Re: security issue with reading file with cfimage read and write

2014-05-20 Thread Russ Michaels
What is the security issue exactly? Russ Michaels www.michaels.me.uk cfmldeveloper.com cflive.net cfsearch.com On 20 May 2014 03:19, Matthew Smith chedders...@gmail.com wrote: /Had it working a couple of times but I think I am having pathing issues here and there. NOt sure where I am off

Re: security issue with reading file with cfimage read and write

2014-05-20 Thread Byron Mann
The try catch seems peculiar. If the first CFimage fails and throws an error, things go inside the cfcatch. The first line inside there is the same as the very first, so I would assume you are really getting 2 of the same errors in a row, and not catching the second. I can only see this working,

Re: security issue with reading file with cfimage read and write

2014-05-20 Thread .jonah
The first call is to the ./resize/ directory for the already processed image. If that fails, the source image is read, processed, and saved into the ./resize/ directory. At a glance it seems like this code should work OK. I'm no sure what Matthew's question is either. (As long as

security issue with reading file with cfimage read and write

2014-05-19 Thread Matthew Smith
/Had it working a couple of times but I think I am having pathing issues here and there. NOt sure where I am off... Any help is appreciated... cftry cfimage action=read name=myImage

Re: Best practices for xss security in CMS? - Related Question

2014-03-06 Thread Pete Freitag
? Hi Nick, Yes if you have the following: Content-Security-Policy: default-src 'self'; It will block any scriptcode here/script tags in your page, you can only use script src=/some/uri/script This is a recognized problem in CSP1.0 and CSP 1.1 is currently in development right now with two

Re: Best practices for xss security in CMS? - Related Question

2014-03-05 Thread Nick Gleason
Hi Pete, I've been researching CSP and it sounds like a pretty cool option. But, I just wanted to follow up on this comment that you made below:-- it will also block inline scripts and style elements-- Are you

Re: Best practices for xss security in CMS? - Related Question

2014-03-04 Thread Pete Freitag
every user of the site but the attacker can use the hole to eventually get the info they are after. Re: the content security policy, that looks very interesting. Watching a presentation on it now. One quick question. If we are using that on a site and then an admin comes in and uses an iframe

Re: Best practices for xss security in CMS?

2014-03-03 Thread Russ Michaels
tags you allow. However relying on passwords alone is almost pointless these days unless you at the very least enforce some password strength, as your security is then only as strong as the person with the weakest password. You could consider some extra steps for any back end/cms system

Re: Best practices for xss security in CMS?

2014-03-03 Thread Dave Watts
Dave, this is an interesting idea which we haven't pursued yet. I don't have a clear sense of how the server configuration would work here. Would you have two separate db servers (one for authored content and one for published content) that would sync up? Or would you have an authoring

Re: Best practices for xss security in CMS? - Related Question

2014-03-03 Thread Pete Freitag
protection). So basically any time you take a variable that comes from the user or some other untrusted source and output it, you have the potential for an XSS hole. Also you should checkout Content-Security-Policy headers this can help reduce XSS risks significantly on browsers that support it. See

RE: Best practices for xss security in CMS? - Related Question

2014-03-03 Thread Nick Gleason
, won't it be clean? I guess that, assuming we have no sql injection to the db, I don't see how that attack stays persistent (as it would possibly for a comment or forum post). Sorry to be over-simple on this. Re: the content security policy, that looks very interesting. Watching a presentation

RE: Best practices for xss security in CMS?

2014-03-03 Thread Russ Michaels
You could manage the web.config ip filter via cf. You can also have the option to disable 2 factor authentication for a specific computer for 30 days which is a common option, using either a cookie or ip logging. Russ Michaels www.michaels.me.uk cfmldeveloper.com cflive.net cfsearch.com On 3 Mar

RE: Best practices for xss security in CMS?

