Lucian Constantin
CSO Senior Writer

Adobe patches flaws in ColdFusion, LiveCycle Data Services, and Premiere Clip

news
Nov 18, 20151 min

The flaws could enable cross-site scripting and request-forgery attacks

Adobe has released security updates for its ColdFusion application server, LiveCycle Data Services framework and Premiere Clip iOS app.

The company published hotfixes for ColdFusion versions 11 and 10, namely ColdFusion 11 Update 7 and ColdFusion 10 Update 18. Both updates address two input validation issues that could be exploited to execute cross-site scripting (XSS) attacks.

In addition, the hotfixes include an updated version of BlazeDS, a Java messaging protocol for rich Internet applications, that resolves an important server-side request- forgery vulnerability.

ColdFusion installations are often targeted by attackers. In 2013 researchers documented an attack where hackers exploited a ColdFusion vulnerability to install malware on Microsoft IIS servers.

That same year, a server hosting firm called Linode was compromised through a ColdFusion flaw and Adobe issued two advisories about vulnerabilities in the Web application server that were being exploited by attackers.

The server-side request forgery vulnerability in BlazeDS was also patched in LiveCycle Data Services, which includes the messaging technology. The updated versions of LiveCycleDS are 4.7.0.354178, 4.6.2.354178, 4.5.1.354177, 3.1.0.354180 and 3.0.0.354175.

Finally, an input validation vulnerability was fixed in Adobe Premiere Clip, an iOS app for editing videos. The patched version is 1.2.1.

Lucian Constantin

Lucian Constantin writes about information security, privacy, and data protection for CSO. Before joining CSO in 2019, Lucian was a freelance writer for VICE Motherboard, Security Boulevard, Forbes, and The New Stack. Earlier in his career, he was an information security correspondent for the IDG News Service and Information security news editor for Softpedia.

Before he became a journalist, Lucian worked as a system and network administrator. He enjoys attending security conferences and delving into interesting research papers. He lives and works in Romania.

You can reach him at lucian_constantin@foundryco.com or @lconstantin on X. For encrypted email, his PGP key's fingerprint is: 7A66 4901 5CDA 844E 8C6D 04D5 2BB4 6332 FC52 6D42

More from this author