exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

asb00-12.querystring

asb00-12.querystring
Posted Jul 1, 2000
Site allaire.com

Allaire Security Bulletin (ASB00-12) - ClusterCATS Appends Stale Query String to URL Line during HTML Redirection. The vulnerability potentially releases confidential query string information on redirect. Affected software versions include ClusterCATS ColdFusion.

SHA-256 | bc4b4c2f53dde1501082ca668ae4f331c22b091b418fc72ae56691b0a54495a4

asb00-12.querystring

Change Mirror Download
Allaire Security Bulletin (ASB00-12)
ClusterCATS Appends Stale Query String to URL Line during HTML Redirection

Originally Posted: May 8, 2000
Last Updated: May 8, 2000

Summary

A patch is available to eliminate a security vulnerability affecting ClusterCATS. The vulnerability
potentially releases confidential query string information on redirect.

Issue

This issue is clearly explained in the Allaire Knowledge Base Article (15607): "ClusterCATS may
append stale query string arguments to a URL when performing a HTTP redirect. This can be a
security problem if the stale information includes usernames and passwords."

Affected Software Versions

ClusterCATS ColdFusion

What Allaire is Doing

Allaire has published this bulletin, notifying customers of the problem. Allaire has also released a
patch that will resolve the issue. The patch is available for download and installation. Allaire also
recommends that users install sample applications and documentation on secured development
servers, and not on production servers.

Download - ClusterCATS ColdFusion Stale Query String During Redirect Patch

What Customers Should Do

There is a patch available to correct this problem. It is detailed in the following Allaire
Knowledge Base Article (15607):

https://www.allaire.com/Handlers/index.cfm?ID=15607&Method=Full

Please note: this issue and patch may not be required for all users. Allaire customers
should review all material in the Allaire Knowledge Base Article and related documents
carefully before applying the patch. As always, customers should test patch changes in
a testing environment before modifying production servers.

Revisions
May 8, 2000 -- Bulletin first created.

Reporting Security Issues
Allaire is committed to addressing security issues and providing customers with the information
on how they can protect themselves. If you identify what you believe may be a security issue
with an Allaire product, please send an email to secure@allaire.com. We will work to
appropriately address and communicate the issue.

Receiving Security Bulletins
When Allaire becomes aware of a security issue that we believe significantly affects our products
or customers, we will notify customers when appropriate. Typically this notification will be in the
form of a security bulletin explaining the issue and the response. Allaire customers who would
like to receive notification of new security bulletins when they are released can sign up for our
security notification service.

For additional information on security issues at Allaire, please visit the Security Zone at:
https://www.allaire.com/security

THE INFORMATION PROVIDED BY ALLAIRE IN THIS BULLETIN IS PROVIDED "AS IS" WITHOUT WARRANTY OF
ANY KIND. ALLAIRE DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL
ALLAIRE CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING
DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES,
EVEN IF ALLAIRE CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR
CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY.
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    17 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close