2014-03-03 Thread Nick Gleason
Hi Russ, This is very interesting. In this case, we limit failed logins to a fairly small number before the login is disabled so in theory that would prevent dictionary style attacks, even against fairly weak logins. If you think that is flawed, let me know. We've discussed adding an IP

Re: Best practices for xss security in CMS? - Related Question

2014-03-03 Thread Money Pit
Nick you are correct, strictly speaking. That simple example is harmless, it runs only one time and is 'visible' only to the single client. Consider what happens if the payload that is executed is nowhere nearly as benign. At that point, code of some kind is being executed on your server that

Re: Best practices for xss security in CMS? - Related Question

2014-03-03 Thread Money Pit
To clarify, I was oversimplifying above when I said 'code is being executed on your server'. Pete's script example would of course need to link up with some other vulnerability for that to happen (i.e. an unpatched exploit of some kind). Since you can't predict such things, you minimize the

RE: Best practices for xss security in CMS?

2014-03-02 Thread Nick Gleason
:29 AM To: cf-talk Subject: Re: Best practices for xss security in CMS? I'm very interested in your feedback on best practices when 1) trying to mitigate risk of XSS and other hacks while 2) providing CMS functionality that includes a web editor that clients use to publish web pages

RE: Best practices for xss security in CMS?

2014-03-02 Thread Nick Gleason
, 2014 9:39 AM To: cf-talk Subject: Re: Best practices for xss security in CMS? with any decent editor including CKeditor and tinyMCE, you can specify down to a granular level which html tags and attributes are allowed/not allowed, just check the docs and there should be a config file somewhere

RE: Best practices for xss security in CMS?

2014-03-02 Thread Nick Gleason
...@gmail.com] Sent: Friday, February 28, 2014 11:10 AM To: cf-talk Subject: Re: Best practices for xss security in CMS? Sorry, I only read as far as disabling Javascript and was commenting on that. The fact remains that anything done *clientside* is not reliable. It seems we're not disagreeing

RE: Best practices for xss security in CMS?

2014-03-02 Thread Nick Gleason
practices for xss security in CMS? That's a bit narrow-sighted. Hackers don't disable JS to bypass clientside pre-validation, they just post the form directly. Often the server code is not coded in such a way to be aware how a post is made (via a legit form, or just by a POST request). *Always

RE: Best practices for xss security in CMS? - Related Question

2014-03-02 Thread Nick Gleason
-Original Message- From: Russ Michaels [mailto:r...@michaels.me.uk] Sent: Friday, February 28, 2014 11:58 AM To: cf-talk Subject: Re: Best practices for xss security in CMS? tsk, not reading properly before replying is very naughty, I will set Charlie Arehart on you. I am quite confident

Re: Best practices for xss security in CMS?

2014-02-28 Thread Dave Watts
are managing these issues effectively. Our users who are creating web pages with an editor (FCKeditor) are generally working behind a login as administrators, so there is that login security - not anyone can use the editor to create a web page. But, we have generally had a lot more security than

Re: Best practices for xss security in CMS?

2014-02-28 Thread Russ Michaels
who are creating web pages with an editor (FCKeditor) are generally working behind a login as administrators, so there is that login security - not anyone can use the editor to create a web page. But, we have generally had a lot more security than that. I'm assuming that there are users

Re: Best practices for xss security in CMS?

2014-02-28 Thread Adam Cameron
with an editor (FCKeditor) are generally working behind a login as administrators, so there is that login security - not anyone can use the editor to create a web page. But, we have generally had a lot more security than that. I'm assuming that there are users of Mura, Farcry and other CMS's

Re: Best practices for xss security in CMS?

2014-02-28 Thread Russ Michaels
them in making their web pages. I'd love to know how others are managing these issues effectively. Our users who are creating web pages with an editor (FCKeditor) are generally working behind a login as administrators, so there is that login security - not anyone can use

Re: Best practices for xss security in CMS?

2014-02-28 Thread Adam Cameron
but don't frustrate them in making their web pages. I'd love to know how others are managing these issues effectively. Our users who are creating web pages with an editor (FCKeditor) are generally working behind a login as administrators, so there is that login security

Re: Best practices for xss security in CMS?

2014-02-28 Thread Russ Michaels
with an editor (FCKeditor) are generally working behind a login as administrators, so there is that login security - not anyone can use the editor to create a web page. But, we have generally had a lot more security than that. I'm assuming that there are users

Re: Best practices for xss security in CMS?

