Nevermind, Charlie has links (How to lock down the /adminapi,
/administrator, and /componentutils directories) in his blog post here
http://www.carehart.org/blog/client/index.cfm/2013/1/2/Part2_serious_security_threat

<Ajas Mohammed />
iUseDropbox(http://db.tt/63Lvone9)
http://ajashadi.blogspot.com
We cannot become what we need to be, remaining what we are.
No matter what, find a way. Because thats what winners do.
You can't improve what you don't measure.
Quality is never an accident; it is always the result of high intention,
sincere effort, intelligent direction and skillful execution; it represents
the wise choice of many alternatives.


On Thu, May 9, 2013 at 9:32 AM, Ajas Mohammed <ajash...@gmail.com> wrote:

> Does anyone have instructions for IIS 6.0 ?
>
> <Ajas Mohammed />
> iUseDropbox(http://db.tt/63Lvone9)
> http://ajashadi.blogspot.com
> We cannot become what we need to be, remaining what we are.
> No matter what, find a way. Because thats what winners do.
> You can't improve what you don't measure.
> Quality is never an accident; it is always the result of high intention,
> sincere effort, intelligent direction and skillful execution; it represents
> the wise choice of many alternatives.
>
>
> On Thu, May 9, 2013 at 3:54 AM, Frank Moorman <stretch...@franksdomain.net
> > wrote:
>
>>  All,
>>
>> In case you have not heard... Adobe mentioned this last night...
>>
>> https://www.adobe.com/support/security/advisories/apsa13-03.html
>>
>> Essentially, the believe the exploit is already out there and is actively
>> infecting systems.
>>
>> However, it can be prevented through access controls on the CFIDE admin
>> directories.
>>
>>  AFFECTED SOFTWARE VERSIONS
>>
>> ColdFusion 10, 9.0.2, 9.0.1 and 9.0 for Windows, Macintosh and UNIX
>>  MITIGATIONS
>>
>> Adobe recommends ColdFusion customers take the following steps to
>> mitigate this vulnerability:
>>
>>    - Restrict public access to the CFIDE/administrator, CFIDE/adminapi
>>    and CFIDE/gettingstarted directories by following the hardening guidance 
>> in
>>    the ColdFusion 9 Lockdown 
>> Guide<http://wwwimages.adobe.com/www.adobe.com/content/dam/Adobe/en/products/coldfusion/pdfs/91025512-cf9-lockdownguide-wp-ue.pdf>
>>     and ColdFusion 10 Lockdown 
>> Guide<http://wwwimages.adobe.com/www.adobe.com/content/dam/Adobe/en/products/coldfusion-enterprise/pdf/CF10%20Lockdown%20Guide.pdf>
>>
>>
>>    - Refer to the ColdFusion 9 Lockdown 
>> Guide<http://wwwimages.adobe.com/www.adobe.com/content/dam/Adobe/en/products/coldfusion/pdfs/91025512-cf9-lockdownguide-wp-ue.pdf>
>>     and ColdFusion 10 Lockdown 
>> Guide<http://wwwimages.adobe.com/www.adobe.com/content/dam/Adobe/en/products/coldfusion-enterprise/pdf/CF10%20Lockdown%20Guide.pdf>
>>     for security best practices and further information on these
>>    hardening techniques.
>>
>>  This is the first I have heard of the CFIDE/gettingstarted directory, so
>> I am assuming that is only on CF10. Another directory that should be
>> protected but it not mentioned on this exploit(but has been mentioned on
>> others) is the CFIDE/componentutils directory.
>>
>> If needed/desired, I can share some simple .htaccess samples for people
>> that need to protect CF on an apache server...
>>
>> -------------------------------------------------------------
>> To unsubscribe from this list, manage your profile @
>> http://www.acfug.org?fa=login.edituserform
>>
>> For more info, see http://www.acfug.org/mailinglists
>> Archive @ http://www.mail-archive.com/discussion%40acfug.org/
>> List hosted by FusionLink <http://www.fusionlink.com>
>> -------------------------------------------------------------
>
>
>

Reply via email to