Ajas,
The PostParametersLimit is actually due to a different issue. (I was
also hit with this one.)
A brief note about it is here:
http://arstechnica.com/business/2011/12/huge-portions-of-web-vulnerable-to-hashing-denial-of-service-attack/
Essentially, there is a dos attack possible by posting many parameters
to a web page. Whenever you post multiple form elements to a webserver
(with either POST or GET) It generates a hash in order to refer to them.
" /If the language does not provide a randomized hash function or the
application server does not recognize attacks using multi-collisions, an
attacker can degenerate the hash table by sending lots of colliding
keys. The algorithmic complexity of inserting n elements into the table
then goes to O(n**2), making it possible to exhaust hours of CPU time
using a single HTTP request./" I have read that when properly executed,
this attack can cause a single page request to take over 1/2hour on a
server without any other traffic. So in order to circumvent the problem,
many platforms decided the easy way to stop the problem would be to not
process any page that returns more than 100 form (or URL) parameters.
Of course anyone that has a legitimate reason to have that many form
fields needs to increase the maximum. In addition to Coldfusion, I know
apache also has a default limit of 100 on any patched server.
--Frank
On 01/21/2013 03:42 PM, Ajas Mohammed wrote:
Thanks Charlie for the detailed email. Yes, we are on 9.0 and we didnt
upgrade to 9.0.1. We used hotfix jar for 9.0 as advised on the adobe
page. It makes sense to protect those CFIDE folders you mentioned.
One thing we did notice is that after the applying security hotfix, we
started to get this error
"*coldfusion.filter.FormScope$PostParametersLimitExceededException:
POST parameters exceeds the maximum limit specified in the server*".
Quick google search led
<http://www.cutterscrossing.com/index.cfm/2012/3/27/ColdFusion-Security-Hotfix-and-Big-Forms>me
to this post
<http://www.cutterscrossing.com/index.cfm/2012/3/27/ColdFusion-Security-Hotfix-and-Big-Forms>.
I ended up adding <var
name='postParametersLimit'><number>500.0</number></var> to the
{ColdFusion-Home}/lib/neo-runtime.xml for Server installation. I am
guessing that we might have missed an earlier patch/hotfix in which
Adobe introduced this postParametersLimit setting. We were surprised
by error message in the beginning but since we had recently appliedthe
security fix, we knew it had to do with fix.
Thanks,
<Ajas Mohammed />
http://ajashadi.blogspot.com
We cannot become what we need to be, remaining what we are.
No matter what, find a way. Because thats what winners do.
You can't improve what you don't measure.
Quality is never an accident; it is always the result of high
intention, sincere effort, intelligent direction and skillful
execution; it represents the wise choice of many alternatives.
On Fri, Jan 18, 2013 at 7:07 PM, Charlie Arehart <char...@carehart.org
<mailto:char...@carehart.org>> wrote:
:-)
Thanks. I will note that they did just yesterday kindly add me to
the acknowledgements section of the security advisory, a first for
me. :-) Various issues caused the delay. Nothing nefarious. I got
a call from someone on PSIRT explaining the situation. I was just
happy to get the mention.
The good news is that I’ve gotten “payment” by a burst of new
business from people needing help with this. Of course, I posted
the first two entries making no mention of my services. That
really wasn’t my motivation. But come, the work has. And some of
those have then realized I could help with other things, which has
led to still more work, so it’s been all the more beneficial.
Of course, it’s a bit like being a roofer after a tornado blows
through. You don’t want to say you’re “glad for the work”, as you
feel for people who were affected.
I have a part 4/post mortem in the works, but sadly too busy to
get time to write it up. Perhaps over the weekend.
/charlie
*From:*ad...@acfug.org <mailto:ad...@acfug.org>
[mailto:ad...@acfug.org <mailto:ad...@acfug.org>] *On Behalf Of
*Steve Ross
*Sent:* Friday, January 18, 2013 10:17 AM
*To:* ACFUG ColdFusion Discussion
*Subject:* Re: [ACFUG Discuss] New CF Vulnerability - Check your
servers
Adobe should be paying you Charlie...
On Wed, Jan 16, 2013 at 9:39 AM, Ajas Mohammed <ajash...@gmail.com
<mailto:ajash...@gmail.com>> wrote:
Thanks Charlie, Cameron for keeping us updated with the latest.
Charlie, thanks for those blog entries. Really appreciate all your
help.
<Ajas Mohammed />
-------------------------------------------------------------
To unsubscribe from this list, manage your profile @
http://www.acfug.org?fa=login.edituserform
For more info, see http://www.acfug.org/mailinglists
Archive @ http://www.mail-archive.com/discussion%40acfug.org/
List hosted by FusionLink <http://www.fusionlink.com>
-------------------------------------------------------------
-------------------------------------------------------------
To unsubscribe from this list, manage your profile @
http://www.acfug.org?fa=login.edituserform
For more info, see http://www.acfug.org/mailinglists
Archive @ http://www.mail-archive.com/discussion%40acfug.org/
List hosted by http://www.fusionlink.com
-------------------------------------------------------------