> Adam Berry said:
> "The security bulletin explains the potential impact of the 
> security issues. Since these issues were discovered through 
> an internal audit, we decided not to publish explicit instructions 
> for how to exploit the issues. "
> 
> I'd like a more detailed explanation of the impact. Does the 
> flaw allow an attacker to take actions using the security context 
> the webserver runs in, or the one CF Server runs in? I personally 
> don't allow CF Server to run as System, and the userid it gets 
> has limited rights, so even if an attacker can run code using 
> CF Server's process id the attacker can't change (very many) 
> files. If the attacker can only run code in the webserver context,
> the effect depends on the webserver; IIS has to run as system, 
> but Apache can run with very limited update rights, so there 
> might not be much damage possible. 

My guess is that, since this appears to be a problem with the API stub, the
security context at issue is either the web server user account (in IIS,
IUSR_MACHINENAME or the authenticated user), or the web service account
itself.

Dave Watts, CTO, Fig Leaf Software
http://www.figleaf.com/
voice: (202) 797-5496
fax: (202) 797-5444

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Structure your ColdFusion code with Fusebox. Get the official book at 
http://www.fusionauthority.com/bkinfo.cfm

Archives: http://www.mail-archive.com/[email protected]/
Unsubscribe: http://www.houseoffusion.com/index.cfm?sidebar=lists

Reply via email to