Solved

Decompile .cfm file (ColdFusion 9)

Posted on 2010-11-27
11
2,591 Views
Last Modified: 2012-05-10
Hi there,

I need to decompile a .cfm file (ColdFusion 9) to make changes to it, but i lost my backup files and i have no way of editing my current .cfm file. Is there a way to do this?

I greatly appreciate the help.
0
Comment
Question by:ITXX
  • 7
  • 4
11 Comments
 
LVL 52

Expert Comment

by:_agx_
ID: 34224130
Are you talking about an encrypted file or just a regular page compiled an cached in (ie C:\ColdFusion9\wwwroot\WEB-INF\cfclasses) ?  
0
 

Author Comment

by:ITXX
ID: 34224160
The file is encrypted, i had moved my entire backup to another drive and now the drive is unreadable (i tried to undelete files but no luck).
0
 
LVL 52

Expert Comment

by:_agx_
ID: 34224247
If they're your own files, and were psuedo-encrypted with cfencode, there's unofficial versions of the decrypt algorithm floating around the net.  I've never used them. So I can't tell you if they work or not ..

http://stackoverflow.com/questions/4221494/why-cf8-encoded-cfm-file-doesnt-work-in-cf9-server
0
 
LVL 52

Accepted Solution

by:
_agx_ earned 500 total points
ID: 34224252
... as stated in the link, cfencode doesn't really encrypt files. Just obfuscates.  If your files were really encrypted - by some other program- you may be out of luck.
0
 

Author Comment

by:ITXX
ID: 34224255
Ok, ill look in to that.

Thanks.
0
Highfive Gives IT Their Time Back

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

 

Author Closing Comment

by:ITXX
ID: 34224257
Not was i expecting, but pointed me in another direction.
0
 
LVL 52

Expert Comment

by:_agx_
ID: 34224265
And what were you expecting?

A) You never mentioned WHAT you used to "encrypt" these files. If you want a more specific answer you need to provide more details ...

B) Just for future reference, you'll find most people are suspicious when it comes to questions about decrypting anything.  I chose to give you the benefit of the doubt, that you're not doing anything illegal.  But many people wouldn't.  Some wouldn't even answer you at all
0
 
LVL 52

Expert Comment

by:_agx_
ID: 34224271
>> If you want a more specific answer you need to provide more details ...

.. and if they're your files, you should be able to tell us what was used to "encrypt" them ;-)

0
 

Author Comment

by:ITXX
ID: 34224275
It asked me to put in a comment when i graded the solution with a B, didnt think it would show here...

Anyway, the system im working on was developed by someone who basically got lost and never came back, (i had a backup, but its gone as well) now our organization has this non working system after paying thousands of dollars. The only way to fix it is to modify this particular file where i can have it point to where we need it to thats all

I guess ill have to have someone re-develop a brand new system for us if i cant have this file modified.
0
 
LVL 52

Expert Comment

by:_agx_
ID: 34224300
didnt think it would show here...

Well that certainly makes it better.   ;-)  Anyway, if you're not doing anything illegal. Then next time don't give up so easily.  Some questions are answered quickly. Others require several exchanges. But both sides need to participate.

i had a backup, but its gone as well

Not to sound unsympathetic, but that's why multiple backups are a must. But one has to make the best of the situation they're in.  Anyway, my point remains.  In order to "decrypt" anything .. you have to know what was used to encrypt it.  No way around it.  

All CF files are compiled into java byte code (ie .class files).  Those *can't* be easily reversed into plain CFML code.  But it doesn't seem like that's what you're talking about.  Aside from that, when it comes to CF code, the best guess is they were obfuscated with cfencode.   As I said, there are plenty of unofficial tools that will decrypt such a file. But since they're unofficial, and some from sources I can't verify, I won't post direct links to them.  Caveat emptor.

But again, if you don't know what was used to do the encryption,  you're stuck with basic trial and error.  It's like looking at an encrypted hex string and asking what algorithm should be used to decrypt it?  There's simply no way to tell..

0
 
LVL 52

Expert Comment

by:_agx_
ID: 34224336
Frankly the more I look at this question, it sounds a little suspicious.  Some of your comments suggest you may be trying to decrypt code purchased from another company, not something your company wrote itself.  If that's true, most companies that sell software explicitly prohibit that.  You may want to review the terms about the legality of doing this ...
0

Featured Post

How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

Join & Write a Comment

PROBLEM: How to add your own buttons to the bottom toolbar with paging info ( result count ). While creating a cfgrid, I ran into an issue where I wanted to embed my own custom buttons where the default ones ( insert / delete / etc… ) are for aes…
Hi. There are several upload tutorials using jquery and coldfusion. I found a very interesting one here Upload Your Files using Jquery & ColdFusion and Preview them (http://www.randhawaworld.com/) . I did keep the main js functions but made sever…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

747 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now