Known Exploited Vulnerability
7.4
HIGH
CVE-2024-20767
Adobe ColdFusion Improper Access Control Vulnerabi - [Actively Exploited]
Description

ColdFusion versions 2023.6, 2021.12 and earlier are affected by an Improper Access Control vulnerability that could result in arbitrary file system read. An attacker could leverage this vulnerability to access or modify restricted files. Exploitation of this issue does not require user interaction. Exploitation of this issue requires the admin panel be exposed to the internet.

INFO

Published Date :

March 18, 2024, 12:15 p.m.

Last Modified :

Dec. 17, 2024, 2 a.m.

Remotely Exploitable :

Yes !

Impact Score :

5.2

Exploitability Score :

2.2
CISA Notification
CISA KEV (Known Exploited Vulnerabilities)

For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild.

Description :

Adobe ColdFusion contains an improper access control vulnerability that could allow an attacker to access or modify restricted files via an internet-exposed admin panel.

Required Action :

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Notes :

https://helpx.adobe.com/security/products/coldfusion/apsb24-14.html ; https://nvd.nist.gov/vuln/detail/CVE-2024-20767

Public PoC/Exploit Available at Github

CVE-2024-20767 has a 21 public PoC/Exploit available at Github. Go to the Public Exploits tab to see the list.

Affected Products

The following products are affected by CVE-2024-20767 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Adobe coldfusion
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2024-20767.

URL Resource
https://helpx.adobe.com/security/products/coldfusion/apsb24-14.html Vendor Advisory
https://helpx.adobe.com/security/products/coldfusion/apsb24-14.html Vendor Advisory

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

None

Updated: 3 days, 7 hours ago
0 stars 0 fork 0 watcher
Born at : Dec. 19, 2024, 1:46 a.m. This repo has been linked 123 different CVEs too.

None

Updated: 3 months, 1 week ago
0 stars 0 fork 0 watcher
Born at : Sept. 9, 2024, 1:28 a.m. This repo has been linked 128 different CVEs too.

None

HTML

Updated: 2 months, 3 weeks ago
2 stars 1 fork 1 watcher
Born at : Sept. 4, 2024, 9:24 a.m. This repo has been linked 128 different CVEs too.

Tiger是一款在攻防演练中对目标资产重点系统指纹识别、精准漏扫的工具。是一款打点神器。

Updated: 3 weeks, 2 days ago
104 stars 8 fork 8 watcher
Born at : Aug. 18, 2024, 7:19 a.m. This repo has been linked 29 different CVEs too.

None

HTML

Updated: 4 weeks, 1 day ago
6 stars 0 fork 0 watcher
Born at : Aug. 2, 2024, 6:07 a.m. This repo has been linked 123 different CVEs too.

2024 HVV情报速递~

Updated: 2 weeks, 3 days ago
104 stars 26 fork 26 watcher
Born at : July 29, 2024, 6:09 a.m. This repo has been linked 14 different CVEs too.

None

Updated: 1 month ago
4 stars 0 fork 0 watcher
Born at : June 14, 2024, 6:54 a.m. This repo has been linked 95 different CVEs too.

None

HTML Python

Updated: 5 months, 3 weeks ago
13 stars 1 fork 1 watcher
Born at : April 17, 2024, 8:46 a.m. This repo has been linked 100 different CVEs too.

Exploit for CVE-2024-20767 affecting Adobe ColdFusion

Python

Updated: 8 months, 2 weeks ago
1 stars 0 fork 0 watcher
Born at : April 1, 2024, 9:01 a.m. This repo has been linked 1 different CVEs too.

None

Python

Updated: 8 months, 3 weeks ago
0 stars 0 fork 0 watcher
Born at : March 28, 2024, 7:46 a.m. This repo has been linked 1 different CVEs too.

Exploit Toolkit for Adobe ColdFusion CVE-2024-20767 Vulnerability

Python

Updated: 4 months, 1 week ago
8 stars 1 fork 1 watcher
Born at : March 26, 2024, 7:17 p.m. This repo has been linked 1 different CVEs too.

Proof of Concept for CVE-2024-20767. Arbitrary file read from Adobe ColdFusion

Python

Updated: 8 months, 2 weeks ago
1 stars 0 fork 0 watcher
Born at : March 26, 2024, 10:03 a.m. This repo has been linked 1 different CVEs too.

Exploit for CVE-2024-20767 - Adobe ColdFusion

adobe coldfusion cve-2024-20767

Python

Updated: 2 weeks, 1 day ago
32 stars 9 fork 9 watcher
Born at : March 26, 2024, 6:51 a.m. This repo has been linked 1 different CVEs too.

Ini adalah repository kumpulan CVE v.5

allcve cve cvelist newcve

Updated: 4 months, 2 weeks ago
2 stars 0 fork 0 watcher
Born at : March 24, 2024, 3:01 p.m. This repo has been linked 1214 different CVEs too.

收集整理漏洞EXP/POC,大部分漏洞来源网络,目前收集整理了1300多个poc/exp,长期更新。

poc

Updated: 2 weeks, 5 days ago
4250 stars 867 fork 867 watcher
Born at : Aug. 19, 2023, 12:08 p.m. This repo has been linked 159 different CVEs too.

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2024-20767 vulnerability anywhere in the article.

