File: 2363.txt

package info (click to toggle)
snort 2.7.0-20.4
  • links: PTS
  • area: main
  • in suites: lenny
  • size: 34,512 kB
  • ctags: 18,772
  • sloc: ansic: 115,404; sh: 10,893; makefile: 1,372; perl: 487; sql: 213
file content (68 lines) | stat: -rw-r--r-- 1,760 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
Rule:

--
Sid:
2363

--
Summary:
This event is generated when an attempt is made to access a file that
has a known vulnerability in a PHP web application running on a server.

--
Impact:
Information gathering and system integrity compromise. Possible unauthorized
administrative access to the server or application. Possible execution
of arbitrary code of the attackers choosing in some cases.

--
Detailed Information:
This event is generated when an attempt is made access the file
default_header.php used in the PHP application Cyboards. Some applications do
not perform stringent checks when validating the credentials of a client
host connecting to the services offered on a host server. This can lead
to unauthorized access and possibly escalated privileges to that of the
administrator. Data stored on the machine can be compromised and trust
relationships between the victim server and other hosts can be exploited by the attacker.

If stringent input checks are not performed by the PHP application, it
may also be possible for an attacker to execute system binaries or
malicious code of the attackers choosing.

--
Affected Systems:
	Cyboards Cyboards PHP Lite 1.21
	Cyboards Cyboards PHP Lite 1.25

--
Attack Scenarios:
My manipulating certain variables contained in a PHP script an attacker
may be able to supply code of their choosing and execute it on the
server.

--
Ease of Attack:
Simple. No exploit software required.

--
False Positives:
None known.

--
False Negatives:
None known.

--
Corrective Action:
Ensure the system is using an up to date version of the software and has
had all vendor supplied patches applied.

--
Contributors:
Sourcefire Research Team
Nigel Houghton <nigel.houghton@sourcefire.com>

--
Additional References:

--