FortiDAST
FortiDAST performs automated black-box dynamic application security testing of web applications to identify vulnerabilities that bad actors may exploit.
rdiwakar
Staff
Staff
Article Id 337785
Description

This outbreak alert on Adobe ColdFusion covers two vulnerability that is CVE-2023-29298 and CVE-2023-38205.

 

CVE-2023-29298 is an improper access control vulnerability affecting older versions of Adobe ColdFusion 2018u16 (and earlier), 2021u6 (and earlier) and 2023.0.0.330468 (and earlier). This flaw allows attackers to bypass authentication and gain unauthorized access to sensitive administrative functions. By exploiting this vulnerability, attackers can potentially execute arbitrary code, read sensitive files, or even take over the entire ColdFusion server.


CVE-2023-38205 is a high-severity vulnerability that affects Adobe ColdFusion versions 2018u18 and earlier, 2021u8 and earlier, and 2023u2 and earlier. This improper Access Control vulnerability could result in a Security feature bypass. An attacker could leverage this vulnerability to access the administration CFM and CFC endpoints.


This article describes the assessment of improper access control vulnerability in Adobe ColdFusion software.

Scope FortiDAST Scripting Engine updated in version 24.3.0-build0010(GA)
Solution

Detection against that vulnerability is empowered by the FortiDAST Scripting Engine (FSE).

 

This technology enables FortiDAST to assess remotely with a high level of confidence if an asset is vulnerable to a specific vulnerability by testing the disarmed exploit against the asset itself.

 

To configure the scan, it will be necessary to enable the FSE group signature 'coldfusion' which will select the underlying script as per the scan requirement: ‘CVE-2023-29298 Adobe ColdFusion Access Control Bypass Vulnerability’ and ‘CVE-2023-38205 Adobe ColdFusion Access Control Bypass Vulnerability’


For reference, a step-by-step guide on how to configure FortiDAST to trigger FSE can be found on Fortinet’s blog:
https://www.fortinet.com/blog/business-and-technology/fortipentest-exploit-engine-a-new-security-ars...

Contributors