Wednesday, March 26, 2025
HomeCyber AttackAPT Group Actively Exploiting Internet-facing Vulnerable ColdFusion Server and Uploading Webshell

APT Group Actively Exploiting Internet-facing Vulnerable ColdFusion Server and Uploading Webshell

Published on

SIEM as a Service

Follow Us on Google News

A Chinese APT group actively exploiting the newly patched vulnerability in Adobe ColdFusion Server and uploading a China Chopper webshell.

The attack was observed by Volexity, after two weeks Adobe released a security update. Attackers compromised numerous Internet accessible ColdFusion webservers including educational institutions, state government, health research, humanitarian aid organizations, and more.

With the recent version of ColdFusion,  Adobe replaced the classic FCKeditor with CKEditor which fails to restrict the file types that are allowed to upload.

The default CKEDitor configuration restricts only the following files (cfc,exe,php,asp,cfm,cfml), Volexity observed the APT group uploading .jsp file extension and the ColdFusion allows .jsp files to be actively executed.

Also, the attacker’s directory modification issue which allows them to place another script in some other location even if the .jsp file extension is blocked.

“Volexity was not able to confirm that CVE-2018-15961 was the vulnerability abused in these instances. Each of the sites showed signs of attempted webshell uploads or had HTML files designed to show they had been defaced.”

The vulnerability tracked as CVE-2018-15961 affects ColdFusion 11 (Update 14 and earlier versions), ColdFusion 2016 release (Update 6 and earlier versions), ColdFusion 2018 release (July 12 release (2018.0.0.310739)).

Users are recommended to install Adobe ColdFusion patches as soon as they are available. Patched versions ColdFusion 2018 (Update 1), ColdFusion 2016 (Update 7), and ColdFusion 11 (Update 15).

Volexity researchers recommend that all ColdFusion Administrator access be restricted to only approved IP addresses and recommend administrators to apply latest updates through Server Update > Updates > Settings panel.

Related Read

APT Group Uses Datper Malware To Launch Cyber Attack on Asia Countries by Executing Shell Commands

APT Group Uses Dangerous LoJax Malware That Can Survive After OS Re-installation and Hard Disk Replacement

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Google Chrome Zero-Day Vulnerability Actively Exploited in the Wild

Google has released an urgent update for its Chrome browser to patch a zero-day...

CISA Highlights Four ICS Flaws Being Actively Exploited

The Cybersecurity and Infrastructure Security Agency (CISA) released four significant Industrial Control Systems (ICS)...

New Windows Zero-Day Vulnerability Exposes NTLM Credentials – Unofficial Patch Available

A new zero-day vulnerability has been discovered in Windows, impacting all versions from Windows...

Cybercriminals Bypass Security Using Legitimate Tools & Browser Extensions to Deliver Malware

In the second half of 2024, cybercriminals have increasingly leveraged legitimate Microsoft tools and...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Google Chrome Zero-Day Vulnerability Actively Exploited in the Wild

Google has released an urgent update for its Chrome browser to patch a zero-day...

CISA Highlights Four ICS Flaws Being Actively Exploited

The Cybersecurity and Infrastructure Security Agency (CISA) released four significant Industrial Control Systems (ICS)...

New Windows Zero-Day Vulnerability Exposes NTLM Credentials – Unofficial Patch Available

A new zero-day vulnerability has been discovered in Windows, impacting all versions from Windows...