Understanding CFML Vulnerabilities, Exploits, and Attack Paths
The steady cadence of bugs, vulnerabilities, and patches can get overwhelming. In this talk, we’ll dive into the attack surface of CFML environments and explore some common (and some unusual) attack paths. Follow along as we sidestep security controls, take advantage of software weaknesses, and challenge common assumptions.
By understanding the root causes and sources of past vulnerabilities, we can proactively implement controls to guard against future ones. We’ll cover topics ranging from the basics of input validation and access control to edge cases that may make you say, “Wow, I didn’t realize that was even possible!”
Go beyond just patching your servers and start thinking about ways to build more secure CFML application environments.