File: 2247.txt

package info (click to toggle)
snort 2.3.3-11
  • links: PTS
  • area: main
  • in suites: etch, etch-m68k
  • size: 22,512 kB
  • ctags: 11,344
  • sloc: ansic: 70,967; sh: 4,848; makefile: 748; perl: 478; sql: 212
file content (67 lines) | stat: -rw-r--r-- 1,289 bytes parent folder | download | duplicates (8)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
Rule:  

--
Sid:
2247

--
Summary:
This event is generated when an attempt is made to exploit a known 
vulnerability in the Persits AspUpload application.

--
Impact:
Information disclosure. Possible retrieval of sensitive system files. 
Installation of arbitrary files.

--
Detailed Information:
Under certain circumstances it is possible to retrieve information from 
outside the web root of a server using AspUpload by utilizing a 
directory traversal technique. The same technique can also be used to 
upload files of the attackers choosing to other areas of the file 
system.

The vulnerability exists in the sample scripts that accompany the 
application.

--
Affected Systems:
	AspUpload 2.1
	
--
Attack Scenarios:
The attacker can use a simple directory traversal technique when 
supplying the filename for upload.

--
Ease of Attack:
Simple. NO exploit software required.

--
False Positives:
None known.

--
False Negatives:
None known.

--
Corrective Action:
Upgrade to the latest non-affected version of the software.

Remove the sample scripts installed by the software.

--
Contributors:
Sourcefire Research Team
Brian Caswell <bmc@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>

-- 
Additional References:

Bugtraq:
http://www.securityfocus.com/bid/3608

--