File: 2156.txt

package info (click to toggle)
snort 2.7.0-20.4
  • links: PTS
  • area: main
  • in suites: lenny
  • size: 34,512 kB
  • ctags: 18,772
  • sloc: ansic: 115,404; sh: 10,893; makefile: 1,372; perl: 487; sql: 213
file content (67 lines) | stat: -rw-r--r-- 1,718 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
Rule:

--
Sid:
2156

--
Summary:
This event is generated when an attempt is made to ascertain the status of the Apache module mod_gzip on a host. 

--
Impact:
Information gathering.

--
Detailed Information:
This event indicates that an attempt has been made to ascertain the status of the Apache module mod_gzip on a host from a source external to the protected network.

mod_gzip is used to compress data sent by an Apache webserver in an attempt to preserve bandwidth and speed up communications between client and server.

The attacker may be trying to gain information on the server by making a query to the mod_gzip_status page. This could lead to information disclusure which might then be used in further attacks against that host.

--
Affected Systems:
Any host using the Apache module mod_gzip.

--
Attack Scenarios:
An attacker can retrieve information on the server by making a request for the status of mod_gzip. This request would take the form http://www.foo.com/mod_gzip_status

--
Ease of Attack:
Simple. No exploit required.

--
False Positives:
The event will also be generated if Nessus is used to scan the host for this vulnerability.

--
False Negatives:
None Known.

--
Corrective Action:
Disable the mod_gzip module.

Disallow access to mod_gzip_status from sources external to the protected network.

Use the Apache directive <Location> to disallow access to the mod_gzip status page to the localhost only in the following manner:

<Location /mod_gzip_status>
    Order deny,allow
    Deny from all
    Allow from localhost
</Location>

--
Contributors:
Sourcefire Research Team
Brian Caswell <bmc@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>

--
Additional References:


--