ColdFusion MX 6.1 and 6.1 J2EE allows local users to bypass sandbox security restrictions and obtain sensitive information by using Java reflection methods to access trusted Java objects without using the CreateObject function or cfobject tag.
References
Link | Resource |
---|---|
http://www.macromedia.com/devnet/security/security_zone/mpsb04-01.html | Patch Vendor Advisory |
http://www.securityfocus.com/bid/9521 | Broken Link Patch Third Party Advisory VDB Entry |
http://secunia.com/advisories/10743/ | URL Repurposed |
https://exchange.xforce.ibmcloud.com/vulnerabilities/14984 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
History
25 Jan 2024, 02:16
Type | Values Removed | Values Added |
---|---|---|
References | (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/14984 - Third Party Advisory, VDB Entry | |
References | (BID) http://www.securityfocus.com/bid/9521 - Broken Link, Patch, Third Party Advisory, VDB Entry | |
References | (SECUNIA) http://secunia.com/advisories/10743/ - URL Repurposed | |
CVSS |
v2 : v3 : |
v2 : 2.1
v3 : 5.5 |
CWE | CWE-470 |
Information
Published : 2004-12-31 05:00
Updated : 2024-01-25 02:16
NVD link : CVE-2004-2331
Mitre link : CVE-2004-2331
JSON object : View
Products Affected
macromedia
- coldfusion
CWE
CWE-470
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')