Introduction
The CFAdmin web interface introduces a large attack surface to ColdFusion environments. That shouldn’t be a surprise since it adds a substantial default codebase intended to provide hooks into sensitive functionality. When performing a threat model it could be perfectly reasonable to equate a CFAdmin compromise with a full system compromise. In many organizations, the users with CFAdmin access may also be platform system administrators – with full, direct access to the underlying operating system. If that's the case, a malicious CFAdmin user is equivalent to a malicious system administrator, and you’re cooked either way.
But with that said, Adobe has extended considerable effort to protect and secure CFAdmin. From monthly security patches, to webserver connectors and connector updates, to fixing other authenticated CFAdmin exploit paths – CFAdmin has become more secure over time. And in some environments, CFAdmin access versus full platform access are distinct access roles, prompting organizations to care about all authenticated CFAdmin exploitation vectors.


