Description
Lucee Server is a dynamic, Java based (JSR-223), tag and scripting language used for rapid web application development. In Lucee Admin before versions 5.3.7.47, 5.3.6.68 or 5.3.5.96 there is an unauthenticated remote code exploit. This is fixed in versions 5.3.7.47, 5.3.6.68 or 5.3.5.96. As a workaround, one can block access to the Lucee Administrator.
Remediation
References
https://github.com/httpvoid/writeups/blob/main/Apple-RCE.md
http://ciacfug.org/blog/updating-lucee-as-part-of-a-vulnerability-alert-response
https://portswigger.net/daily-swig/security-researchers-earn-50k-after-exposing-critical-flaw-in-apple-travel-portal
https://dev.lucee.org/t/lucee-vulnerability-alert-november-2020/7643
https://github.com/lucee/Lucee/commit/6208ab7c44c61d26c79e0b0af10382899f57e1ca
https://github.com/lucee/Lucee/security/advisories/GHSA-2xvv-723c-8p7r
http://packetstormsecurity.com/files/163864/Lucee-Administrator-imgProcess.cfm-Arbitrary-File-Write.html
Related Vulnerabilities
CVE-2023-30525 Vulnerability in maven package org.jenkins-ci.plugins:reportportal
CVE-2021-38384 Vulnerability in npm package serverless-offline
CVE-2020-8137 Vulnerability in maven package org.webjars.npm:uppy
CVE-2016-10735 Vulnerability in maven package org.ow2.jonas:bootstrap
CVE-2020-17532 Vulnerability in maven package org.apache.servicecomb:foundation-config