Exposed ███████ Administrative Interface (ColdFusion 11)

Disclosed: 2019-12-02 18:54:09 By jamesit To deptofdefense
Medium
Vulnerability Details
**Summary:** The "/██████████/administrator/" directory is accessible to the public and allows an attacker to further enumerate the system and/or perform brute force attacks. **Description:** The ████████ website has an exposed "Administrative Interface" for ColdFusion 11, which could be useful to an attacker to perform brute force attacks and/or further version enumeration. Additionally, leaving an exposed administrative interface open to the world, increases attack surface to zero days and other advanced attacks that would exploit the ████ administrative interface, which has been stopped previously due to access restrictions. ## Impact Low ## Step-by-step Reproduction Instructions 1) Perform directory scanning, which detects the URL using tools such as Burp Suite professional spider and/or DirSearch. 2) Visit URL - https://█████████/████/administrator/index.cfm 3) None. ## Product, Version, and Configuration (If applicable) ColdFusion 11 https://██████/████████/administrator/index.cfm ## Suggested Mitigation/Remediation Actions The "/█████" directory should be completely locked down to prevent unauthorised access, to ensure secure design principles are followed. This can be achieved by .htaccess password protection, or IP restrictions with IP filtering. (IP/Domain Restrictions)
Actions
View on HackerOne
Report Stats
  • Report ID: 223948
  • State: Closed
  • Substate: resolved
  • Upvotes: 7
Share this report