Vulnerability Name:

CVE-2005-4345 (CCN-23691)

Assigned:2005-12-15
Published:2005-12-15
Updated:2011-03-08
Summary:Adobe (formerly Macromedia) ColdFusion MX 7.0 exposes the password hash of the Administrator in an API call, which allows local developers to obtain the hash and gain privileges.
CVSS v3 Severity:3.3 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): High
Privileges Required (PR): Low
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
5.3 Medium (Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
2.4 Low (CCN CVSS v2 Vector: AV:L/AC:H/Au:S/C:P/I:P/A:N)
1.8 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:H/Au:S/C:P/I:P/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): High
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Privileges
References:Source: MITRE
Type: CNA
CVE-2005-4345

Source: CCN
Type: SA18078
Macromedia ColdFusion Multiple Vulnerabilities

Source: SECUNIA
Type: Patch, Vendor Advisory
18078

Source: CCN
Type: SECTRACK ID: 1015371
ColdFusion MX Sandbox Lets Local Users Bypass CreateObject Restrictions and Obtain Authentication Information

Source: SECTRACK
Type: Patch, Vendor Advisory
1015371

Source: CCN
Type: Macromedia Security Bulletin MPSB05-14
Cumulative Security Updater for ColdFusion MX 7

Source: CONFIRM
Type: Patch
http://www.macromedia.com/devnet/security/security_zone/mpsb05-14.html

Source: CCN
Type: OSVDB ID: 21899
ColdFusion Crafted API Administrator Password Hash Disclosure

Source: BID
Type: Patch
15904

Source: CCN
Type: BID-15904
Macromedia Cold Fusion MX Multiple Vulnerabilities

Source: VUPEN
Type: UNKNOWN
ADV-2005-2948

Source: XF
Type: UNKNOWN
coldfusion-apicall-administrative-password(23691)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:macromedia:coldfusion:7.0:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:macromedia:coldfusion:7.0:*:*:*:*:*:*:*
  • AND
  • cpe:/o:sun:solaris:8::sparc:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2000_advanced_server:*:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:aix:5.1:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2000:::datacenter_server:*:*:*:*:*
  • OR cpe:/o:sun:solaris:9::sparc:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2000:::professional:*:*:*:*:*
  • OR cpe:/a:ibm:aix_5l:-:*:*:*:*:*:*:*
  • OR cpe:/o:suse:linux_enterprise_server:8:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2003_server:-::~~enterprise~~~:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2003_server:-::~~standard~~~:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2003_server:web:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1::as:*:*:*:*:*
  • OR cpe:/o:ibm:aix:5.3:*:*:*:*:*:*:*
  • OR cpe:/o:sun:solaris:10::64bit:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    macromedia coldfusion 7.0
    macromedia coldfusion 7.0
    sun solaris 8
    microsoft windows 2000 advanced server *
    ibm aix 5.1
    microsoft windows 2000
    sun solaris 9
    microsoft windows 2000
    ibm aix 5l -
    suse linux enterprise server 8
    microsoft windows 2003 server -
    microsoft windows 2003 server -
    microsoft windows 2003 server web
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 2.1
    ibm aix 5.3
    sun solaris 10
    redhat enterprise linux 4
    apple mac os x 10.3.9
    apple mac os x 10.4.2
    apple mac os x 10.4.3