2014-02-28 Thread Adam Cameron
Sorry, I only read as far as disabling Javascript and was commenting on that. The fact remains that anything done *clientside* is not reliable. It seems we're not disagreeing there, Certainly having a WAF is borderline essential on anything other than a trivial site. I'm not entirely sure doing

Re: Best practices for xss security in CMS?

2014-02-28 Thread Russ Michaels
tsk, not reading properly before replying is very naughty, I will set Charlie Arehart on you. I am quite confident that fuseguard would do a better job than a generic WAF on a CF site, and anyone of shared hosting wont really have the option to do a server wide solution. but certainly if you use

Re: Best practices for xss security in CMS?

2014-02-20 Thread Pete Freitag
Hi Nick, It is tricky to handle HTML content while avoiding XSS, there are a two tools I'm aware of that can help you here: 1) scrubHTML() - This is one I built in pure CFML and I think it is pretty easy to build a whitelist of allowed html using it: https://github.com/foundeo/cfml-security

Re: Best practices for xss security in CMS?

2014-02-20 Thread Nick Gleason
Thanks very much Pete. We have implemented Portcullis among other things and that will also block tags like the ones mentioned. I think that may be similar to the ones that you mention. I expect that Fuseguard has something similar. I guess my follow up question may have to be with what

Best practices for xss security in CMS?

2014-02-19 Thread Nick Gleason
are managing these issues effectively. Our users who are creating web pages with an editor (FCKeditor) are generally working behind a login as administrators, so there is that login security - not anyone can use the editor to create a web page. But, we have generally had a lot more security than

CF web services and mobile security

2013-05-06 Thread Michael Sanchez
I need to create 2 things: - a mobile application: I need it to keep logged for an X period of time or forever.. - a set of web services that manage user creation, authentication and authorization for the mobile app, in CF. I am new to Adobe CF. I was looking may be for some WS-Security

Re: CF web services and mobile security

2013-05-06 Thread Russ Michaels
was looking may be for some WS-Security approach using tokens (STS), but not sure if it is the right way, or how to start. Currently, I am trying to understand the Axis2 Rampart extension: http://axis.apache.org/axis2/java/rampart/ Any advice on this topic

Re: CF sandbox security

2013-04-03 Thread Earl, George
Is CF sandbox security intended to secure the application runtime environment or is it intended to secure directory and folder access during development when developers upload and access files? Or is it intended for both? Thanks Russ and Dave. I suspected it was as both of you have said

CF sandbox security

2013-04-02 Thread Earl, George
Is CF sandbox security intended to secure the application runtime environment or is it intended to secure directory and folder access during development when developers upload and access files? Or is it intended for both? For example, are sandboxes the way to go if we want to restrict

Re: CF sandbox security

2013-04-02 Thread Russ Michaels
a sandbox. Regards Russ Michaels www.michaels.me.uk www.cfmldeveloper.com - Free CFML hosting for developers www.cfsearch.com - CF search engine On Apr 2, 2013 6:10 PM, Earl, George george.e...@ssa.gov wrote: Is CF sandbox security intended to secure the application runtime environment

Re: CF sandbox security

2013-04-02 Thread Dave Watts
Is CF sandbox security intended to secure the application runtime environment or is it intended to secure directory and folder access during development when developers upload and access files? Or is it intended for both? Sandbox security and developer-specific CF Admin/RDS logins together

JRun errors after security patch install

2013-01-16 Thread Terry Ford
Hello -- I installed the security patch last night on cf 9.1 linux, and woke up this morning to find that some of our templates no longer work: [Wed Jan 16 09:28:27 2013] [notice] jrApache[1978: 53193]  returning error page for JRun too busy or out of memory They return a 500 error

Re: JRun errors after security patch install

2013-01-16 Thread Carl Von Stetten
Terry, I assume you are referring to the latest patch released earlier this week. Since it was a cumulative patch, it included some previously released security improvements as well as the new ones. One of the older security improvements was to add a Post Parameter Limit setting to prevent

Re: JRun errors after security patch install

2013-01-16 Thread Terry Ford
@houseoffusion.com Sent: Wednesday, January 16, 2013 8:49 AM Subject: Re: JRun errors after security patch install Terry, I assume you are referring to the latest patch released earlier this week.  Since it was a cumulative patch, it included some previously released security improvements as well

