File: 1365.txt

package info (click to toggle)
snort 2.7.0-20.4
  • links: PTS
  • area: main
  • in suites: lenny
  • size: 34,512 kB
  • ctags: 18,772
  • sloc: ansic: 115,404; sh: 10,893; makefile: 1,372; perl: 487; sql: 213
file content (47 lines) | stat: -rw-r--r-- 1,199 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
Rule:

--
Sid:
1365

--
Summary:
Attempted rm command access via web

--
Impact:
Attempt to delete files on a webserver.

--
Detailed Information:
This is an attempt to remove on a machine. Using this command an attacker may delete files on a machine.

--
Attack Scenarios:
The attacker can make a standard HTTP request that contains 'rm' in the URI which can then delete files present on the host.  This command may also be requested on a command line should the attacker gain access to the machine.

--
Ease of Attack:
Simple HTTP request.

--
False Positives:

--
False Negatives:
None Known

--
Corrective Action:
Webservers should not be allowed to view or execute files and binaries outside of it's designated web root or cgi-bin.  Whenever possible, sensitive files and certain areas of the filesystem should have the system immutable flag set to negate the use of the rm command. On BSD derived systems, setting the systems runtime securelevel also prevents the securelevel from being changed. (note: the securelevel can only be increased)

--
Contributors:
Original rule writer unknown
Sourcefire Research Team
Nigel Houghton <nigel.houghton@sourcefire.com>

-- 
Additional References:

--