Adobe warns of critical ColdFusion bug with PoC exploit code

Adobe has taken decisive action by releasing out-of-band security updates aimed at addressing a critical vulnerability in ColdFusion, identified as CVE-2024-53961. This flaw arises from a path traversal weakness that affects Adobe ColdFusion versions 2023 and 2021, potentially allowing attackers to read arbitrary files on compromised servers.

Details of the Vulnerability

In an advisory issued on Monday, Adobe acknowledged the existence of a proof-of-concept (PoC) exploit for this vulnerability, which raises significant concerns for users. The company has categorized the flaw with a “Priority 1” severity rating, indicating a heightened risk of exploitation in the wild for the affected product versions and platforms.

Adobe emphasizes the urgency of the situation, urging administrators to implement the emergency security patches—ColdFusion 2021 Update 18 and ColdFusion 2023 Update 12—without delay. The company recommends that these updates be applied within a 72-hour window and advises users to review the security configuration settings outlined in the ColdFusion lockdown guides for both 2023 and 2021 versions.

Potential Risks and Recommendations

While Adobe has not confirmed any instances of this vulnerability being exploited in real-world scenarios, it has encouraged customers to consult the updated serial filter documentation to enhance their defenses against insecure Wddx deserialization attacks.

The Cybersecurity and Infrastructure Security Agency (CISA) has previously highlighted the dangers associated with path traversal vulnerabilities, noting that attackers can leverage such weaknesses to gain access to sensitive data, including credentials that may facilitate further breaches. CISA has described vulnerabilities like directory traversal as “unforgivable,” a sentiment echoed since at least 2007, yet these issues persist in various forms.

In a related context, CISA had previously mandated federal agencies to secure their Adobe ColdFusion servers against two critical vulnerabilities (CVE-2023-29298 and CVE-2023-38205) by August 10, 2023, following their exploitation in attacks, one of which was classified as a zero-day. Furthermore, the agency revealed that hackers had been exploiting another critical ColdFusion vulnerability (CVE-2023-26360) to target outdated government servers since June 2023, with active exploitation occurring in limited attacks since March 2023.

Winsage
Adobe warns of critical ColdFusion bug with PoC exploit code