Re: New Security Issue with CF

2013-01-05 Thread John M Bliss
Another: http://blogs.coldfusion.com/post.cfm/a-new-security-advisory-for-coldfusion-is-now-available On Fri, Jan 4, 2013 at 7:55 PM, Eric Bourland e...@ebwebwork.com wrote: Claude, thank you. That's really helpful information and gives me perspective. Eric -Original Message

Re: New Security Issue with CF

2013-01-04 Thread John M Bliss
First official comment from Adobe(?) http://blogs.adobe.com/psirt/2013/01/upcoming-security-advisory-for-coldfusion.html On Thu, Jan 3, 2013 at 8:11 AM, Robert Rhodes rrhode...@gmail.com wrote: I looked into this a bit more this morning, and have realized that I may have gotten very lucky

Re: New Security Issue with CF

2013-01-04 Thread Money Pit
Things must be bad if they are issuing something that ominous-sounding without a solution. -- --m@Robertson-- Janitor, The Robertson Team mysecretbase.com ~| Order the Adobe Coldfusion Anthology now!

Re: New Security Issue with CF

2013-01-04 Thread Brian Cain
Don't get me wrong, I detest hackers and their exploits, but i think the way this one works quite ingenious. My server did get hit, but after reviewing the log files and checking for changes, I don't think they did anything. I am thankful for that, cause they could have done some major damage.

Re: New Security Issue with CF

2013-01-04 Thread Claude Schnéegans
but i think the way this one works quite ingenious. I'm not sure if it is as much ingenious as the breach is gross, frankly. Have you seen how the schedule task could have been set? ~| Order the Adobe Coldfusion Anthology

Re: New Security Issue with CF

2013-01-04 Thread Steve Artis
Yes Sent from my iPhone On Jan 4, 2013, at 12:28 PM, Claude Schnéegans schneeg...@internetique.com wrote: but i think the way this one works quite ingenious. I'm not sure if it is as much ingenious as the breach is gross, frankly. Have you seen how the schedule task could have been

Fwd: New Security Issue with CF

2013-01-04 Thread Steve Artis
: New Security Issue with CF Reply-To: cf-talk@houseoffusion.commailto:cf-talk@houseoffusion.com Yes Sent from my iPhone On Jan 4, 2013, at 12:28 PM, Claude Schnéegans schneeg...@internetique.commailto:schneeg...@internetique.com wrote: but i think the way this one works quite ingenious. I'm

RE: New Security Issue with CF

2013-01-04 Thread Eric Bourland
- From: Steve Artis [mailto:st...@artisdesigns.com] Sent: Friday, January 04, 2013 1:30 PM To: cf-talk Subject: Re: New Security Issue with CF Yes Sent from my iPhone On Jan 4, 2013, at 12:28 PM, Claude Schnéegans schneeg...@internetique.com wrote: but i think the way this one works

Re: New Security Issue with CF

2013-01-04 Thread Claude Schnéegans
I downloaded and reviewed the h.cfm file -- yeah, it is pretty clever. The file itself is some tool designed to be used by developers, probably not developed by rhe hacker himself. He just found a way to store it on servers. but how did that hacker place the h.cfm file in /CFIDE/ to begin

Re: New Security Issue with CF

2013-01-04 Thread Justin Scott
The file itself is some tool designed to be used by developers, probably not developed by rhe hacker himself. He just found a way to store it on servers. I've seen this tool make the rounds before through other attack vectors. It's been around since at least ColdFusion MX 6. The

Re: New Security Issue with CF

2013-01-04 Thread Brian Cain
I agree. It is the insertion method I am intrigued by. It is that type of non linear thinking that we as developers use to create elegant solutions. The tool is ugly, and not that special, but the insertion method is clever. What I don't understand is why adobe would allow something like

RE: New Security Issue with CF

2013-01-04 Thread Eric Bourland
PM To: cf-talk Subject: Re: New Security Issue with CF I downloaded and reviewed the h.cfm file -- yeah, it is pretty clever. The file itself is some tool designed to be used by developers, probably not developed by rhe hacker himself. He just found a way to store it on servers. but how did

