File: 1332.txt

package info (click to toggle)
snort 2.3.3-11
  • links: PTS
  • area: main
  • in suites: etch, etch-m68k
  • size: 22,512 kB
  • ctags: 11,344
  • sloc: ansic: 70,967; sh: 4,848; makefile: 748; perl: 478; sql: 212
file content (81 lines) | stat: -rw-r--r-- 2,215 bytes parent folder | download | duplicates (8)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
Rule:

--
Sid:
1332

--
Summary:
Attempted id command access via web

--
Impact:
Attempt to gain information on users and groups that exist on the host
using the id command.

--
Detailed Information:
This is an attempt to gain intelligence about the users on a host. "id"
is a UNIX command that will return information about the system's users
and groups. This information is valuable to an attacker who can use it
to plan further attacks based on the users possible login information or
be more effective in targeting specific users and groups who possess
elevated privileges . The id command will return information on the
user, the groups the user belings to and the users' "gid" and "uid".

The rule looks for the "id" command in the client to web server network
traffic and does not indicate whether the command was actually
successful in showing the user information. The presence of the "id"
command web traffic indicates that an attacker attempted to trick the
web server into executing system in non-interactive mode i.e. without a
valid shell session. 

Alternatively this rule may trigger in an unencrypted HTTP tunneling
connection to the server or a shell connection via another exploit
against the web server.

--
Attack Scenarios:
1. The attacker can make a standard HTTP request that contains
'/usr/bin/id' in the URI which can then return sensitive information on
groups and users present on the host. 

2. This command may also be requested on a command line should the
attacker gain access to the machine.

3. An attacker uses a "id" command via a web server connection to test
what username the web server runs under. He then looks for all the files
writable by this user and find a web server configuration file with
wrong permissions.

--
Ease of Attack:
Simple HTTP request.

--
False Positives:
None Known

--
False Negatives:
None Known

--
Corrective Action:

Webservers should not be allowed to view or execute files and binaries
outside of it's designated web root or cgi-bin. 

--
Contributors:
Sourcefire Research Team
Nigel Houghton <nigel.houghton@sourcefire.com>
Additional information from Anton Chuvakin <http://www.chuvakin.org>

-- 
Additional References:
sid: 1333

man id

--