Understanding CFML Vulnerabilities, Exploits, and Attack Paths

Have you ever wondered how applications and servers get hacked? Or how vulnerabilities and exploits actually work? Go beyond just patching your servers and start thinking about ways to build more secure CFML application environments.


The steady cadence of bugs, vulnerabilities, and patches can get overwhelming. In this talk, we’ll dive into the attack surface of CFML environments and explore some common (and some unusual) attack paths. Follow along as we sidestep security controls, take advantage of software weaknesses, and challenge common assumptions.

By understanding the root causes and sources of past vulnerabilities, we can proactively implement controls to guard against future ones. We’ll cover topics ranging from the basics of input validation and access control to edge cases that may make you say, “Wow, I didn’t realize that was even possible!”

Go beyond just patching your servers and start thinking about ways to build more secure CFML application environments.