Fwd: New Security Issue with CF

2013-01-03 Thread Robert Rhodes
...@gmail.com Date: Thu, Jan 3, 2013 at 12:00 AM Subject: Re: New Security Issue with CF To: cf-talk@houseoffusion.com Thanks. I saw that afterwards. I was freaking out a bit there. Still am. :( I have gone through the logs on that server (windows 2008 R2 server running IIS7.5 and CF9.02

New Security Issue with CF

2013-01-02 Thread Larry Lyons
A new CF security issue was just discovered a few days ago. You may want to forward this information to whomever is your CF Admin. http://www.carehart.org/blog/client/index.cfm/2013/1/2/serious_security_threat To make a very long story short, the exploit allows a hacker to upload a file

Re: New Security Issue with CF

2013-01-02 Thread Russ Michaels
and also read the following article. http://www.michaels.me.uk/post.cfm/securing-your-coldfusionmx-installation-on-windows On Wed, Jan 2, 2013 at 7:47 PM, Larry Lyons larrycly...@gmail.com wrote: A new CF security issue was just discovered a few days ago. You may want to forward

Re: New Security Issue with CF

2013-01-02 Thread Money Pit
Thanks for posting. I thought I had my stuff locked down pretty well but I screwed up and left a door open. The nature of this is almost unbelievably nasty. -- --m@Robertson-- Janitor, The Robertson Team mysecretbase.com ~|

Re: New Security Issue with CF

2013-01-02 Thread Robert Rhodes
Lyons larrycly...@gmail.com wrote: A new CF security issue was just discovered a few days ago. You may want to forward this information to whomever is your CF Admin. http://www.carehart.org/blog/client/index.cfm/2013/1/2/serious_security_threat To make a very long story short

Re: New Security Issue with CF

2013-01-02 Thread Raymond Camden
Michaels r...@michaels.me.uk wrote: and also read the following article. http://www.michaels.me.uk/post.cfm/securing-your-coldfusionmx-installation-on-windows On Wed, Jan 2, 2013 at 7:47 PM, Larry Lyons larrycly...@gmail.com wrote: A new CF security issue was just discovered

RE: New Security Issue with CF

2013-01-02 Thread Eric Bourland
needed to lock down the /CFIDE/ directory, yet make /CFIDE/scripts/ available for use by ColdFusion? All of my web sites and databases seem unaltered. But I am obviously a nervous wreck about this new security hole. Eric -Original Message- From: Raymond Camden [mailto:raymondcam...@gmail.com

Re: New Security Issue with CF

2013-01-02 Thread Robert Rhodes
security issue was just discovered a few days ago. You may want to forward this information to whomever is your CF Admin. http://www.carehart.org/blog/client/index.cfm/2013/1/2/serious_security_threat To make a very long story short, the exploit allows a hacker

Re: New Security Issue with CF

2013-01-02 Thread Wil Genovese
at 7:47 PM, Larry Lyons larrycly...@gmail.com wrote: A new CF security issue was just discovered a few days ago. You may want to forward this information to whomever is your CF Admin. http://www.carehart.org/blog/client/index.cfm/2013/1/2/serious_security_threat To make a very

Re: New Security Issue with CF

2013-01-02 Thread Wil Genovese
, Jan 2, 2013 at 7:47 PM, Larry Lyons larrycly...@gmail.com wrote: A new CF security issue was just discovered a few days ago. You may want to forward this information to whomever is your CF Admin. http://www.carehart.org/blog/client/index.cfm/2013/1/2/serious_security_threat

Re: Security Question(s)

2012-11-20 Thread Pete Freitag
On Mon, Nov 19, 2012 at 1:48 PM, Jamie Bowers jamiembow...@netscape.netwrote: Somewhat related, how do I determine that any hot-fix or security patch I may download and install is indeed installed? Jamie, one thing I'd like to point out is that if your are using CF7 then you have unpatched

Re: Security Question(s)

