Vulnerabilities > CVE-1999-0455 - Unspecified vulnerability in Allaire Coldfusion Server 4.0

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
allaire
nessus
exploit available

Summary

The Expression Evaluator sample application in ColdFusion allows remote attackers to read or delete files on the server via exprcalc.cfm, which does not restrict access to the server properly.

Vulnerable Configurations

Part Description Count
Application
Allaire
1

Exploit-Db

descriptionAllaire ColdFusion Server 4.0 Remote File Display, Deletion, Upload and Execution Vulnerability. CVE-1999-0455,CVE-1999-0477. Remote exploits for multiple pl...
idEDB-ID:19093
last seen2016-02-02
modified1998-12-25
published1998-12-25
reporterrain.forest.puppy
sourcehttps://www.exploit-db.com/download/19093/
titleAllaire ColdFusion Server <= 4.0 - Remote File Display / Deletion / Upload / Execution Vulnerability

Nessus

NASL familyCGI abuses
NASL idCOLDFUSION.NASL
descriptionThe
last seen2020-06-01
modified2020-06-02
plugin id10001
published1999-07-09
reporterThis script is Copyright (C) 1999-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/10001
titleColdFusion Multiple Vulnerabilities (File Upload/Manipulation)
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
 script_id(10001);
 script_version("1.48");
 script_cvs_date("Date: 2018/11/15 20:50:16");

 script_cve_id("CVE-1999-0455", "CVE-1999-0477");
 script_bugtraq_id(115);

 script_name(english:"ColdFusion Multiple Vulnerabilities (File Upload/Manipulation)");
 script_summary(english:"Checks for a ColdFusion vulnerability");

 script_set_attribute(attribute:"synopsis", value:
"The remote application server is affected by multiple vulnerabilities.");
 script_set_attribute(attribute:"description", value:
"The 'exprcalc.cfm' page in the version of Cold Fusion Application
Server running on the remote host allows an unauthenticated, remote
attacker to read arbitrary files and possibly delete or upload
arbitrary files as well.");
 script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/1999/Apr/198");
 script_set_attribute(attribute:"solution", value:
"Contact the vendor for a patch.

In addition to this patch, it is recommended that the documentation
and example code not be stored on production servers.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:ND");
  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");

 script_set_attribute(attribute:"vuln_publication_date", value:"1998/12/25");
 script_set_attribute(attribute:"patch_publication_date", value:"1999/02/04");
 script_set_attribute(attribute:"plugin_publication_date", value:"1999/07/09");

 script_set_attribute(attribute:"potential_vulnerability", value:"true");
 script_set_attribute(attribute:"cpe",value:"cpe:/a:allaire:coldfusion_server");
 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_end_attributes();

 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 1999-2018 Tenable Network Security, Inc.");
 script_family(english:"CGI abuses");

 script_dependencie("find_service1.nasl", "http_version.nasl");
 script_require_keys("Settings/ParanoidReport");
 script_require_ports("Services/www", 80);

 exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

if (report_paranoia < 2) audit(AUDIT_PARANOID);

#
# The script code starts here
#

port = get_http_port(default:80);

cgi  = "/cfdocs/expeval/ExprCalc.cfm?OpenFilePath=c:\winnt\win.ini";
cgi2 = "/cfdocs/expeval/ExprCalc.cfm?OpenFilePath=c:\windows\win.ini";
y = is_cgi_installed3(item:cgi, port:port);
if(!y){
	y = is_cgi_installed3(item:cgi2, port:port);
	cgi = cgi2;
	}


if(y){
        res = http_send_recv3(method:"GET", item:cgi, port:port);
  	if ( isnull(res) ) exit(0);
	if( "[fonts]" >< res )
		security_hole(port);
	}