
====================================================================

                             CERT-Renater

                 Note d'Information No. 2018/VULN139
_____________________________________________________________________

DATE                : 11/04/2018

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running Adobe ColdFusion versions 11, 2016
                                             release.

=====================================================================
https://helpx.adobe.com/security/products/coldfusion/apsb18-14.html
_____________________________________________________________________

Adobe Security Bulletin

Applies to: ColdFusion

Last Published: April 11, 2018

Security updates available for ColdFusion | APSB18-14
+-------------------------+--------------------------------+------------------+
|Bulletin ID              |Date Published                  |Priority     |
+-------------------------+--------------------------------+------------------+
|APSB18-14                |April 10, 2018                  |2          |
+-------------------------+--------------------------------+------------------+


Summary

Adobe has released security updates for ColdFusion version 11 and the
2016 release. These updates resolve an important insecure library
loading vulnerability (CVE-2018-4938), an important cross-site scripting
vulnerability that could lead to code injection (CVE-2018-4940) and an
important cross-site scripting vulnerability that could lead to
information disclosure (CVE-2018-4941). These updates also include a
mitigation for a critical unsafe Java deserialization vulnerability
(CVE-2018-4939) and a mitigation for a critical unsafe XML parsing
vulnerability (CVE-2018-4942).


Affected Versions

+----------------------+----------------------+----------------------+
|       Product        |  Affected Versions   |       Platform       |
+----------------------+----------------------+----------------------+
|ColdFusion (2016      |Update 5 and earlier  |All                   |
|release)              |versions              |                      |
+----------------------+----------------------+----------------------+
|ColdFusion 11         |Update 13 and         |All                   |
|                      |earlier versions      |                      |
+----------------------+----------------------+----------------------+

Solution

Adobe categorizes this update with the following priority rating and
recommends users update their installations to the newest versions:

+------------------------+--------------+--------+--------------+------------+
|        Product         |   Updated    |Platform|   Priority
|Availability|
|                        |   Version    |        |    rating    |
    |
+------------------------+--------------+--------+--------------+------------+
|ColdFusion (2016        |Update 6      |All     |2             |Tech
                                                                 note |
|release)                |              |        |              |
    |
+------------------------+--------------+--------+--------------+------------+
|ColdFusion 11           |Update 14     |All     |2             |Tech
                                                                 note |
+------------------------+--------------+--------+--------------+------------+

Note:

The security updates referenced in the above Tech Notes require JDK
8u121 or higher (for ColdFusion 2016) and JDK 7u131 or JDK 8u121 (for
ColdFusion 11).
Adobe recommends updating your ColdFusion JDK/JRE to the latest version.
Applying the ColdFusion update without a corresponding JDK update will
NOT secure the server. See the relevant Tech Notes for more details.

Customers should also apply the security configuration settings as
outlined on the ColdFusion Security page as well as review the
respective Lockdown guides.

  o ColdFusion (2016 release) Lockdown Guide
  o ColdFusion 11 Lockdown Guide


Vulnerability Details

+-------------------------+------------------+---------+----------------------+
| Vulnerability Category  |  Vulnerability   |Severity |     CVE Numbers
     |
|                         |      Impact      |         |
     |
+-------------------------+------------------+---------+----------------------+
|Insecure Library Loading |Local privilege   |Important|CVE-2018-4938
     |
|                         |escalation        |         |
     |
+-------------------------+------------------+---------+----------------------+
|Deserialization of       |Remote code       |Critical |CVE-2018-4939
     |
|Untrusted Data           |execution         |         |
     |
+-------------------------+------------------+---------+----------------------+
|Cross-Site Scripting     |Information       |Important|CVE-2018-4940
     |
|                         |Disclosure        |         |
     |
+-------------------------+------------------+---------+----------------------+
|Cross-Site Scripting     |Information       |Important|CVE-2018-4941
     |
|                         |Disclosure        |         |
     |
+-------------------------+------------------+---------+----------------------+
|Unsafe XML External      |Information       |Critical |CVE-2018-4942
     |
|Entity Processing        |Disclosure        |         |
     |
+-------------------------+------------------+---------+----------------------+


Acknowledgements

Adobe would like to thank the following individuals and organizations
for reporting these issues and for working with Adobe to help protect
our customers:

  o Nitesh Shilpkar (CVE-2018-4938)
  o Nick Bloor of NCC Group (CVE-2018-4939)
  o Jaaziel Sam Carlos (CVE-2018-4940)
  o William Eatman and Michael S. O'Dell from USRA (CVE-2018-4941)
  o Matthias Kaiser of Code White GmbH (CVE-2018-4942)

ColdFusion JDK Requirement

COLDFUSION 2016 HF6

This security update requires ColdFusion to be on JDK 8u121 or higher.
Adobe recommends updating your ColdFusion JDK/JRE to the latest version.
Applying the ColdFusion update without a corresponding JDK update will
NOT secure the server.