2012-11-19 Thread Jamie Bowers
fusion security premier online about these kinds of things somewhere? I'd start with the CF 9 Lockdown Guide - while it doesn't really talk about secure programming specifically, it does give you an idea of the range and functionality of vulnerabilities. That is really well written, and I

Re: Security Question(s)

2012-11-16 Thread Jamie Bowers
I haven't done Coldfusion since CF4, however recently have been tasked to look at a CF7MX appilication that has 3 security issues they are looking to fix. 1. Cross Site Scripting - I believe I have this one figured out using the Admin Pannel's Enable global script protection 2

Re: Security Question(s)

2012-11-16 Thread Russ Michaels
appilication that has 3 security issues they are looking to fix. 1. Cross Site Scripting - I believe I have this one figured out using the Admin Pannel's Enable global script protection 2. Format String Injection 3. Parameter Based Buffer Overflow I have been able to find

Re: Security Question(s)

2012-11-16 Thread Dave Watts
security premier online about these kinds of things somewhere? I'd start with the CF 9 Lockdown Guide - while it doesn't really talk about secure programming specifically, it does give you an idea of the range and functionality of vulnerabilities. That is really well written, and I think every CF

Security Question(s)

2012-11-15 Thread Jamie Bowers
I haven't done Coldfusion since CF4, however recently have been tasked to look at a CF7MX appilication that has 3 security issues they are looking to fix. 1. Cross Site Scripting - I believe I have this one figured out using the Admin Pannel's Enable global script protection 2. Format String

Re: Security Question(s)

2012-11-15 Thread Russ Michaels
/ The quick and simple solution would probably be to use Fuseguard. http://foundeo.com/security/ On Thu, Nov 15, 2012 at 4:55 PM, Jamie Bowers jamiembow...@netscape.netwrote: I haven't done Coldfusion since CF4, however recently have been tasked to look at a CF7MX appilication that has 3

RE: Security Question(s)

2012-11-15 Thread Eric Roberts
...@threeravensconsulting.com tel: 630-486-5255 fax: 630-310-8531 http://www.threeravensconsulting.com -Original Message- From: Jamie Bowers [mailto:jamiembow...@netscape.net] Sent: Thursday, November 15, 2012 10:55 AM To: cf-talk Subject: Security Question(s) I haven't

Re: Security Question(s)

2012-11-15 Thread Jamie Bowers
...@threeravensconsulting.com tel: 630-486-5255 fax: 630-310-8531 http://www.threeravensconsulting.com I haven't done Coldfusion since CF4, however recently have been tasked to look at a CF7MX appilication that has 3 security issues they are looking to fix. 1. Cross Site Scripting

Re: Security Question(s)

2012-11-15 Thread Dave Watts
I haven't done Coldfusion since CF4, however recently have been tasked to look at a CF7MX appilication that has 3 security issues they are looking to fix. 1. Cross Site Scripting - I believe I have this one figured out using the Admin Pannel's Enable global script protection 2. Format

Resolving security vulnerability

2012-10-04 Thread fun and learning
Hi All, I am using input hidden fields for some CGI variables. The security scan has issued 'information leakage' threat. These variables are defined in a file and the file is included in various places. What is the best way to resolve this vulnerability? Thanks

Re: Resolving security vulnerability

2012-10-04 Thread Rob Voyle
Hi I created a template that checks variables against threats and then use a collection=#form# cfloop that tests all form variables including the hidden fields against the threats. It solved that particular PCI security compliance check. rob On 4 Oct 2012 at 9:57, fun and learning wrote

Re: Resolving security vulnerability

2012-10-04 Thread Russ Michaels
and then use a collection=#form# cfloop that tests all form variables including the hidden fields against the threats. It solved that particular PCI security compliance check. rob On 4 Oct 2012 at 9:57, fun and learning wrote: Hi All, I am using input hidden fields for some CGI

Re: Resolving security vulnerability

2012-10-04 Thread fun and learning
what information is passed around in the hidden fields, is it anything that could be used to hijack sessions, get into users accounts or personal details etc ? On Thu, Oct 4, 2012 at 3:11 PM, Rob Voyle robvo...@voyle.com wrote: It is remotehost,remoteaddress

