CVE-2019-8072 (GCVE-0-2019-8072)
Vulnerability from cvelistv5 – Published: 2019-09-27 15:16 – Updated: 2024-08-04 21:10
VLAI?
Summary
ColdFusion 2018- update 4 and earlier and ColdFusion 2016- update 11 and earlier have a Security bypass vulnerability. Successful exploitation could lead to Information Disclosure in the context of the current user.
Severity ?
No CVSS data available.
CWE
- Security bypass
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Adobe | Cold Fusion |
Affected:
ColdFusion 2018- update 4 and earlier
Affected: ColdFusion 2016- update 11 and earlier |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T21:10:32.470Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://helpx.adobe.com/security/products/coldfusion/apsb19-47.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Cold Fusion",
"vendor": "Adobe",
"versions": [
{
"status": "affected",
"version": "ColdFusion 2018- update 4 and earlier"
},
{
"status": "affected",
"version": "ColdFusion 2016- update 11 and earlier"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "ColdFusion 2018- update 4 and earlier and ColdFusion 2016- update 11 and earlier have a Security bypass vulnerability. Successful exploitation could lead to Information Disclosure in the context of the current user."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Security bypass",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-09-27T15:16:54",
"orgId": "078d4453-3bcd-4900-85e6-15281da43538",
"shortName": "adobe"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://helpx.adobe.com/security/products/coldfusion/apsb19-47.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2019-8072",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cold Fusion",
"version": {
"version_data": [
{
"version_value": "ColdFusion 2018- update 4 and earlier"
},
{
"version_value": "ColdFusion 2016- update 11 and earlier"
}
]
}
}
]
},
"vendor_name": "Adobe"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "ColdFusion 2018- update 4 and earlier and ColdFusion 2016- update 11 and earlier have a Security bypass vulnerability. Successful exploitation could lead to Information Disclosure in the context of the current user."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Security bypass"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://helpx.adobe.com/security/products/coldfusion/apsb19-47.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/coldfusion/apsb19-47.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538",
"assignerShortName": "adobe",
"cveId": "CVE-2019-8072",
"datePublished": "2019-09-27T15:16:54",
"dateReserved": "2019-02-12T00:00:00",
"dateUpdated": "2024-08-04T21:10:32.470Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:coldfusion:2016:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"B262F442-FF7F-4CC0-A9C5-FFD0EDB08E38\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:coldfusion:2016:update1:*:*:*:*:*:*\", \"matchCriteriaId\": \"9F3D7C8E-6695-44DF-AC9A-1AE09C46C529\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:coldfusion:2016:update10:*:*:*:*:*:*\", \"matchCriteriaId\": \"449A07A6-1D7A-49CF-9316-5EAAFAF38956\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:coldfusion:2016:update11:*:*:*:*:*:*\", \"matchCriteriaId\": \"C5265059-D9DD-44E6-B68C-81838BCA64C5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:coldfusion:2016:update2:*:*:*:*:*:*\", \"matchCriteriaId\": \"12BAE66C-A745-4661-B5BB-7FC2C169CC82\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:coldfusion:2016:update3:*:*:*:*:*:*\", \"matchCriteriaId\": \"E6EC92F3-1EF8-4820-9CD8-ECEA03D27A7B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:coldfusion:2016:update4:*:*:*:*:*:*\", \"matchCriteriaId\": \"D7446D70-D616-4EC1-BC64-41CDE56EFEAE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:coldfusion:2016:update5:*:*:*:*:*:*\", \"matchCriteriaId\": \"59453B01-EAAF-4291-B2C2-98835F5AFE80\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:coldfusion:2016:update6:*:*:*:*:*:*\", \"matchCriteriaId\": \"63076ED8-FC30-40B1-99A7-D0069423A536\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:coldfusion:2016:update7:*:*:*:*:*:*\", \"matchCriteriaId\": \"E4B4228E-6FBD-492A-8F93-30B1D6861C81\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:coldfusion:2016:update8:*:*:*:*:*:*\", \"matchCriteriaId\": \"7D4F5639-F628-4163-BFBA-25B4E7B2DFDE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:coldfusion:2016:update9:*:*:*:*:*:*\", \"matchCriteriaId\": \"5BC3FFF1-A25A-4C15-9162-1DA58350DAFE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:coldfusion:2018:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"3B54B2B0-B1E1-4B4E-A529-D0BD3B5DEEF3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:coldfusion:2018:update1:*:*:*:*:*:*\", \"matchCriteriaId\": \"EDB126BF-E09D-4E58-A39F-1190407D1CAB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:coldfusion:2018:update2:*:*:*:*:*:*\", \"matchCriteriaId\": \"59649177-81EE-43C3-BFA5-E56E65B486DF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:coldfusion:2018:update3:*:*:*:*:*:*\", \"matchCriteriaId\": \"453B96ED-738A-4642-B461-C5216CF45CA3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:coldfusion:2018:update4:*:*:*:*:*:*\", \"matchCriteriaId\": \"58D32489-627B-4E49-9329-8A3B8F8E4903\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"ColdFusion 2018- update 4 and earlier and ColdFusion 2016- update 11 and earlier have a Security bypass vulnerability. Successful exploitation could lead to Information Disclosure in the context of the current user.