Pete Freitag Pete Freitag

Risks of FCKeditor Vulnerability in ColdFusion 8

Updated on January 12, 2021
By Pete Freitag
coldfusion

I've had a chance to look at the FCKeditor code a little bit in order to determine what the risks actually are of this vulnerability.

If you look at the code a bit you can see that it limits uploads by file extension, and doesn't rely on the cffile accept mime type attribute, that's a good start. So at first glance it appears that a hacker could upload images, movies, zip files, and swf files (which would pose a XSS risk). This basically turns you server into a hacker's own personal file server (with limited file extension support). But there are additional risks!

I'm not going to disclose how I did it right now, but I was able to upload and run a cfm file. The problem still exists in the FCKeditor 2.6.4.1 security update that was released today, I have notified them about the issue. I have also notified some folks at Adobe to make sure that they address this issue in their hotfix as well.

So I would recommend you keep the file manager out of your FCKeditor installations, and ofcourse from your CF8 /CFIDE/scripts installation.

Just another reminder here's a link to my Security Tips for Uploading Files with ColdFusion.

Update: Adobe has posted a hotfix for this issue, and FCKeditor fixed the issue in version 2.6.5

Update: Fixinator can detect vulnerable versions of FCKEditor in your ColdFusion code. In addition to detecting vulnerable versions of FCKEditor, it also looks for other known vulnerable third party libraries. You can run fixinator in CI, so it scans your code for vulnerabilities every time you commit to source control.



fckeditor security coldfusion upload cffile xss

Risks of FCKeditor Vulnerability in ColdFusion 8 was first published on July 06, 2009.

If you like reading about fckeditor, security, coldfusion, upload, cffile, or xss then you might also like:

Fixinator

The Fixinator Code Security Scanner for ColdFusion & CFML is an easy to use security tool that every CF developer can use. It can also easily integrate into CI for automatic scanning on every commit.


Try Fixinator

CFBreak
The weekly newsletter for the CFML Community


Comments

A friend of mine was just hacked by this FCKEditor exploit. Not by the editor built into CF8, but in a ColdFusion ecommerce package called CFWebStore.

In any case he was able to track down the actual files that the hacker / worm injected into his site to take control.

I've uploaded the 2 files here for people to take a look at:

http://drop.io/cf_exloit

I found it interesting to see how it works. I'd even guess that it's actually human controlled as it provides output to explore the file system and issue individual file commands.

Besides infecting your files with browser vulnerable malware exploits it will also try to get access to the registry to allow remote desktop access and try to get shell access to set itself to auto-start.

So if you've been infected it might be best to restore a clean copy of your files and change all your passwords.
by Jordan Clark on 07/06/2009 at 3:33:54 PM UTC
Hi Pete,

I realise you don't want to publicly disclose how you managed this, but can you give us some sort of solution to this?

Is this vulnerability limited to fckeditor/adobe's implmentation, or could it exploit normal implmentations of cffile+upload?

Thanks
by Gareth on 07/07/2009 at 4:44:26 AM UTC
Garth if you disable the filemanager you should be safe.
by Pete Freitag on 07/07/2009 at 6:06:19 AM UTC