Re: Resolving security vulnerability

2012-10-04 Thread Russ Michaels
move it into a session variable instead and that will solve that issue. On Thu, Oct 4, 2012 at 4:05 PM, fun and learning funandlrnn...@gmail.comwrote: what information is passed around in the hidden fields, is it anything that could be used to hijack sessions, get into users accounts or

Re: Resolving security vulnerability

2012-10-04 Thread Pete Freitag
? On Thu, Oct 4, 2012 at 9:57 AM, fun and learning funandlrnn...@gmail.comwrote: Hi All, I am using input hidden fields for some CGI variables. The security scan has issued 'information leakage' threat. These variables are defined in a file and the file is included in various places. What

Re: XML Security

2012-04-06 Thread Dave Watts
I was presented with some questions regarding XML and was wondering if there are any setting in Coldfusion to disable any of these or I do not need to worry about it since we do not use any XML in our code: 1.  How application employs methods for XML schema validation. 2.  How

XML Security

2012-04-05 Thread Chad Baloga
I was presented with some questions regarding XML and was wondering if there are any setting in Coldfusion to disable any of these or I do not need to worry about it since we do not use any XML in our code: 1. How application employs methods for XML schema validation. 2. How application

Re: XML Security

2012-04-05 Thread Brian Thornton
That's correct Chad. If you run linux or strict casing this is also a security improvement over loose DTD as well. It eerily close to SOX compliance questions that auditors generally ask when reviewing apps. On Thu, Apr 5, 2012 at 8:52 AM, Chad Baloga cbal...@gmail.com wrote: I was presented

Re: Fckeditor Security Issues

2011-12-03 Thread Russ Michaels
functionality entirely in Fckeditor in CF 8 9? Yes I have seen all sorts of posts trying to bypass this, but not Being a security expert myself or a Java programmer I sure would Like to hear from any of you out there what is out there for us To use in order to give our clients what Coldfusion gave us

RE: Fckeditor Security Issues

2011-12-03 Thread Terry Troxel
Russ, Thank you for your reply, but you missed my point. I am looking for any Secure methods of locking down My (F)ckeditor's File Browser as I stated I am not A security expert nor do I know how to program in Java. I do not know how to re-enable the file browser and Lock it down. I just

Re: Fckeditor Security Issues

2011-12-03 Thread Russ Michaels
see this article for options. http://www.michaels.me.uk/post.cfm/fckeditor-security-threat-in-coldfusion-8 if you want more control then you will need to install a standalone copy of fckeditor within your site and not use the one built into CF Russ On Sat, Dec 3, 2011 at 12:05 PM, Terry Troxel

RE: Fckeditor Security Issues

2011-12-03 Thread Terry Troxel
Russ, I am using the standalone editor and have been since the first attacks over a year ago, but the last couple of Coldfusion security patches have made the image browser inoperable in the standalone as well. I have file and image uploading disabled and allow users to only see the image folder

Re: Fckeditor Security Issues

2011-12-03 Thread Russ Michaels
PM, Terry Troxel terry.tro...@gmail.com wrote: Russ, I am using the standalone editor and have been since the first attacks over a year ago, but the last couple of Coldfusion security patches have made the image browser inoperable in the standalone as well. I have file and image uploading

RE: Fckeditor Security Issues

2011-12-03 Thread Terry Troxel
, December 03, 2011 2:29 PM To: cf-talk Subject: Re: Fckeditor Security Issues A coldfusion patch or update only makes changes to coldfusion and the cfadmin, it doesn't touch your website files, so if your fckeditor is breaking after and update then you must still be using the cf built in one or the error

Re: Fckeditor Security Issues

2011-12-03 Thread Russ Michaels
sure the built-in version not the standalone is disabled. Terry -Original Message- From: Russ Michaels [mailto:r...@michaels.me.uk] Sent: Saturday, December 03, 2011 2:29 PM To: cf-talk Subject: Re: Fckeditor Security Issues A coldfusion patch or update only makes changes

RE: Fckeditor Security Issues

2011-12-03 Thread Terry Troxel
Can you help me disable the built-in Version? -Original Message- From: Russ Michaels [mailto:r...@michaels.me.uk] Sent: Saturday, December 03, 2011 4:08 PM To: cf-talk Subject: Re: Fckeditor Security Issues by only disabling the built in version and not the standalone version surely

