[1][USEMAP] [2][USEMAP] [3][LINK] Allaire Security Bulletin (ASB00-12) ClusterCATS Appends Stale Query String to URL Line during HTML Redirection Originally Posted: May 8, 2000 Last Updated: May 8, 2000 Summary A patch is available to eliminate a security vulnerability affecting ClusterCATS. The vulnerability potentially releases confidential query string information on redirect. Issue This issue is clearly explained in the Allaire Knowledge Base Article (15607): "ClusterCATS may append stale query string arguments to a URL when performing a HTTP redirect. This can be a security problem if the stale information includes usernames and passwords." Affected Software Versions * ClusterCATS ColdFusion What Allaire is Doing Allaire has published this bulletin, notifying customers of the problem. Allaire has also released a patch that will resolve the issue. The patch is available for download and installation. Allaire also recommends that users install sample applications and documentation on secured development servers, and not on production servers. [4]Download - ClusterCATS ColdFusion Stale Query String During Redirect Patch What Customers Should Do There is a patch available to correct this problem. It is detailed in the following Allaire Knowledge Base Article (15607): [5]http://www.allaire.com/Handlers/index.cfm?ID=15607&Method=Full Please note: this issue and patch may not be required for all users. Allaire customers should review all material in the Allaire Knowledge Base Article and related documents carefully before applying the patch. As always, customers should test patch changes in a testing environment before modifying production servers. Revisions May 8, 2000 -- Bulletin first created. Reporting Security Issues Allaire is committed to addressing security issues and providing customers with the information on how they can protect themselves. If you identify what you believe may be a security issue with an Allaire product, please send an email to secure@allaire.com. We will work to appropriately address and communicate the issue. Receiving Security Bulletins When Allaire becomes aware of a security issue that we believe significantly affects our products or customers, we will notify customers when appropriate. Typically this notification will be in the form of a security bulletin explaining the issue and the response. Allaire customers who would like to receive notification of new security bulletins when they are released can sign up for our security notification service. For additional information on security issues at Allaire, please visit the Security Zone at: [6]http://www.allaire.com/security THE INFORMATION PROVIDED BY ALLAIRE IN THIS BULLETIN IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. ALLAIRE DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL ALLAIRE CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF ALLAIRE CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY. < a l l a i r e > Copyright © 1995-2000 Allaire Corp., All rights reserved. [7]Year 2000 (Y2K) [8]Site problems? [9]Service questions? [10]Privacy Policy References 1. LYNXIMGMAP:http://www.allaire.com/handlers/index.cfm?ID=15697&Method=Full#allaireHome 2. LYNXIMGMAP:http://www.allaire.com/handlers/index.cfm?ID=15697&Method=Full#tools 3. javascript:history.back() 4. ftp://ftp.allaire.com/outgoing/clustercats/teserver.dll 5. http://www.allaire.com/Handlers/index.cfm?ID=15607&Method=Full 6. http://www.allaire.com/security 7. http://www.allaire.com/developer/year2000 8. mailto:webmaster@allaire.com 9. mailto:info@allaire.com 10. http://www.allaire.com/privacy/