I would say that most folks running their own web server with no previous
expereince usually do leave great big holes.
running every site under the default iis user
not removing everyone group from drives
not sandboxing coldfusion
these  things can allow code in any sites to read/read to any other site,
including the default website where the cfide lives.



On Thu, Feb 23, 2012 at 4:50 AM, Tony <[email protected]> wrote:

>
> I didnt, was in a meeting, fwd'd all msgs to him and didn't go back and
> read... but it wouldn't hurt to read myself :)
>
> On Wednesday, February 22, 2012, Dave Watts wrote:
>
> >
> > > any idea how they were able to get the file that ran into the cfide
> > > directory? and what might prevent that part?
> > > that's the most haunting part to him.  i said it was probably a
> > > windows exploit first... not sure tho.
> >
> > Did you read my initial response? It describes the likely
> > possibilities for writing a file.
> >
> > It probably wasn't a Windows exploit actually, unless you happen to be
> > running Windows 2000 or something. IIS and Windows are fairly secure
> > "out of the box" and don't have remote exploits that let you write
> > files via HTTP requests, unless you enable WebDAV.
> >
> > Dave Watts, CTO, Fig Leaf Software
> > http://www.figleaf.com/
> > http://training.figleaf.com/
> >
> > Fig Leaf Software is a Veteran-Owned Small Business (VOSB) on
> > GSA Schedule, and provides the highest caliber vendor-authorized
> > instruction at our training centers, online, or onsite
> >
> >
>
> 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|
Order the Adobe Coldfusion Anthology now!
http://www.amazon.com/Adobe-Coldfusion-Anthology/dp/1430272155/?tag=houseoffusion
Archive: 
http://www.houseoffusion.com/groups/cf-talk/message.cfm/messageid:350065
Subscription: http://www.houseoffusion.com/groups/cf-talk/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/groups/cf-talk/unsubscribe.cfm

Reply via email to