2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2023-26360" ,
"sourceIdentifier" : "psirt@adobe.com" ,
"published" : "2023-03-23T20:15:15.263" ,
2023-05-01 22:00:27 +02:00
"lastModified" : "2023-05-01T18:15:49.787" ,
"vulnStatus" : "Modified" ,
2023-04-24 12:24:31 +02:00
"cisaExploitAdd" : "2023-03-15" ,
"cisaActionDue" : "2023-04-05" ,
"cisaRequiredAction" : "Apply updates per vendor instructions." ,
2023-05-01 22:00:27 +02:00
"cisaVulnerabilityName" : "Adobe ColdFusion Deserialization of Untrusted Data Vulnerability" ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Adobe ColdFusion versions 2018 Update 15 (and earlier) and 2021 Update 5 (and earlier) are affected by an Improper Access Control vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue does not require user interaction."
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
2023-05-01 22:00:27 +02:00
"source" : "psirt@adobe.com" ,
2023-04-24 12:24:31 +02:00
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
2023-05-01 22:00:27 +02:00
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
2023-05-01 22:00:27 +02:00
"scope" : "CHANGED" ,
2023-04-24 12:24:31 +02:00
"confidentialityImpact" : "HIGH" ,
2023-05-01 22:00:27 +02:00
"integrityImpact" : "NONE" ,
"availabilityImpact" : "NONE" ,
"baseScore" : 8.6 ,
"baseSeverity" : "HIGH"
2023-04-24 12:24:31 +02:00
} ,
"exploitabilityScore" : 3.9 ,
2023-05-01 22:00:27 +02:00
"impactScore" : 4.0
2023-04-24 12:24:31 +02:00
} ,
{
2023-05-01 22:00:27 +02:00
"source" : "nvd@nist.gov" ,
2023-04-24 12:24:31 +02:00
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
2023-05-01 22:00:27 +02:00
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
2023-05-01 22:00:27 +02:00
"scope" : "UNCHANGED" ,
2023-04-24 12:24:31 +02:00
"confidentialityImpact" : "HIGH" ,
2023-05-01 22:00:27 +02:00
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 9.8 ,
"baseSeverity" : "CRITICAL"
2023-04-24 12:24:31 +02:00
} ,
"exploitabilityScore" : 3.9 ,
2023-05-01 22:00:27 +02:00
"impactScore" : 5.9
2023-04-24 12:24:31 +02:00
}
]
} ,
"weaknesses" : [
{
"source" : "psirt@adobe.com" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-284"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adobe:coldfusion:2018:-:*:*:*:*:*:*" ,
"matchCriteriaId" : "3B54B2B0-B1E1-4B4E-A529-D0BD3B5DEEF3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adobe:coldfusion:2018:update1:*:*:*:*:*:*" ,
"matchCriteriaId" : "EDB126BF-E09D-4E58-A39F-1190407D1CAB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adobe:coldfusion:2018:update10:*:*:*:*:*:*" ,
"matchCriteriaId" : "8DDD85DF-69A0-476F-8365-CD67C75CF0CE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adobe:coldfusion:2018:update11:*:*:*:*:*:*" ,
"matchCriteriaId" : "23F63675-7817-4AF0-A7DB-5E35EDABF04E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adobe:coldfusion:2018:update12:*:*:*:*:*:*" ,
"matchCriteriaId" : "3E3BF53E-2C0D-4F79-8B62-4C2A50CB5F52"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adobe:coldfusion:2018:update13:*:*:*:*:*:*" ,
"matchCriteriaId" : "C26BF72C-E991-4170-B68B-09B20B6C0679"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adobe:coldfusion:2018:update14:*:*:*:*:*:*" ,
"matchCriteriaId" : "25B4B4F2-318F-4046-ADE5-E9DD64F83FD9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adobe:coldfusion:2018:update15:*:*:*:*:*:*" ,
"matchCriteriaId" : "831E8D69-62E9-4778-8CC5-D6D45CF5AB6F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adobe:coldfusion:2018:update2:*:*:*:*:*:*" ,
"matchCriteriaId" : "59649177-81EE-43C3-BFA5-E56E65B486DF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adobe:coldfusion:2018:update3:*:*:*:*:*:*" ,
"matchCriteriaId" : "453B96ED-738A-4642-B461-C5216CF45CA3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adobe:coldfusion:2018:update4:*:*:*:*:*:*" ,
"matchCriteriaId" : "58D32489-627B-4E49-9329-8A3B8F8E4903"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adobe:coldfusion:2018:update5:*:*:*:*:*:*" ,
"matchCriteriaId" : "6D5860E1-D293-48FE-9796-058B78B2D571"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adobe:coldfusion:2018:update6:*:*:*:*:*:*" ,
"matchCriteriaId" : "9F9336CC-E38F-4BCB-83CD-805EC7FEF806"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adobe:coldfusion:2018:update7:*:*:*:*:*:*" ,
"matchCriteriaId" : "97964507-047A-4CC8-8D2B-0EA0C7F9BD50"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adobe:coldfusion:2018:update8:*:*:*:*:*:*" ,
"matchCriteriaId" : "82208628-F32A-4380-9B0F-DC8507E7701D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adobe:coldfusion:2018:update9:*:*:*:*:*:*" ,
"matchCriteriaId" : "1563CE5E-A4F7-40A4-A050-BB96E332D8DD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adobe:coldfusion:2021:-:*:*:*:*:*:*" ,
"matchCriteriaId" : "7A94B406-C011-4673-8C2B-0DD94D46CC4C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adobe:coldfusion:2021:update1:*:*:*:*:*:*" ,
"matchCriteriaId" : "AFD05E3A-10F9-4C75-9710-BA46B66FF6E6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adobe:coldfusion:2021:update2:*:*:*:*:*:*" ,
"matchCriteriaId" : "D57C8681-AC68-47DF-A61E-B5C4B4A47663"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adobe:coldfusion:2021:update3:*:*:*:*:*:*" ,
"matchCriteriaId" : "75608383-B727-48D6-8FFA-D552A338A562"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adobe:coldfusion:2021:update4:*:*:*:*:*:*" ,
"matchCriteriaId" : "7773DB68-414A-4BA9-960F-52471A784379"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:adobe:coldfusion:2021:update5:*:*:*:*:*:*" ,
"matchCriteriaId" : "B38B9E86-BCD5-4BCA-8FB7-EC55905184E6"
}
]
}
]
}
] ,
"references" : [
2023-05-01 22:00:27 +02:00
{
"url" : "http://packetstormsecurity.com/files/172079/Adobe-ColdFusion-Unauthenticated-Remote-Code-Execution.html" ,
"source" : "psirt@adobe.com"
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "https://helpx.adobe.com/security/products/coldfusion/apsb23-25.html" ,
"source" : "psirt@adobe.com" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
}
]
}