![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.103769 |
Categoría: | Web application abuses |
Título: | Adobe ColdFusion Authentication Bypass Vulnerability (APSA13-01) |
Resumen: | Adobe ColdFusion is prone to a remote authentication bypass; vulnerability. |
Descripción: | Summary: Adobe ColdFusion is prone to a remote authentication bypass vulnerability. Vulnerability Insight: Adobe ColdFusion versions 9.0, 9.0.1, and 9.0.2 do not properly check the 'rdsPasswordAllowed' field when accessing the Administrator API CFC that is used for logging in. Vulnerability Impact: An attacker can exploit this issue to bypass certain authentication processes and potentially allow an attacker to take control of the affected system. Affected Software/OS: Adobe ColdFusion versions 9.0, 9.0.1 and 9.0.2 are known to be affected. Note: This issue affects ColdFusion customers who do not have password protection enabled or do not have a password set. Solution: Vendor updates are available. Please see the references for more information. CVSS Score: 10.0 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2013-0632 http://www.exploit-db.com/exploits/30210 |
Copyright | Copyright (C) 2013 Greenbone AG |
Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |