURATE AT THE TIME OF PRINTING, =
</FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; BUT NO =
REPRESENTATION OR WARRANTY IS GIVEN, EXPRESS OR IMPLIED, AS TO </FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ITS =
ACCURACY OR COMPLETENESS.&nbsp; NEITHER THE AUTHOR NOR THE PUBLISHER =
</FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ACCEPTS =
ANY LIABILITY WHATSOEVER FOR ANY DIRECT, INDIRECT OR</FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
CONSEQUENTIAL LOSS OR DAMAGE ARISING IN ANY WAY FROM ANY USE OF, =
OR</FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; RELIANCE =
PLACED ON, THIS INFORMATION FOR ANY PURPOSE. THIS ADVISORY MAY =
BE</FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
REDISTRIBUTED PROVIDED THAT NO FEE IS ASSIGNED AND THAT THE ADVISORY IS =
NOT</FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; MODIFIED =
IN ANY WAY.</FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </FONT>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01BFD045.95E69D30--

home help back first fref pref prev next nref lref last post