Weak Session Token Randomness CF Administrator 2023
Weak Session Token Randomness vulnerability found during pentesting in ColdFusion 2023 Administrator
During a recent penetration test, we identified a vulnerability related to weak session token randomness in ColdFusion 2023, specifically impacting the Administrator interface. Our analysis indicates that only about 6 out of 80 characters in the session cookie exhibit sufficient randomness, which poses a risk to session security.
Could you please advise if ColdFusion 2023 offers any configuration options or best practices to enhance the randomness and security of session tokens for the Administrator? Is it possible to customize the session ID generator or enable a stronger session management mechanism?
Any guidance or recommendations to mitigate this vulnerability would be greatly appreciated.
Thank you in advance for your support!
