Interesting read - thanks for sharing. These incident summaries are both from compromises that occurred after patches were available, but what’s been top-of-mind for me is that both CVE-2023-26360 and CVE-2023-29300 were reported by Adobe as having been exploited/discovered in the wild prior to patch availability. So that’s pretty good confirmation that there are some threat actors who are actively looking for / exploiting zero-day ACF vulnerabilities against some targets. Lots of organizations probably don’t need to realistically worry about zero-day vulnerabilities, but it’s good to proactively take steps to make compromise an exploitation harder.
And anecdotally there appears to be a sizable footprint of past-EOL versions of ColdFusion out there. If you’re running post-EOL ColdFusion (and you really shouldn’t), the following done at a WAF or similar can go a long way -
-normalize the request URI
-block any requests with
..
in the URI path (which could be attempts to exploit directory traversal vulnerabilities)
-block any requests in which the normalized URI path starts with a case-insensitive
/CFIDE
In addition to that, strict outbound network filtering can go a long way to stopping a full exploit chain and minimizing impact.