\"}, {\"lang\": \"es\", \"value\": \"ColdFusion 2018 - update 4 y anteriores y ColdFusion 2016 - update 11 y anteriores, presentan una vulnerabilidad de omisi\\u00f3n de la Seguridad. Su explotaci\\u00f3n con \\u00e9xito podr\\u00eda conllevar a una divulgaci\\u00f3n de informaci\\u00f3n en el contexto del usuario actual.\"}]",
"id": "CVE-2019-8072",
"lastModified": "2024-11-21T04:49:13.940",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:N/A:N\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2019-09-27T16:15:10.763",
"references": "[{\"url\": \"https://helpx.adobe.com/security/products/coldfusion/apsb19-47.html\", \"source\": \"psirt@adobe.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://helpx.adobe.com/security/products/coldfusion/apsb19-47.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "psirt@adobe.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2019-8072\",\"sourceIdentifier\":\"psirt@adobe.com\",\"published\":\"2019-09-27T16:15:10.763\",\"lastModified\":\"2024-11-21T04:49:13.940\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"ColdFusion 2018- update 4 and earlier and ColdFusion 2016- update 11 and earlier have a Security bypass vulnerability. Successful exploitation could lead to Information Disclosure in the context of the current user.\"},{\"lang\":\"es\",\"value\":\"ColdFusion 2018 - update 4 y anteriores y ColdFusion 2016 - update 11 y anteriores, presentan una vulnerabilidad de omisi\u00f3n de la Seguridad. Su explotaci\u00f3n con \u00e9xito podr\u00eda conllevar a una divulgaci\u00f3n de informaci\u00f3n en el contexto del usuario actual.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:coldfusion:2016:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"B262F442-FF7F-4CC0-A9C5-FFD0EDB08E38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:coldfusion:2016:update1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F3D7C8E-6695-44DF-AC9A-1AE09C46C529\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:coldfusion:2016:update10:*:*:*:*:*:*\",\"matchCriteriaId\":\"449A07A6-1D7A-49CF-9316-5EAAFAF38956\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:coldfusion:2016:update11:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5265059-D9DD-44E6-B68C-81838BCA64C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:coldfusion:2016:update2:*:*:*:*:*:*\",\"matchCriteriaId\":\"12BAE66C-A745-4661-B5BB-7FC2C169CC82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:coldfusion:2016:update3:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6EC92F3-1EF8-4820-9CD8-ECEA03D27A7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:coldfusion:2016:update4:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7446D70-D616-4EC1-BC64-41CDE56EFEAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:coldfusion:2016:update5:*:*:*:*:*:*\",\"matchCriteriaId\":\"59453B01-EAAF-4291-B2C2-98835F5AFE80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:coldfusion:2016:update6:*:*:*:*:*:*\",\"matchCriteriaId\":\"63076ED8-FC30-40B1-99A7-D0069423A536\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:coldfusion:2016:update7:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4B4228E-6FBD-492A-8F93-30B1D6861C81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:coldfusion:2016:update8:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D4F5639-F628-4163-BFBA-25B4E7B2DFDE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:coldfusion:2016:update9:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BC3FFF1-A25A-4C15-9162-1DA58350DAFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:coldfusion:2018:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B54B2B0-B1E1-4B4E-A529-D0BD3B5DEEF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:coldfusion:2018:update1:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDB126BF-E09D-4E58-A39F-1190407D1CAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:coldfusion:2018:update2:*:*:*:*:*:*\",\"matchCriteriaId\":\"59649177-81EE-43C3-BFA5-E56E65B486DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:coldfusion:2018:update3:*:*:*:*:*:*\",\"matchCriteriaId\":\"453B96ED-738A-4642-B461-C5216CF45CA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:coldfusion:2018:update4:*:*:*:*:*:*\",\"matchCriteriaId\":\"58D32489-627B-4E49-9329-8A3B8F8E4903\"}]}]}],\"references\":[{\"url\":\"https://helpx.adobe.com/security/products/coldfusion/apsb19-47.html\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://helpx.adobe.com/security/products/coldfusion/apsb19-47.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…