Ajas, I'm afraid the answer is not as obvious as one may hope. And you all know is often the case, I also don't think it can be answered in a tweet-sized reply. For those interested, read on. :-)
First, let me note that the jar filename below you refer to below is for 9.0 (not 9.0.1 or 9.0.2). Are you really still running only on 9.0? Of course, I know that many are, because they just never got around to adding the free 9.0.1 updater a couple years ago. But for anyone who has, or who installed the new 9.0.2 after May, they would want to be careful to get the correct hotfix file. Second, besides the hotfix jar, this hotfix (like nearly all the security hotfixes and cumulative hotfixes) also entails updating the CFIDE directory. So first, again, you'd have a potential problem if you used the CFIDE for the 9.0 hotfix to update your 9.0.1 or 9.0.2 deployment (if that's what you have), as they may not be identical. (To any who would complain, "see, this is the madness with the CF hotfix process", I'd say yes, that was so at least until 10, when they added the new automated hotfix mechanism that takes care of all this for you.) Third, even if one may feel they applied the right things in the right places, there's sadly no means provided by Adobe to "verify" if you're protected. And if you think about it, it's an unfortunate tension. While providing that would help those who did apply the fix, the converse is that the info could now be used by bad guys both to identify what servers WERE still vulnerable and worse (for those who didn't already know what the previous hack's vulnerability was) they would now have the information needed to perpetrate the exploit. So I'd assert that the first and best thing one can do to avoid the exploit is to protect unfettered public access to the folders /CFIDE/adminapi, /CFIDE/administrator, and /CFIDE/componentutils. You can lock down all access to them in all sites, for instance, and then open it up only in the one site where you think it should be used, whether locking it by ip address or using additional web server authentication. I explain this in my part 2 blog entry and in which I offer links for how to do that in different web servers. Beyond that, while I said that Adobe offers no way to confirm the fix is applied, I'll note that Pete Freitag's nifty free CF security checking service, HackMyCF.com, does now check for that vulnerability (by trying to call into your server), though note that it only checks the domains you tell it to check. If you have more than one web site on the server (as defined in IIS or Apache), you want to test it also. And even if you have a "default site" where the Admin is located, which you think is "only accessible locally", note that if it's set (in the web server) to handle "all ip addresses" or "all unassigned", then that site can potentially in fact be accessed from the outside if someone knows (or discovers) a working public IP address on the server, so that's why I recommend adding the additional web server security I mention above, even for a site you think "is not open to access from the outside" because you access it using localhost or 127.0.0.1. Anyway, back to Pete's tool, I'll note that if you get the commercial version, that one has you put a CFC on your server, which he can then call remotely which can explore things more closely, including confirming which specific hotfixes you do or don't have in place, etc. Hope that's helpful. /charlie From: ad...@acfug.org [mailto:ad...@acfug.org] On Behalf Of Ajas Mohammed Sent: Thursday, January 17, 2013 11:52 PM To: discussion@acfug.org Subject: Re: [ACFUG Discuss] New CF Vulnerability - Check your servers By the way, what is the best way to confirm that the security patch has been applied successfully? Personally, I could only tell based of 1) The CF Admin information page says Update Level /C:/ColdFusion9/lib/updates/hf900-00009.jar 2) On my local CF install Windows 7, the timestamps on folders changed as I followed the steps. I noticed though on our QA servers( Windows 2003) the folder timestamps were weird as in they didn't show modification datetime as the changes were being applied which raised my curiosity. So other than these 2 things, is there another way to verify that the patching process was successful? <Ajas Mohammed /> iUseDropbox( <http://db.tt/63Lvone9> http://db.tt/63Lvone9) http://ajashadi.blogspot.com We cannot become what we need to be, remaining what we are. No matter what, find a way. Because thats what winners do. You can't improve what you don't measure. Quality is never an accident; it is always the result of high intention, sincere effort, intelligent direction and skillful execution; it represents the wise choice of many alternatives. On Wed, Jan 16, 2013 at 9:39 AM, Ajas Mohammed <ajash...@gmail.com> wrote: Thanks Charlie, Cameron for keeping us updated with the latest. Charlie, thanks for those blog entries. Really appreciate all your help. <Ajas Mohammed /> iUseDropbox( <http://db.tt/63Lvone9> http://db.tt/63Lvone9) http://ajashadi.blogspot.com We cannot become what we need to be, remaining what we are. No matter what, find a way. Because thats what winners do. You can't improve what you don't measure. Quality is never an accident; it is always the result of high intention, sincere effort, intelligent direction and skillful execution; it represents the wise choice of many alternatives. On Wed, Jan 16, 2013 at 12:56 AM, Charlie Arehart <char...@carehart.org> wrote: Ok, call off the alarm (those of you on 9.0.2). It turns out that the confusion about the new hotfix (regarding 9.0.2) was just a mistake in the technote. All is as it should be, and everyone ought to apply this hotfix ASAP. :-) BTW, since writing my comment earlier, I have come out with a part 3 entry, on the hotfix and more. http://www.carehart.org/blog/client/index.cfm/2013/1/15/Part3_serious_securi ty_threat Still planning a part 4, with post mortem and more. A bit busy now to commit to when. :-) /charlie From: ad...@acfug.org [mailto:ad...@acfug.org] On Behalf Of Charlie Arehart Sent: Tuesday, January 15, 2013 3:44 PM To: discussion@acfug.org Subject: RE: [ACFUG Discuss] New CF Vulnerability - Check your servers Thanks for sharing it here, Cam. Do beware, though: for those on 9.0.2, there's a glitch in the hotfix (a missing web-inf.zip within the cf902.zip). I've added a comment on the blog entry that points to that (http://blogs.coldfusion.com/post.cfm/coldfusion-security-update-for-version -9-and-above), but obviously those who go straight to the technote wouldn't see that. Hopefully Adobe will fix this ASAP. To be clear, this warning is only for those on 9.0.2. Those on 9.0, 9.0.1, or 10 should absolutely proceed with the hotfix as provided. /charlie ------------------------------------------------------------- To unsubscribe from this list, manage your profile @ http://www.acfug.org?fa=login.edituserform For more info, see http://www.acfug.org/mailinglists Archive @ http://www.mail-archive.com/discussion%40acfug.org/ List hosted by FusionLink <http://www.fusionlink.com> ------------------------------------------------------------- ------------------------------------------------------------- To unsubscribe from this list, manage your profile @ http://www.acfug.org?fa=login.edituserform For more info, see http://www.acfug.org/mailinglists Archive @ http://www.mail-archive.com/discussion%40acfug.org/ List hosted by http://www.fusionlink.com -------------------------------------------------------------