I remember one advisory, it was related to CF3 Administrator. The password
field length was only secured by the form "maxlength" attribute, not on
server side. Thus, someone could kill a CF server by posting to the
administrator login screen password field some very long string. The
application would than try to "compare" that string with actual password -
which was a time consuming operation for large strings. Through this in
itself doesn't give root access it crashes the CF server and possibly makes
server hacking easier.

TK

-----Original Message-----
From: Russ [mailto:[EMAIL PROTECTED]
Sent: Friday, October 07, 2005 11:12 AM
To: CF-Talk
Subject: RE: ColdFusion Security Holes - Best Practices


Yea, personally I don't remember ever reading any security advisories about
ColdFusion.  Sure coldfusion has bugs, but I don't ever remember anything
serious enough to allow people to hack into the server.  (although a poorly
configured server is probably full of holes, but that's not coldfusion's
fault).

Meanwhile I remember a lot of very dangerous bugs in ASP and PHP which
caused people's machines to be rooted.  That security consultant needs to
stop using the knowledge he learned at some fly-by-night security school,
and get a real education.

Russ

-----Original Message-----
From: Ken Ferguson [mailto:[EMAIL PROTECTED]
Sent: Friday, October 07, 2005 11:10 AM
To: CF-Talk
Subject: Re: ColdFusion Security Holes - Best Practices

You're totally right Thomas. Better to use the phone number to get the
address, follow him (where "him" is any suitable employee) from work to
the bar, lift his security badge / keycard after he's
3-sheets-to-the-wind, excuse yourself, drive back and enter the
building, locate the server room, sit down in front of the machine and
have fun!!!!

Security always has holes -- always!!!

I think the point we've all managed to illustrate is that CF is not a
security risk in and of itself. CF, .NET, PHP... installations are all
just as easily easily left insecure by bad practices and with relatively
equivalent ease can be made just about equally secure.

--Ferg.


Thomas Chiverton wrote:

>On Friday 07 October 2005 15:08, Mark A Kruger wrote:
>
>
>>so you can even call him directly and ask him whatever you want to know
>>about his server ;-))
>>
>>
>
>He will, of course, be well trained in counter-social engineering and work
for
>a company with well defined and enforced information security policies, and

>immediately demand to know who you are, where you got the number and when
>would be a good time to call back.
>
>
>






~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|
Logware (www.logware.us): a new and convenient web-based time tracking 
application. Start tracking and documenting hours spent on a project or with a 
client with Logware today. Try it for free with a 15 day trial account.
http://www.houseoffusion.com/banners/view.cfm?bannerid=67

Message: http://www.houseoffusion.com/lists.cfm/link=i:4:220356
Archives: http://www.houseoffusion.com/cf_lists/threads.cfm/4
Subscription: http://www.houseoffusion.com/lists.cfm/link=s:4
Unsubscribe: 
http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=11502.10531.4
Donations & Support: http://www.houseoffusion.com/tiny.cfm/54

Reply via email to