File: 2136.txt

package info (click to toggle)
snort 2.7.0-20.4
  • links: PTS
  • area: main
  • in suites: lenny
  • size: 34,512 kB
  • ctags: 18,772
  • sloc: ansic: 115,404; sh: 10,893; makefile: 1,372; perl: 487; sql: 213
file content (60 lines) | stat: -rw-r--r-- 1,480 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
Rule:

--
Sid:
2136

--
Summary:
This event is generated when an attempt is made to exploit a weakness in the Philboard ASP application. 

--
Impact:
Possible administrator access.

--
Detailed Information:
This event indicates that an attempt has been made to exploit a weakness in the Philboard ASP application. By setting a cookie value to "True" administration rights are granted to that user. The user would then gain control of the application and have access to all administration functions.

This rule generates an event if the attacker makes a request for the administration page with the cookie "philboard_Admin" value set to true from a source external to the protected network.


--
Affected Systems:
Any host using Philboard.

--
Attack Scenarios:
An attacker can gain administrator access to the application by making a simple web request.

--
Ease of Attack:
Simple. No exploit software required.

--
False Positives:
This event may be generated by an administrator accessing the administration page from an external source.

The event will also be generated if Nessus is used to scan the host for this vulnerability.

--
False Negatives:
None Known.

--
Corrective Action:
Upgrade to the latest non-affected version of the software.

Deny access to this page from sources external to the protected network.

--
Contributors:
Sourcefire Research Team
Brian Caswell <bmc@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>

--
Additional References:


--