STIGhubSTIGhub
STIGsSearchCompareAbout

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • VPAT
  • DISA STIG Library
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Adobe ColdFusion Security Technical Implementation Guide

V-279111

CAT II (Medium)

ColdFusion must have CFIDE blocked in the uriworkermap.properties file.

Rule ID

SV-279111r1171107_rule

STIG

Adobe ColdFusion Security Technical Implementation Guide

Version

V1R1

CCIs

CCI-000366

Discussion

CFIDE is a directory used by ColdFusion for administrative and development purposes. If access to CFIDE is not properly restricted, it can expose sensitive administrative interfaces and development tools to unauthorized users. This can lead to potential security breaches, including unauthorized access to the ColdFusion Administrator, exposure of sensitive configuration information, and the ability to execute arbitrary code. By blocking access to CFIDE in the uriworkermap.properties file, the ColdFusion server ensures that these critical resources are protected from unauthorized access. Regularly verifying and enforcing the blocking of CFIDE is essential for maintaining a secure server environment and preventing potential security vulnerabilities.

Check Content

Verify the "uriworkermap.properties: file.

1. Locate the ColdFusion install folder under the config\wsconfig\<number> folders.

2. Review the "uriworkermap.properties" files for a line that matches this:
!/CFIDE* = cfusion

If the line is not found, this is a finding.

Fix Text

Configure the "uriworkermap.properties: file.

1. Locate the ColdFusion install folder under the config\wsconfig\<number> folders.

2. Open and edit the "uriworkermap.properties" file and add the line:
!/CFIDE* = cfusion

3. Save the file.