Yes there are resources online regarding this type of thing, did you check
the links I sent you in my previous reply.



On Fri, Nov 16, 2012 at 4:50 PM, Jamie Bowers <[email protected]>wrote:

>
> > > I haven't done Coldfusion since CF4, however recently have been
> > tasked to look at a CF7MX appilication that has 3 security
> > > issues they are looking to fix.
> > >
> > > 1. Cross Site Scripting - I believe I have this one figured out
> > using the Admin Pannel's "Enable global script protection"
> > > 2. Format String Injection
> > > 3. Parameter Based Buffer Overflow
> > >
> > > I have been able to find generalized information on the other two
> > issues, but nothing as it relates to CF itself. Will the "Enable
> > > global script protection" fix these other two as well or should I be
> > looking elsewhere? Everything I am finding has to do with SQL
> > > injection and not Format String Injection, and I'm finding nothing
> > on Parameter Based Buffer Overflow.
> >
> > First, no, enabling global script protection will not fix all three
> > issues. In fact, it's not guaranteed to fix XSS issues; although it
> > may block many XSS attacks, it doesn't prevent XSS attacks generally,
> > it just filters data for known XSS attack strings.
> >
> > XSS attacks occur when an attacker can send client-side executable
> > code (typically JavaScript, but it could be anything else that an
> > HTML
> > page can tell a local computer to do) to your server, and your server
> > stores that and later delivers it to other users. The attack isn't
> > really targeting the server specifically, but rather those other
> > users.
> >
> > The other two things are attacks on your server, and are basically
> > similar to SQL injection: the attacker sends a value that your code
> > takes and passes directly to a function. XSS filtering has nothing to
> > do with them. For example, let's say you have a line of code like
> > this:
> >
> > <cfinclude template="#form.nextpage#.cfm">
> >
> > An attacker could inject a value there, because you're taking data
> > directly from the browser and using it to do something. Now, that
> > specific attack wouldn't be very helpful to an attacker in most cases,
> >
> > but it shows you what I mean, I guess.
> >
> > Dave Watts, CTO, Fig Leaf Software
> > http://www.figleaf.com/
> > http://training.figleaf.com/
> >
> > Fig Leaf Software is a Veteran-Owned Small Business (VOSB) on
> > GSA Schedule, and provides the highest caliber vendor-authorized
> > instruction at our training centers, online, or onsite.
>
>
> And using the cfparam tags will help stop these type of attacks?
>
> Is there a good cold fusion security premier online about these kinds of
> things somewhere?
>
> By the way Figleaf is where I took my ColdFusion training way back when
> CF3 was the latest and greatest.
>
> Jamie
>
> 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|
Order the Adobe Coldfusion Anthology now!
http://www.amazon.com/Adobe-Coldfusion-Anthology/dp/1430272155/?tag=houseoffusion
Archive: 
http://www.houseoffusion.com/groups/cf-talk/message.cfm/messageid:353210
Subscription: http://www.houseoffusion.com/groups/cf-talk/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/groups/cf-talk/unsubscribe.cfm

Reply via email to