vendor:
Coldfusion
by:
Faisal Tameesh
9.8
CVSS
CRITICAL
Java Object Deserialization
502
CWE
Product Name: Coldfusion
Affected Version From: Adobe Coldfusion (11.0.03.292866)
Affected Version To: Adobe Coldfusion (11.0.03.292866)
Patch Exists: YES
Related CWE: CVE-2017-3066
CPE: a:adobe:coldfusion:11.0.03.292866
Other Scripts:
N/A
Platforms Tested: Windows 10 Enterprise (10.0.15063)
2018
Adobe Coldfusion BlazeDS Java Object Deserialization RCE
This is a two-stage deserialization exploit. The code below is the first stage. You will need a JRMPListener (ysoserial) listening at callback_IP:callback_port. After firing this exploit, and once the target server connects back, JRMPListener will deliver the secondary payload for RCE.
Mitigation:
Adobe has released a security update to address this vulnerability. Users are advised to update to the latest version of Adobe Coldfusion.