File: 1773.txt

package info (click to toggle)
snort 2.7.0-20.4
  • links: PTS
  • area: main
  • in suites: lenny
  • size: 34,512 kB
  • ctags: 18,772
  • sloc: ansic: 115,404; sh: 10,893; makefile: 1,372; perl: 487; sql: 213
file content (59 lines) | stat: -rw-r--r-- 1,402 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
Rule:  

--
Sid:
1773

--
Summary:
This event is generated when an attempt is made to access the executable file php.exe.

--
Impact:
Severe - File execution and File access, due to a configuration error

--
Detailed Information:
Apache servers can use the keyword "ScriptAlias" to create virtual folders. This is used to install PHP CGI (ScriptAlias /php/ "c:/php/"). 
PHP version prior to an including 4.3.0 do not correctly check user input to this file. The executable php.exe can now be used to execute any file (even on different partitions) on the target host.


--
Affected Systems:
PHP versions 4.3.0 and prior used on Apache web servers for windows.

--
Attack Scenarios:
Read file: http://[targethost]/php/php.exe?c:\filetoread
Execute file: http://[targethost]/php/php.exe?c:\filetoexecute

--
Ease of Attack:
Simple

--
False Positives:
If the PHP version is newer than 4.3.0 this vulnerability can not be exploited.

--
False Negatives:
None known

--
Corrective Action:
Update PHP to the latest non affected version from www.php.net

If the php.ini configuration file contains the keyword cgi.force_redirect this vulnerability can not be exploited.

--
Contributors:
Snort documentation contributed by Ueli Kistler, <u.kistler@engagesecurity.com>
Sourcefire Research Team
Brian Caswell <bmc@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>

-- 
Additional References:


--