{"document":{"acknowledgments":[{"urls":["https://kb.cert.org/vuls/id/125331#acknowledgements"]}],"category":"CERT/CC Vulnerability Note","csaf_version":"2.0","notes":[{"category":"summary","text":"### Overview\r\nAdobe ColdFusion fails to properly set ACLs, which can allow an unprivileged Windows user to be able to run arbitrary code with SYSTEM privileges.\r\n\r\n### Description\r\n\r\nThe Adobe ColdFusion installer fails to set a secure access-control list (ACL) on the default installation directory, such as `C:\\ColdFusion2021\\`. By default, unprivileged users can create files in this directory structure, which creates a privilege-escalation vulnerability.\r\n\r\n### Impact\r\nBy placing a specially-crafted DLL file in the ColdFusion installation directory, an unprivileged user may be able to execute arbitrary code with SYSTEM privileges on a Windows system with the vulnerable ColdFusion software installed. See [DLL Search Order Hijacking](https://attack.mitre.org/techniques/T1574/001/) for more details.\r\n\r\n### Solution\r\n#### Use the Server Auto-Lockdown Installer\r\nBy default, ColdFusion does not configure itself securely. In order to secure ColdFusion with respect to service privileges, ACLs, and other attributes, the [ColdFusion Server Auto-Lockdown](https://helpx.adobe.com/coldfusion/user-guide.html/coldfusion/using/server-lockdown.ug.html) installer must be installed in addition to installing ColdFusion itself.\r\n\r\nMitigation steps will vary based on the version of ColdFusion being used:  \r\nColdFusion 2016: Apply the changes outlined in the [ColdFusion 2016 Lockdown Guide](https://wwwimages.adobe.com/content/dam/acom/en/products/coldfusion/pdfs/coldfusion-2016-lockdown-guide.pdf).  \r\nColdFusion 2018: Run the [ColdFusion 2018 Auto-Lockdown installer](https://www.adobe.com/support/coldfusion/downloads.html#cf2018ldg) and ensure that it completes without error.  \r\nColdFusion 2021: Run the [ColdFusion 2021 Auto-Lockdown installer](https://www.adobe.com/support/coldfusion/downloads.html#cf2021ldg) and ensure that it completes without error.  \r\n\r\n\r\n### Acknowledgements\r\nThis vulnerability was reported by Will Dormann of the CERT/CC.\r\n\r\nThis document was written by Will Dormann.","title":"Summary"},{"category":"legal_disclaimer","text":"THIS DOCUMENT IS PROVIDED ON AN 'AS IS' BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. ","title":"Legal Disclaimer"},{"category":"other","text":"CERT/CC Vulnerability Note is a limited advisory. It primarily identifies vendors impacted by the advisory and not specific products. We only support \"known_affected\" and \"known_not_affected\" status. Please consult the vendor's statements and advisory URL if provided by the vendor for more details ","title":"Limitations of Advisory"}],"publisher":{"category":"coordinator","contact_details":"Email: cert@cert.org, Phone: +1412 268 5800","issuing_authority":"CERT/CC under DHS/CISA https://www.cisa.gov/cybersecurity also see https://kb.cert.org/ ","name":"CERT/CC","namespace":"https://kb.cert.org/"},"references":[{"url":"https://certcc.github.io/certcc_disclosure_policy","summary":"CERT/CC vulnerability disclosure policy"},{"summary":"CERT/CC document released","category":"self","url":"https://kb.cert.org/vuls/id/125331"},{"url":"https://helpx.adobe.com/coldfusion/user-guide.html/coldfusion/using/server-lockdown.ug.html","summary":"https://helpx.adobe.com/coldfusion/user-guide.html/coldfusion/using/server-lockdown.ug.html"},{"url":"https://wwwimages.adobe.com/content/dam/acom/en/products/coldfusion/pdfs/coldfusion-2016-lockdown-guide.pdf","summary":"https://wwwimages.adobe.com/content/dam/acom/en/products/coldfusion/pdfs/coldfusion-2016-lockdown-guide.pdf"},{"url":"https://www.adobe.com/support/coldfusion/downloads.html#cf2018ldg","summary":"https://www.adobe.com/support/coldfusion/downloads.html#cf2018ldg"},{"url":"https://www.adobe.com/support/coldfusion/downloads.html#cf2021ldg","summary":"https://www.adobe.com/support/coldfusion/downloads.html#cf2021ldg"},{"url":"https://helpx.adobe.com/coldfusion/user-guide.html/coldfusion/using/server-lockdown.ug.html","summary":"Reference(s) from vendor \"Adobe\""},{"url":"https://wwwimages.adobe.com/content/dam/acom/en/products/coldfusion/pdfs/coldfusion-2016-lockdown-guide.pdf","summary":"Reference(s) from vendor \"Adobe\""},{"url":"https://www.adobe.com/support/coldfusion/downloads.html#cf2018ldg","summary":"Reference(s) from vendor \"Adobe\""},{"url":"https://www.adobe.com/support/coldfusion/downloads.html#cf2021ldg","summary":"Reference(s) from vendor \"Adobe\""}],"title":"Adobe ColdFusion is vulnerable to privilege escalation due to weak ACLs","tracking":{"current_release_date":"2021-02-01T20:51:02+00:00","generator":{"engine":{"name":"VINCE","version":"3.0.35"}},"id":"VU#125331","initial_release_date":"2021-02-01 20:51:02.619453+00:00","revision_history":[{"date":"2021-02-01T20:51:02+00:00","number":"1.20210201205102.1","summary":"Released on 2021-02-01T20:51:02+00:00"}],"status":"final","version":"1.20210201205102.1"}},"vulnerabilities":[{"title":"Adobe ColdFusion is vulnerable to privilege escalation by failing to properly set ACLs on its installation directory.","notes":[{"category":"summary","text":"Adobe ColdFusion is vulnerable to privilege escalation by failing to properly set ACLs on its installation directory."}],"cve":"CVE-2020-10145","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#125331"}],"product_status":{"known_affected":["CSAFPID-9ce0d72a-39db-11f1-8422-122e2785dc9f"]}}],"product_tree":{"branches":[{"category":"vendor","name":"Adobe","product":{"name":"Adobe Products","product_id":"CSAFPID-9ce0d72a-39db-11f1-8422-122e2785dc9f"}}]}}