I have always installed FCK instead of using the bundled version...it allows
me to make sure that i have the latest version without effecting CF.  I am
not a fan of bundled/integrated anything...I think Office being the
exception...why would you want all of your eggs in one basket?

Eric

On Mon, Jul 6, 2009 at 9:13 AM, Dave l <cfl...@jamwerx.com> wrote:

>
> Thats the trouble with bundling things. I used to think it was nice but
> really it creates these types of things.
>
> Have you seen the video of the guy hacking sites with this?
>
>
>
>
> > It's not a CF-only issue. However, CF comes bundled with FCKEditor and
> > other scripting languages don't.
> >
> > If you don't allow uploads to web accessible directories, you don't
> > have anything to worry about. However, the default install of CF 8.0.1
> > on Windows does allow uploads to web accessible directories.
> >
> > Dave Watts, CTO, Fig Leaf Software
> >
> > -----Original Message-----
> > From: Dave l <cfl...@jamwerx.com>
> > Sent: Sunday, 05 July, 2009 13:37
> > To: cf-talk <cf-talk@houseoffusion.com>
> > Subject: Re: New CF8 vulnerability
> >
> >
> > "If there's a default web accessible URL path for uploaded files"
> > Well that's why you don't do it. I have done it but I don't anymore.
> >
> > That's true with any server, any platform, any scripting language, I
> > don't know why they are making this out to be a cf only issue.
> >
> > I have 3 hd's,
> > #1 is the os and apps,
> > #2 is partitioned with 99.9% of it beingbu stuff and the rest is just
> > few folders that the uploads go into and run thru doing what needs to
> > be done with them.
> > #3 is web server.
> >
> > So cfm files an only be run out of the #3 hd. So if I upload the files
> > to an isolated partition with min permissions how who they run that cf
> > file? That drive isn't accessible from the web & I have no ftps or any
> > incoming connections to that drive. They could of course hack into the
> > server itself and then move the file manually to the web server drive
> > then go get it ;)
> >
> > > If there's a default web accessible URL path for uploaded files, ,
> > and
> > > that directory is configured to execute CF files, an attacker can
> > > simply upload a .cfm file, and run it to do anything CF can do:
> > > CFEXECUTE, access databases, connect to outbound FTP servers, etc.
> > You
> > > may not allow the first of those, but it's far less likely you're
> > > blocking the others.
> > >
> > > Dave Watts, CTO, Fig Leaf Software
> > >
> > > -----Original Message-----
> > > From: Dave l <cfl...@jamwerx.com>
> > > Sent: Sunday, 05 July, 2009 09:46
> > > To: cf-talk <cf-talk@houseoffusion.com>
> > > Subject: Re: New CF8 vulnerability
> > >
> > >
> > > "There's nothing OS-specific about the vulnerability, as far as I
> > can
> > > see. "
> > > I'm sure it more about a "location" that is easy to guess.. maybe
> > the
> > > default fk one.
> > > Although them exe's are gunna have a bitch of a time running on a lt
> >
> > > 1gb sectioned partition with no rights on my  xserver.
> > >
> > > To many people probably upload to /uploads (i'm guilty) so it
> > > shouldn't be to difficult.
> > >
> >
> >
>
>
> 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|
Want to reach the ColdFusion community with something they want? Let them know 
on the House of Fusion mailing lists
Archive: 
http://www.houseoffusion.com/groups/cf-talk/message.cfm/messageid:324241
Subscription: http://www.houseoffusion.com/groups/cf-talk/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=89.70.4

Reply via email to