File: 100000542.txt

package info (click to toggle)
snort 2.7.0-20.4
  • links: PTS
  • area: main
  • in suites: lenny
  • size: 34,512 kB
  • ctags: 18,772
  • sloc: ansic: 115,404; sh: 10,893; makefile: 1,372; perl: 487; sql: 213
file content (75 lines) | stat: -rw-r--r-- 2,308 bytes parent folder | download | duplicates (4)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
Rule:

--
Sid:
100000542
--
Summary:
This event is generated when an attempt is made to exploit an SQL injection 
vulnerability in the "Dating Agent" application running on a webserver. Access 
to the file "mem.php" with SQL commands being passed as the "mid" parameter may 
indicate that an exploitation attempt has been attempted. 

--
Impact:
Information gathering and system integrity compromise. Possible unauthorized 
administrative access to the server or application. Possible execution of 
arbitrary code of the attackers choosing in some cases.

--
Detailed Information:
This event indicates that an attempt has been made to inject SQL code from a 
remote machine via the "mid" parameter in the "mem.php" script used by the 
"Dating Agent" application running on a webserver.

If stringent input checks are not performed by the CGI application, it may also 
be possible for an attacker to compromise the database backend for the 
application, the attacker may also be able to execute system binaries or 
malicious code of their choosing.

This event is generated when an attempt is made to gain unauthorized access to 
a CGI application running ona web server. Some applications do not perform 
stringent checks when validating the credentials of a client host connecting to 
the services offered on a host server. This can lead to unauthorized access and 
possibly escalated privileges to that of the administrator. Data stored on the 
machine can be compromised and trust relationships between the victim server 
and other hosts can be exploited by the attacker.

--
Affected Systems:
All systems running CGI applications using Dating Agent
--
Attack Scenarios:
An attacker can inject SQL commands to the backend database for an application 
if user input is not correctly sanitized or checked before passing that input 
to the database.

--
Ease of Attack:
Simple. Exploits exist.

--
False Positives:
None known.

--
False Negatives:
None known.

--
Corrective Action:
Ensure the system is using an up to date version of the software and has had 
all vendor supplied patches applied.

--
Contributors:
Sourcefire Vulnerability Research Team
Nigel Houghton <nigel.houghton@sourcefire.com>
--
Additional References:

SQL Injection Attack and Defense
http://www.securitydocs.com/library/3587

--