File: 1666.txt

package info (click to toggle)
snort 2.7.0-20.4
  • links: PTS
  • area: main
  • in suites: lenny
  • size: 34,512 kB
  • ctags: 18,772
  • sloc: ansic: 115,404; sh: 10,893; makefile: 1,372; perl: 487; sql: 213
file content (59 lines) | stat: -rw-r--r-- 1,081 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
Rule:

--
Sid:
1666

--
Summary:
This event is generated when a webserver returns a directory listing of
it's cgi-bin.

--
Impact:
Information gathering.

--
Detailed Information:
This event is generated when a webserver returns a directory listing of
it's cgi-bin. The scripts listed may be valuable to an attacker when
planning further attacks against the webserver. It may also be possible
for the attacker to download the contents of the cgi-bin and view the
contents of the script sources.

--
Affected Systems:
	All web server platforms.

--
Attack Scenarios:
An attacker can list the contents of the cgi-bin, discover the filename
of a vulnerable script and use the information to execute an exploit
against the server.

--
Ease of Attack:
Simple. No exploit software required.

--
False Positives:
None known.

--
False Negatives:
None known.

--
Corrective Action:
Disallow directory content listing of the cgi-bin.

--
Contributors:
Sourcefire Research Team
Brian Caswell <bmc@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>

--
Additional References:

--