Looking for the vulnerability index of Invicti's legacy products?
ColdFusion JNDI injection RCE - Vulnerability Database

ColdFusion JNDI injection RCE

Description

Adobe ColdFusion contains a JNDI (Java Naming and Directory Interface) injection vulnerability that allows unauthenticated attackers to force the server to connect to attacker-controlled LDAP servers. By exploiting this weakness, attackers can inject malicious Java objects that execute arbitrary code on the vulnerable ColdFusion server when deserialized.

Remediation

Apply security patches immediately by upgrading to a patched version of Adobe ColdFusion as specified in Adobe Security Bulletin APSB18-33.

Immediate Actions:
1. Identify all ColdFusion instances in your environment, including development and staging servers
2. Review Adobe Security Bulletin APSB18-33 for the specific patch applicable to your ColdFusion version
3. Test the patches in a non-production environment before deploying to production
4. Apply patches to all affected ColdFusion servers during a scheduled maintenance window
5. Verify patch installation by checking the ColdFusion version after update

Additional Mitigations:
• Implement network segmentation to restrict ColdFusion server access to trusted networks only
• Monitor outbound connections from ColdFusion servers for suspicious LDAP or DNS queries
• Review and restrict JNDI/LDAP connection capabilities if not required by your application
• Enable web application firewall (WAF) rules to detect and block JNDI injection attempts

Related Vulnerabilities