From 627b9f2d52e4242596a820ca4b1085fbeadc1ce9 Mon Sep 17 00:00:00 2001 From: wy876 <139549762+wy876@users.noreply.github.com> Date: Wed, 3 Apr 2024 23:38:02 +0800 Subject: [PATCH] =?UTF-8?q?Update=20Adobe-ColdFusion=E4=BB=BB=E6=84=8F?= =?UTF-8?q?=E6=96=87=E4=BB=B6=E8=AF=BB=E5=8F=96=E6=BC=8F=E6=B4=9ECVE-2024-?= =?UTF-8?q?20767.md?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- Adobe-ColdFusion任意文件读取漏洞CVE-2024-20767.md | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/Adobe-ColdFusion任意文件读取漏洞CVE-2024-20767.md b/Adobe-ColdFusion任意文件读取漏洞CVE-2024-20767.md index db98c1f..e495f05 100644 --- a/Adobe-ColdFusion任意文件读取漏洞CVE-2024-20767.md +++ b/Adobe-ColdFusion任意文件读取漏洞CVE-2024-20767.md @@ -1,5 +1,11 @@ ## Adobe-ColdFusion任意文件读取漏洞CVE-2024-20767 +Adobe ColdFusion 由于在鉴权方面存在疏漏,导致了可未授权访问,从而通过pms接口进行任意文件读取。 + +## fofa +``` +app="Adobe-ColdFusion" +``` ## poc ```python