Malware alert in the coldfusion installation path - [Threat: Backdoor:PHP/Dirtelt]
Our internal vulnerability accessment tool has identified a sever threat (Malware alert) in the coldfusion installation path. We are getting frequent alerts.
Just need help from the forum to fix this issue.
• Threat: Backdoor:PHP/Dirtelt
• Microsoft Defender Antivirus event code: 1116
• Correlation ID: {64391B54-9146-4EF3-A8A5-EF12C4B48492}
• Threat outcome: The operation completed successfully.
• Microsoft action: Windows Defender: Antimalware platform detected potentially unwanted software ()
• Message: "Microsoft Defender Antivirus has detected malware or other potentially unwanted software."
• Filepath: :\\COLDFUSION2021\\cfusion\\runtime\\work\\Catalina\\localhost\\tmp\\neotmp10322993890733267903.tmp;
file:_Drive path:\\COLDFUSION2021\\cfusion\\runtime\\work\\Catalina\\localhost\\tmp\\neotmp11307734161545627760.tmp;
file:_Drive path:\\COLDFUSION2021\\cfusion\\runtime\\work\\Catalina\\localhost\\tmp\\neotmp12158617298315559136.tmp;
file:_Drive path:\\COLDFUSION2021\\cfusion\\runtime\\work\\Catalina\\localhost\\tmp\\neotmp13188046881151882857.tmp;
file:_Drive path:\\COLDFUSION2021\\cfusion\\runtime\\work\\Catalina\\localhost\\tmp\\neotmp13557436181963325239.tmp;
file:_Drive path:\\COLDFUSION2021\\cfusion\\runtime\\work\\Catalina\\localhost\\tmp\\neotmp14319078215402922791.tmp;
file:_Drive path:\\COLDFUSION2021\\cfusion\\runtime\\work\\Catalina\\localhost\\tmp\\neotmp15034355155084631811.tmp;
file:_Drive path:\\COLDFUSION2021\\cfusion\\runtime\\work\\Catalina\\localhost\\tmp\\neotmp15419089149031903249.tmp;
file:_Drive path:\\COLDFUSION2021\\cfusion\\runtime\\work\\Catalina\\localhost\\tmp\\neotmp16903199274463071014.tmp;
file:_Drive path:\\COLDFUSION2021\\cfusion\\runtime\\work\\Catalina\\localhost\\tmp\\neotmp17403488926027349062.tmp;
file:_Drive path:\\COLDFUSION2021
• Executable: Drive path:\\COLDFUSION2021\\cfusion\\bin\\coldfusion.exe
