Hackers are actively exploiting vulnerabilities in Adobe ColdFusion to launch webshell attacks, as reported by Rapid7. The attackers are leveraging two vulnerabilities, an access control bypass (CVE-2023-29298) and a critical remote code execution flaw (CVE-2023-38203), to bypass authentication and execute remote commands on vulnerable servers.
These attacks allow the installation of webshells, providing unauthorized remote access to compromised devices.
Furthermore, on July 11th, Adobe disclosed the authentication bypass vulnerability (CVE-2023-29298) and the pre-auth remote code execution vulnerability (CVE-2023-29300). Rapid7 researchers discovered the former, while the latter was found by CrowdStrike researcher Nicolas Zilio.
Despite initial patches, Rapid7 has found that the fix for CVE-2023-29298 can still be bypassed, indicating the need for another patch from Adobe.
Additionally, attackers are chaining these exploits together to bypass security measures and install webshells. The webshells have been detected in the folder “.\ColdFusion11\cfusion\wwwroot\CFIDE\ckeditr.cfm”. Rapid7 advises administrators to update to the latest version of ColdFusion, which includes a fix for CVE-2023-38203, to prevent the exploitation of these vulnerabilities.
To prevent further compromise, Adobe recommends administrators “lockdown” their ColdFusion installations and promptly upgrade to the latest version.
Although the fix for CVE-2023-29298 may still be bypassed, updating to the latest available version of ColdFusion that includes the fix for CVE-2023-38203 can effectively mitigate the observed attacker behavior.