First published: Sat May 19 2018(Updated: )
Adobe ColdFusion Update 5 and earlier versions, ColdFusion 11 Update 13 and earlier versions have an exploitable Deserialization of Untrusted Data vulnerability. Successful exploitation could lead to arbitrary code execution.
Credit: psirt@adobe.com psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe ColdFusion | =11.0 | |
Adobe ColdFusion | =11.0-update1 | |
Adobe ColdFusion | =11.0-update10 | |
Adobe ColdFusion | =11.0-update11 | |
Adobe ColdFusion | =11.0-update12 | |
Adobe ColdFusion | =11.0-update13 | |
Adobe ColdFusion | =11.0-update2 | |
Adobe ColdFusion | =11.0-update3 | |
Adobe ColdFusion | =11.0-update4 | |
Adobe ColdFusion | =11.0-update5 | |
Adobe ColdFusion | =11.0-update6 | |
Adobe ColdFusion | =11.0-update7 | |
Adobe ColdFusion | =11.0-update8 | |
Adobe ColdFusion | =11.0-update9 | |
Adobe ColdFusion | =2016 | |
Adobe ColdFusion | =2016-update1 | |
Adobe ColdFusion | =2016-update2 | |
Adobe ColdFusion | =2016-update3 | |
Adobe ColdFusion | =2016-update4 | |
Adobe ColdFusion | =2016-update5 | |
Adobe ColdFusion | ||
=11.0 | ||
=11.0-update1 | ||
=11.0-update10 | ||
=11.0-update11 | ||
=11.0-update12 | ||
=11.0-update13 | ||
=11.0-update2 | ||
=11.0-update3 | ||
=11.0-update4 | ||
=11.0-update5 | ||
=11.0-update6 | ||
=11.0-update7 | ||
=11.0-update8 | ||
=11.0-update9 | ||
=2016 | ||
=2016-update1 | ||
=2016-update2 | ||
=2016-update3 | ||
=2016-update4 | ||
=2016-update5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-4939 has a critical severity rating due to its potential for arbitrary code execution.
To fix CVE-2018-4939, update Adobe ColdFusion to version 2016 update 6 or newer, or ColdFusion 11 update 14 or newer.
CVE-2018-4939 affects Adobe ColdFusion versions 11.0 through 11.0-update13 and 2016 versions through 2016-update5.
CVE-2018-4939 is classified as a deserialization of untrusted data vulnerability.
If exploited, CVE-2018-4939 could allow an attacker to execute arbitrary code on the affected system.