File: 2147.txt

package info (click to toggle)
snort 2.7.0-20.4
  • links: PTS
  • area: main
  • in suites: lenny
  • size: 34,512 kB
  • ctags: 18,772
  • sloc: ansic: 115,404; sh: 10,893; makefile: 1,372; perl: 487; sql: 213
file content (63 lines) | stat: -rw-r--r-- 1,234 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
Rule:

--
Sid: 2147


--
Summary:
This event is generated when an attempt is made to exploit a weakness in the BLNews php application. 

--
Impact:
Arbitrary code execution.

--
Detailed Information:
This event is generated when an attempt is made to exploit a vulnerability in the BLNews PHP application.

It is possible for an attacker to include a PHP file of his choosing via a URL, the script is processed and executed with the privileges of the user running the webserver.

--
Affected Systems:
Any host using BLNews.

--
Attack Scenarios:
An attacker could include a PHP file of his choice by including the file name in a URI supplied to the webserver that would in turn process the script.

--
Ease of Attack:
Simple.

--
False Positives:
None Known.

--
False Negatives:
None Known.

--
Corrective Action:
Check the php implementation on the host.

Check the webserver log files for signs of this activity.

Where possible, ensure the webserver is run as an unprivileged process.

Check the host for signs of compromise.

--
Contributors:
Sourcefire Research Team
Brian Caswell <bmc@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>

--
Additional References:

Bugtraq:
http://www.securityfocus.com/bid/7677

--