Re: Fckeditor Security Issues

2011-12-03 Thread Russ Michaels
the security issues in built in version will be disabled simply by installing the security patches and updates, you don't need to do anything else. On Sun, Dec 4, 2011 at 12:22 AM, Terry Troxel terry.tro...@gmail.com wrote: Russ, Either I am speaking a different language then you or you

RE: Fckeditor Security Issues

2011-12-03 Thread Terry Troxel
Ok, so that's handled. Why will my standalone still giving me the xml error? Terry ~| Order the Adobe Coldfusion Anthology now! http://www.amazon.com/Adobe-Coldfusion-Anthology/dp/1430272155/?tag=houseoffusion Archive:

Re: Fckeditor Security Issues

2011-12-03 Thread Dean Lawrence
Terry, It is a very easy fix. All you need to do is to add an additional argument to the JVM settings in you CF Admin. Here is a blog post which explains it. http://www.petefreitag.com/item/718.cfm On Sat, Dec 3, 2011 at 9:16 PM, Terry Troxel terry.tro...@gmail.com wrote: Ok, so that's

Fckeditor Security Issues

2011-12-02 Thread Terry Troxel
Am I correct in assuming the Adobe has turned off the Image Browser functionality entirely in Fckeditor in CF 8 9? Yes I have seen all sorts of posts trying to bypass this, but not Being a security expert myself or a Java programmer I sure would Like to hear from any of you out there what

Re: CF security update released today

2011-06-19 Thread Carl Meyer
Ditto that for CF 8.0.1 version 8,0,0,0 discussed here: http://forums.adobe.com/thread/865583?tstart=0 Not seeing any issues once hotfix is applied with datasources myself. I only access Microsoft SQL. I posted regarding CF 9.0.1 with hotfix here:

Re: CF security update released today

2011-06-19 Thread Carl Meyer
Ditto CF 9.0.1 and 8.0.1 with patch http://kb2.adobe.com/cps/907/cpsid_90784.html applied gives error when CFAdmin UI Data Services Data Sources verify all connections. CF8\runtime\log\coldfusion-out.log reports: 06/20 12:40:21 Warning [jrpp-2] - There was an error while verifying the token.

Re: CF security update released today

2011-06-19 Thread Carl Meyer
Of interest CF Server Manager verify all datasources works OK. I posted a screen cut here: http://forums.adobe.com/message/3749967#3749967 Regards, Carl. - CF 9.0.1 and 8.0.1 I'm logged out when I click on Verify all datasources in CFIDE: There was an error accessing this page. Check logs for

Re: CF security update released today

2011-06-16 Thread Mack
I'm seeing some problems after applying the update to 2 CF servers (both standard): - CF 8.0.1 the version in Server Settings Settings Summary is now 8,0,1,0; - CF 9.0.1 and 8.0.1 I'm logged out when I click on Verify all datasources in CFIDE: There was an error accessing this page. Check

CF security update released today

2011-06-14 Thread Dave Watts
http://www.adobe.com/support/security/bulletins/apsb11-14.html -- Dave Watts, CTO, Fig Leaf Software http://www.figleaf.com/ http://training.figleaf.com/ Fig Leaf Software is a Veteran-Owned Small Business (VOSB) on GSA Schedule, and provides the highest caliber vendor-authorized instruction

RE: cgi.host_name Security Exploit

2011-05-21 Thread Bobby Hartsfield
To: cf-talk Subject: Re: cgi.host_name Security Exploit What about an ecommerce system that hits the test ecom system when in dev mode? If I knew your code did that, or suspected, I'd try it and use one of the many common test CC numbers, like 4111. Actually, I've seen that number work

Re: cgi.host_name Security Exploit

2011-05-19 Thread Raymond Camden
a security flaw that I have reported to the Adobe team regarding the use of the variable cgi.host_name. As you know, the cgi.host_name is typically the hostname of the server or the websites domain name. I've discovered an exploit that allows a user to basically change this variable

  1   2   3   4   5   6   7   8   9   10   >