File: 1570.txt

package info (click to toggle)
snort 2.7.0-20.4
  • links: PTS
  • area: main
  • in suites: lenny
  • size: 34,512 kB
  • ctags: 18,772
  • sloc: ansic: 115,404; sh: 10,893; makefile: 1,372; perl: 487; sql: 213
file content (74 lines) | stat: -rw-r--r-- 1,906 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
Rule:

--
Sid:
1570

--
Summary:
This event is generated when an attempt is made to access the file
loadpage.cgi.

--
Impact:
Information gathering and system integrity compromise. Possible unauthorized
administrative access to the server or application. Possible execution
of arbitrary code of the attackers choosing in some cases.

--
Detailed Information:
This event is generated when an attempt is made to gain access to the
script loadpage.cgi, part of the CGI application AHG EZshopper running
on a web server. Some applications do not perform stringent checks when
validating the credentials of a client host connecting to the services
offered on a host server. This can lead to unauthorized access and
possibly escalated privileges to that of the administrator. Data stored
on the machine can be compromised and trust relationships between the
victim server and other hosts can be exploited by the attacker.

If stringent input checks are not performed by the CGI application, it
may also be possible for an attacker to execute system binaries or
malicious code of the attackers choosing.

--
Affected Systems:

	AHG EZshopper v3.0 and v2.0 for UNIX

--
Attack Scenarios:
An attacker can access an authentication mechanism and supply his/her
own credentials to gain access. Alternatively the attacker can exploit
weaknesses to gain access as the administrator by supplying input of
their choosing to the underlying CGI script.

--
Ease of Attack:
Simple. Exploits exist.

--
False Positives:
None known.

--
False Negatives:
None known.

--
Corrective Action:
Ensure the system is using an up to date version of the software and has
had all vendor supplied patches applied.

--
Contributors:
Sourcefire Research Team
Brian Caswell <bmc@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>

--
Additional References:

NSFocus:
http://www.nsfocus.com/english/homepage/research/0009.htm

--