This message was deleted.
# adobe
s
This message was deleted.
m
This update addresses a zero-day exploit recently posted live that concerns the following CWEs: 284, 502, 307.
d
No corresponding update for CF 2018?
p
It is for CF2018, CF2021 & CF2023
d
Glorious.
f
d
My boss just asked me this:
Copy code
do you know if php has this many [security updates]? or python?
Anyone?
m
Way more. Monthly. These issues also affect PHP, by the way. As well as JavaScript, etc. Java. They are not CF specific.
If you drop into those CWE descriptions, they go into detail about what the exploits are and who is affected.
a
@Mark Takata (Adobe) FYI - the "APSB23-41" link is broken on this page https://helpx.adobe.com/coldfusion/kb/coldfusion-2018-updates.html goes to a 404
💯 1
2
Seems to be broken on all three (2018 / 2021 /2023) pages
f
yeah, I think it is the correct url, the page was just not published yet
b
Thanks for sending that alert email @foundeo :D
👍 1
j
@Mark Takata (Adobe) "following CWEs: 284, 502, 307." weren't those the same in the earlier update? I'm confused.
Reaaaaallly need to tighten up this process... Is someone working on the APSB23-41 link? Did something not get patched correctly in the last update? I did look at APSB23-40 and those CWEs are the same...
🍿 1
1
m
someone is working on the link, yes.
j
Are there new CVEs? I don't see any listed. Is this like a 'everything is on fire on Friday at 4pm' update or can this wait til Monday?
c
Here's the link for 2023. Either I'm blind or that wasn't posted. https://helpx.adobe.com/coldfusion/kb/coldfusion-2023-update-2.html
👍 1
m
Sorry, we're kind of trying to build a house on the back of a moving semi-truck right now. This is a critical update that just got released and we are hoping awareness of the issue and release of the update > perfect messaging. We'll the pages updated and all that, the important thing is to apply the patch
j
But it's difficult to tell security folks to 'just apply it - it will be ok' LOL
m
Every environment is different. You need to balance your own situation against the severity of the issue. As I said, we're working on improving items here, but there's a lot of movement behind the scenes.
c
Thanks for getting updates out quickly when they matter. I'd take an update every day if it meant our customers were not compromised by holding back. Just might ask for a better process ;)
❤️ 1
m
Thanks Chris, we're aligned on that. 🙂
j
Yeah - it's unfortunate timing (late on a Friday) and lack of information - I don't think I've even gotten the usual update email from Adobe yet... going to be a fun weekend and Monday for a lot of folks I guess.
r
Thanks for the clearer Java update notice this time. 👍🏻
f
👍🏻 1
🎉 2
🙏 1
👍 2
m
For a LOT of people Jim. THANK YOU PETE!! ❤️ ❤️
👍 1
c
Wait... there's Adobe update emails? How do I get on that?
j
f
the CVE database takes a while before it gets updated sometimes, wouldn’t be surprised if it doesn’t make it in there until Monday
b
The original blog post is down now, but CVE-2023-38203 is another deserialization vulnerability. The PoC exploit looks similar to the ones for CVE-2023-26360, from APSB23-25 in March, except this one passes a malicious serialized object in a WDDX packet vs in a JSON object. I have no inside knowledge, but it looks like in the course of investigating CVE-2023-29300, they though they had reproduced the bug, blogged about it, but it turned out to me an entirely new vulnerability.
🍿 1
I haven't tested/reproduced the exploit at all. It passed a _cfclient arg, but I don't know 1) if it was needed and 2) if having cfclient disabled would block the exploit
f
yeah — that’s exactly what I think happened too Brian - no inside info either, but I think they thought their vulnerability was patched on Tuesday, and it wasn’t so they made the exploit public (my 2 cents)
they were way too quick to post the POC! I usually don’t ever post them, but if you are going to publish it, you gotta give people time to patch and address it, and at the very least confirm it was patched.
☝🏻 1
b
The blog was presented as a reproduction of CVE-2023-29300 and it sounded like they were testing against CF2021 U6. (I assumed they took the blog offline when they became aware it was an unpatched vuln)
j
There is confusing language again around the JDK updates: "Applying the ColdFusion update without a corresponding JDK update will NOT secure the server. See the relevant Tech Notes for more details." So is there a "corresponding JDK update" associated with this update? Or should this say "the latest JDK update" ie for Java 11 - 11.0.19??
I just got the Security Bulletin Email 📨
@Mark Takata (Adobe) when you have a sec could you update the parent post here - you have two 2021 links and I'm assuming one of those should be for 2023... just to help people if they come looking here over the weekend
m
Slack is not allowing me to edit. 😞
Created a new post, deleting the first post in this thread so no one gets confused...
👍 2