File: 2076.txt

package info (click to toggle)
snort 2.9.15.1-5
  • links: PTS, VCS
  • area: main
  • in suites: bullseye
  • size: 59,656 kB
  • sloc: ansic: 310,441; sh: 13,260; makefile: 2,943; yacc: 497; perl: 496; lex: 261; sed: 14
file content (63 lines) | stat: -rw-r--r-- 1,151 bytes parent folder | download | duplicates (8)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
Rule:

--
Sid:
2076

--
Summary:
This event is generated when an attempt is made to exploit a known 
vulnerability in Mambo Site Server.

--
Impact:
Unauthorized upload of files to a server.

--
Detailed Information:
Arbitrary files can be uploaded to a server running vulnerable versions 
of Mambo Site Server due to laxe checking in the scripts controlling 
uploading of files.

The scripts perform checks for certain file extensions but do not 
prevent the upload of files with image extensions.

--
Affected Systems:
	Mambo Mambo Site Server 4.0.10, 4.0.11 and 4.0.12 BETA

--
Attack Scenarios:
The attacker can upload malicious scripts and executable files by 
appending a valid extension used for an image file.

The attacker can also use the server to store files of his choosing.

--
Ease of Attack:

--
False Positives:
None Known

--
False Negatives:
None Known

--
Corrective Action:
Upgrade to the latest version of Mambo Site Server.

--
Contributors:
Sourcefire Research Team
Brian Caswell <bmc@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>

--
Additional References:

Bugtraq:
http://www.securityfocus.com/bid/6572

--