For Application Servers

Additionally, on JEE installations, set the following JVM flag,
"-Djdk.serialFilter= !org.mozilla.**;!com.sun.syndication.**", in the
respective startup file depending on the type of Application Server
being used.

For example:

On Apache Tomcat Application Server, edit JAVA_OPTS in the
'Catalina.bat/sh' file

On WebLogic Application Server, edit JAVA_OPTIONS in the
'startWeblogic.cmd' file

On a WildFly/EAP Application Server, edit JAVA_OPTS in the
'standalone.conf' file

Set the JVM flags on a JEE installation of ColdFusion, not on a
standalone installation.

COLDFUSION 11 HF14

This security update requires ColdFusion to be on JDK 7u131 or JDK 8u121
or higher.

Adobe recommends updating your ColdFusion JDK/JRE to the latest version.
Applying the ColdFusion update without a corresponding JDK update will
NOT secure the server.

For Application Servers

Additionally, on J2EE installations, set the following JVM flag,
"-Djdk.serialFilter= !org.mozilla.**;!com.sun.syndication.**", in the
respective startup file depending on the type of Application Server
being used.

For example:

On Apache Tomcat Application Server, edit JAVA_OPTS in the
'Catalina.bat/sh' file

On WebLogic Application Server, edit JAVA_OPTIONS in the
'startWeblogic.cmd' file

On a WildFly/EAP Application Server, edit JAVA_OPTS in the
'standalone.conf' file

Set the JVM flags on a JEE installation of ColdFusion, not on a
standalone installation.


Adobe Disclaimer

License agreement

By using software of Adobe Systems Incorporated or its subsidiaries
("Adobe"); you agree to the following terms and conditions. If you do
not agree with such terms and conditions; do not use the software. The
terms of an end user license agreement accompanying a particular
software file upon installation or download of the software shall
supersede the terms presented below.

The export and re-export of Adobe software products are controlled by
the United States Export Administration Regulations and such software
may not be exported or re-exported to Cuba; Iran; Iraq; Libya; North
Korea; Sudan; or Syria or any country to which the United States
embargoes goods. In addition; Adobe software may not be distributed to
persons on the Table of Denial Orders; the Entity List; or the List of
Specially Designated Nationals.

By downloading or using an Adobe software product you are certifying
that you are not a national of Cuba; Iran; Iraq; Libya; North Korea;
Sudan; or Syria or any country to which the United States embargoes
goods and that you are not a person on the Table of Denial Orders; the
Entity List; or the List of Specially Designated Nationals. If the
software is designed for use with an application software product (the
"Host Application") published by Adobe; Adobe grants you a non-exclusive
license to use such software with the Host Application only; provided
you possess a valid license from Adobe for the Host Application.
Except as set forth below; such software is licensed to you subject to
the terms and conditions of the End User License Agreement from Adobe
governing your use of the Host Application.

DISCLAIMER OF WARRANTIES: YOU AGREE THAT ADOBE HAS MADE NO EXPRESS
WARRANTIES TO YOU REGARDING THE SOFTWARE AND THAT THE SOFTWARE IS BEING
PROVIDED TO YOU "AS IS" WITHOUT WARRANTY OF ANY KIND. ADOBE DISCLAIMS
ALL WARRANTIES WITH REGARD TO THE SOFTWARE; EXPRESS OR IMPLIED;
INCLUDING; WITHOUT LIMITATION; ANY IMPLIED WARRANTIES OF FITNESS FOR A
PARTICULAR PURPOSE; MERCHANTABILITY; MERCHANTABLE QUALITY OR
NONINFRINGEMENT OF THIRD PARTY RIGHTS. Some states or jurisdictions do
not allow the exclusion of implied warranties; so the above
limitations may not apply to you.

LIMIT OF LIABILITY: IN NO EVENT WILL ADOBE BE LIABLE TO YOU FOR ANY LOSS
OF USE; INTERRUPTION OF BUSINESS; OR ANY DIRECT; INDIRECT; SPECIAL;
INCIDENTAL; OR CONSEQUENTIAL DAMAGES OF ANY KIND (INCLUDING LOST
PROFITS) REGARDLESS OF THE FORM OF ACTION WHETHER IN CONTRACT; TORT
(INCLUDING NEGLIGENCE); STRICT PRODUCT LIABILITY OR OTHERWISE; EVEN IF
ADOBE HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Some states
or jurisdictions do not allow the exclusion or limitation of incidental
or consequential damages; so the above limitation or exclusion may not
apply to you.

==========================================================
+ CERT-RENATER          | tel : 01-53-94-20-44           +
+ 23 - 25 Rue Daviel    | fax : 01-53-94-20-41           +
+ 75013 Paris           | email: cert@support.renater.fr +
==========================================================


