File: 2141.txt

package info (click to toggle)
snort 2.9.2.2-3
  • links: PTS, VCS
  • area: main
  • in suites: wheezy
  • size: 53,752 kB
  • sloc: ansic: 214,625; sh: 13,872; makefile: 2,574; yacc: 505; perl: 496; lex: 260; sql: 213; sed: 14
file content (61 lines) | stat: -rw-r--r-- 1,390 bytes parent folder | download | duplicates (7)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
Rule:

--
Sid: 2141


--
Summary:
This event is generated when an attempt is made to exploit a weakness in the php application shoutbox. 

--
Impact:
Information gathering possible execution of arbitrary code and remote access to the host.

--
Detailed Information:
This event indicates that an attempt has been made to exploit a weakness in the php application shoutbox. Specifically the rule generates an event when directory traversal is attempted.

The attacker may be trying to gain information on the php implementation on the host, this may be the prelude to an attack against that host using that information.

--
Affected Systems:
Any host using php.

--
Attack Scenarios:
An attacker can retrieve a sensitive file containing information on the the host. The attacker might then gain administrator access to the host or execute arbitrary code.

--
Ease of Attack:
Simple.

--
False Positives:
None Known.

--
False Negatives:
None Known.

--
Corrective Action:
Check the php implementation on the host. Ensure all measures have been taken to deny access to sensitive files.

Apply the appropriate vendor supplied patches.

Upgrade to the latest non-affected version of the software.

Check the host for signs of compromise.

--
Contributors:
Sourcefire Research Team
Brian Caswell <bmc@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>

--
Additional References:


--