CVE-2023-26360: Adobe ColdFusion Servers Exploited for Initial Access

The Blue Report 2024

Get a comprehensive analysis of over 136 million cyber attacks and understand the state of threat exposure management.

DOWNLOAD

On December 5, 2023, The Cybersecurity and Infrastructure Security Agency (CISA) released an advisory on actively exploited Adobe ColdFusion CVE-2023-26360 vulnerability [1]. The vulnerability allows adversaries to gain initial access to public-facing Adobe ColdFusion web servers.  CVE-2023-26360 has a CVSS score of 9.8 (Critical) and is actively being exploited by cyber threat actors.

In this blog, we explained the Adobe ColdFusion CVE-2023-26360 vulnerability and how organizations can defend against CVE-2023-26360 attacks.

Simulate Vulnerability Exploitation Attacks with 14-Day Free Trial of Picus Platform

Adobe ColdFusion CVE-2023-26360 Vulnerability Explained

Adobe ColdFusion is a commercial web application development platform that is used to build web applications and services. The platform uses a proprietary language called ColdFusion Markup Language (CFML) to create dynamic and interactive web applications. The application itself is built using Java.

In March 2023, Adobe disclosed a vulnerability affecting Adobe ColdFusion 20218 and 2021. When exploited, the CVE-2023-26360 vulnerability results in arbitrary code execution, and it does not require user interaction. The vulnerability stems from improper access control and has a CVSS score of 9.8 (Critical).

The CVE-2023-26360 vulnerability affects the Adobe products given below.

Product Name

Fixed Versions

Adobe ColdFusion 2021

Update 6 and later

Adobe ColdFusion 2018

Update 16 and later

Adobe ColdFusion 2016

End-of-Life, not supported

Adobe ColdFusion 11

End-of-Life, not supported

In their advisory, CISA confirmed that threat actors exploited the CVE-2023-26360 in two incidents and gained initial access to a Federal Civilian Executive Branch (FCEB) agency. Since proof-of-concept exploits are publicly available, organizations are advised to patch their vulnerable Adobe ColdFusion servers as soon as possible.

How Adobe CVE-2023-26360 Exploit Works?

At its core, CVE-2023-26360 is an improper access control vulnerability caused by deserializing untrusted data without proper validation. When an attacker crafts a malicious HTTP request with “_cfclient=true” in the URL, the Adobe ColdFusion server invokes the “convertToTemplateProxy” function and deserializes the malicious JSON input provided by the attacker. Adversaries use this method for different purposes, such as arbitrary code execution, arbitrary file read, and remote code execution.

//Attacker-crafted POST request

POST /cf_scripts/scripts/ajax/ckeditor/plugins/filemanager/iedit.cfc?method=foo^&_cfclient=true HTTP/1.1


_variables%3D%7B%22_metadata%22%3A%7B%22classname%22%3A%22%5C..%5Cruntime%5Cwork%5CCatalina%5Clocalhost%5Ctmp%5Chax.tmp%22%7D%2C%22_variables%22%3A%7B%7D%7D

Adobe ColdFusion CVE-2023-26360 Vulnerability Exploit Example

In their advisory, CISA mentioned that threat actors were able to upload a webshell and a remote access trojan (RAT) to the victim's server to establish persistence. 

Uploaded Files

Hash (SHA-1)

ee.exe

b6818d2d5cbd902ce23461f24fc47e24937250e6

edge.exe

75a8ceded496269e9877c2d55f6ce13551d93ff4

fscan.exe

be332b6e2e2ed9e1e57d8aafa0c00aa77d4b8656

RC.exe

9126b8320d18a52b1315d5ada08e1c380d18806b

How Picus Helps Simulate Adobe ColdFusion CVE-2023-26360 Attacks?

We also strongly suggest simulating the Adobe ColdFusion CVE-2023-26360 vulnerability to test the effectiveness of your security controls against sophisticated cyber attacks using the Picus Complete Security Validation Platform. You can also test your defenses against other vulnerability exploitation attacks, such as Follina, Citrix Bleed, and Looney Tunables, within minutes with a 14-day free trial of the Picus Platform.

Picus Threat Library includes the following threats for Adobe ColdFusion CVE-2023-26360 vulnerability exploitation attacks:

Threat ID

Threat Name

Attack Module

95963

ColdFusion Web  Attack Campaign

Web Application

Picus also provides actionable mitigation content. Picus Mitigation Library includes prevention signatures to address Adobe ColdFusion CVE-2023-26360 vulnerability and other vulnerability exploitation attacks in preventive security controls. Currently, Picus Labs validated the following signatures for Adobe ColdFusion CVE-2023-26360 vulnerability:

Security Control

Signature ID

Signature Name

Checkpoint NGFW

tcp_block_retrans_err_enable

Invalid segment retransmission. Packet dropped. Please refer to sk172266.

Fortigate IPS

52899

Adobe.ColdFusion.ToTemplateProxy.Insecure.Deserialization

Fortiweb

060150002

Generic Attacks(Extended)

Imperva SecureSphere

 

CVE-2023-26360: Adobe Coldfusion Improper Access Control RCE

Palo Alto

93796

Adobe Insecure Deserialization Vulnerability

Trend Micro TippingPoint

42650

HTTP: Adobe ColdFusion convertToTemplateProxy Insecure Deserialization Vulnerability

Start simulating emerging threats today and get actionable mitigation insights with a 14-day free trialof the Picus Complete Security Validation Platform.

READ MORE

References

[1] “Threat Actors Exploit Adobe ColdFusion CVE-2023-26360 for Initial Access to Government Servers,” Cybersecurity and Infrastructure Security Agency CISA. Available: https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-339a. [Accessed: Dec. 06, 2023]