  • The Hacker News
CISA and FBI Raise Alerts on Exploited Flaws and Expanding HiatusRAT Campaign

Network Security / IoT Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added two security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidenc ... Read more

Published Date: Dec 17, 2024 (5 days, 3 hours ago)
  • Cybersecurity News
Critical Windows and Adobe ColdFusion Vulnerabilities Actively Exploited in the Wild, PoC Exploit Published

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning about two critical vulnerabilities being actively exploited by malicious actors. These flaws, impacting bo ... Read more

Published Date: Dec 17, 2024 (5 days, 7 hours ago)
  • BleepingComputer
Windows kernel bug now exploited in attacks to gain SYSTEM privileges

CISA has warned U.S. federal agencies to secure their systems against ongoing attacks targeting a high-severity Windows kernel vulnerability. Tracked as CVE-2024-35250, this security flaw is due to an ... Read more

Published Date: Dec 16, 2024 (5 days, 13 hours ago)
  • security.nl
VS meldt actief misbruik van lekken in Windows-kernel en Adobe ColdFusion

Aanvallers maken actief misbruik van kwetsbaarheden in de Windows-kernel en Adobe ColdFusion, zo waarschuwt het Amerikaanse cyberagentschap CISA. Het gaat als eerste om CVE-2024-35250, een beveiliging ... Read more

Published Date: Dec 16, 2024 (5 days, 16 hours ago)

The following table lists the changes that have been made to the CVE-2024-20767 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE CISA KEV Update by 9119a7d8-5eab-497f-8521-727c672e3725

    Dec. 17, 2024

    Action Type Old Value New Value
    Added Date Added 2024-12-16
    Added Due Date 2025-01-06
    Added Vulnerability Name Adobe ColdFusion Improper Access Control Vulnerability
    Added Required Action Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
  • Modified Analysis by [email protected]

    Dec. 13, 2024

    Action Type Old Value New Value
    Added CVSS V3.1 NIST AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
    Removed CVSS V3.1 NIST AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
  • CVE Modified by [email protected]

    Dec. 12, 2024

    Action Type Old Value New Value
    Changed Description ColdFusion versions 2023.6, 2021.12 and earlier are affected by an Improper Access Control vulnerability that could lead to arbitrary file system read. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access to sensitive files and perform arbitrary file system write. Exploitation of this issue does not require user interaction. ColdFusion versions 2023.6, 2021.12 and earlier are affected by an Improper Access Control vulnerability that could result in arbitrary file system read. An attacker could leverage this vulnerability to access or modify restricted files. Exploitation of this issue does not require user interaction. Exploitation of this issue requires the admin panel be exposed to the internet.
    Added CVSS V3.1 AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
    Removed CVSS V3.1 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
  • Initial Analysis by [email protected]

    Dec. 04, 2024

    Action Type Old Value New Value
    Added CVSS V3.1 NIST AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
    Added CWE NIST NVD-CWE-noinfo
    Added CPE Configuration OR *cpe:2.3:a:adobe:coldfusion:2021:-:*:*:*:*:*:* *cpe:2.3:a:adobe:coldfusion:2021:update1:*:*:*:*:*:* *cpe:2.3:a:adobe:coldfusion:2021:update10:*:*:*:*:*:* *cpe:2.3:a:adobe:coldfusion:2021:update11:*:*:*:*:*:* *cpe:2.3:a:adobe:coldfusion:2021:update12:*:*:*:*:*:* *cpe:2.3:a:adobe:coldfusion:2021:update2:*:*:*:*:*:* *cpe:2.3:a:adobe:coldfusion:2021:update3:*:*:*:*:*:* *cpe:2.3:a:adobe:coldfusion:2021:update4:*:*:*:*:*:* *cpe:2.3:a:adobe:coldfusion:2021:update5:*:*:*:*:*:* *cpe:2.3:a:adobe:coldfusion:2021:update6:*:*:*:*:*:* *cpe:2.3:a:adobe:coldfusion:2021:update7:*:*:*:*:*:* *cpe:2.3:a:adobe:coldfusion:2021:update8:*:*:*:*:*:* *cpe:2.3:a:adobe:coldfusion:2021:update9:*:*:*:*:*:* *cpe:2.3:a:adobe:coldfusion:2023:-:*:*:*:*:*:* *cpe:2.3:a:adobe:coldfusion:2023:update1:*:*:*:*:*:* *cpe:2.3:a:adobe:coldfusion:2023:update2:*:*:*:*:*:* *cpe:2.3:a:adobe:coldfusion:2023:update3:*:*:*:*:*:* *cpe:2.3:a:adobe:coldfusion:2023:update4:*:*:*:*:*:* *cpe:2.3:a:adobe:coldfusion:2023:update5:*:*:*:*:*:* *cpe:2.3:a:adobe:coldfusion:2023:update6:*:*:*:*:*:*
    Changed Reference Type https://helpx.adobe.com/security/products/coldfusion/apsb24-14.html No Types Assigned https://helpx.adobe.com/security/products/coldfusion/apsb24-14.html Vendor Advisory
    Changed Reference Type https://helpx.adobe.com/security/products/coldfusion/apsb24-14.html No Types Assigned https://helpx.adobe.com/security/products/coldfusion/apsb24-14.html Vendor Advisory
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference https://helpx.adobe.com/security/products/coldfusion/apsb24-14.html
  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • CVE Received by [email protected]

    Mar. 18, 2024

    Action Type Old Value New Value
    Added Description ColdFusion versions 2023.6, 2021.12 and earlier are affected by an Improper Access Control vulnerability that could lead to arbitrary file system read. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access to sensitive files and perform arbitrary file system write. Exploitation of this issue does not require user interaction.
    Added Reference Adobe Systems Incorporated https://helpx.adobe.com/security/products/coldfusion/apsb24-14.html [No types assigned]
    Added CWE Adobe Systems Incorporated CWE-284
    Added CVSS V3.1 Adobe Systems Incorporated AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2024-20767 is associated with the following CWEs:

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability