Risks of FCKeditor Vulnerability in CF8

July 06, 2009
coldfusion

I've had a chance to look at the FCKeditor code a little bit in order to determine what the risks actually are of this vulnerability.

If you look at the code a bit you can see that it limits uploads by file extension, and doesn't rely on the cffile accept mime type attribute, that's a good start. So at first glance it appears that a hacker could upload images, movies, zip files, and swf files (which would pose a XSS risk). This basically turns you server into a hacker's own personal file server (with limited file extension support). But there are additional risks!

I'm not going to disclose how I did it right now, but I was able to upload and run a cfm file. The problem still exists in the FCKeditor 2.6.4.1 security update that was released today, I have notified them about the issue. I have also notified some folks at Adobe to make sure that they address this issue in their hotfix as well.

So I would recommend you keep the file manager out of your FCKeditor installations, and ofcourse from your CF8 /CFIDE/scripts installation.

Just another reminder here's a link to my Security Tips for Uploading Files with ColdFusion.

Update: Adobe has posted a hotfix for this issue, and FCKeditor fixed the issue in version 2.6.5



Related Entries

This entry was:

Comments

A friend of mine was just hacked by this FCKEditor exploit. Not by the editor built into CF8, but in a ColdFusion ecommerce package called CFWebStore. In any case he was able to track down the actual files that the hacker / worm injected into his site to take control. I've uploaded the 2 files here for people to take a look at: http://drop.io/cf_exloit I found it interesting to see how it works. I'd even guess that it's actually human controlled as it provides output to explore the file system and issue individual file commands. Besides infecting your files with browser vulnerable malware exploits it will also try to get access to the registry to allow remote desktop access and try to get shell access to set itself to auto-start. So if you've been infected it might be best to restore a clean copy of your files and change all your passwords.
Hi Pete, I realise you don't want to publicly disclose how you managed this, but can you give us some sort of solution to this? Is this vulnerability limited to fckeditor/adobe's implmentation, or could it exploit normal implmentations of cffile+upload? Thanks
Garth if you disable the filemanager you should be safe.

Post a Comment




  



Spell Checker by Foundeo

Recent Entries



foundeo


did you hack my cf?