You can do it the source of the previous attempt regardless whether it was successful or not. However it will be an undocumented hack. Given today almost everyone deploys from some kind of source control, it should be easy to find the previous version's source code.
I would advocate to migrate to 2nd Gen of CF anyway. It seems more performant, with less latency . And it also supports wider range of triggers.