File: 1826.txt

package info (click to toggle)
snort 2.7.0-20.4
  • links: PTS
  • area: main
  • in suites: lenny
  • size: 34,512 kB
  • ctags: 18,772
  • sloc: ansic: 115,404; sh: 10,893; makefile: 1,372; perl: 487; sql: 213
file content (65 lines) | stat: -rw-r--r-- 1,279 bytes parent folder | download | duplicates (4)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
Rule:

--
Sid:
1826

--
Summary:
This event is generated when an attempt is made to access the WEB-INF
directory on a web server.

--
Impact:
Information disclosure.

--
Detailed Information:
This event is generated when an attempt is made to access the WEB-INF
directory on a web server.

Multiple vendors are affected by an information disclosure issue where
sensitive contents of a web application server can be revealed to an
attacker by requesting the contents of this directory.

--
Affected Systems:
	Multiple vendors, see references.

--
Attack Scenarios:
The attacker can make a simple web request for the directory that will
reveal the sensitive files. The attacker can then retrieve the files for
information that can be used in later attacks against the server or
application.

--
Ease of Attack:
Simple. Exploit software not required.

--
False Positives:
None known.

--
False Negatives:
None known.

--
Corrective Action:
Ensure the system is using an up to date version of the software and has
had all vendor supplied patches applied.

Check the host logfiles and application logs for signs of compromise.

--
Contributors:
Sourcefire Research Team
Brian Caswell <bmc@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>

--
Additional References:


--