File: 2282.txt

package info (click to toggle)
snort 2.9.2.2-3
  • links: PTS, VCS
  • area: main
  • in suites: wheezy
  • size: 53,752 kB
  • sloc: ansic: 214,625; sh: 13,872; makefile: 2,574; yacc: 505; perl: 496; lex: 260; sql: 213; sed: 14
file content (60 lines) | stat: -rw-r--r-- 1,247 bytes parent folder | download | duplicates (8)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
Rule:

--
Sid:
2282

--
Summary:
This event is generated when an attempt is made to exploit a known 
vulnerability in the PHP web application MediaWiki running on a server.

--
Impact:
Possible execution of arbitrary code and unauthorized administrative
access to the target system.

--
Detailed Information:
This event indicates that an attempt may have been made to exploit a
known vulnerability in the PHP application MediaWiki . This application
does not perform stringent checks when handling user input, this may 
lead to the attacker being able to execute PHP code and include php files 
of the attackers choosing.

--
Affected Systems:
	MediaWiki MediaWiki-stable 20031107
	MediaWiki MediaWiki-stable 20030829

--
Attack Scenarios:
An attacker can exploit weaknesses to gain access as the administrator 
by supplying input of their choosing to the underlying PHP script.

--
Ease of Attack:
Simple. No exploit code is required.

--
False Positives:
None known.

--
False Negatives:
None known.

--
Corrective Action:
Ensure the system is using an up to date version of the software.

--
Contributors:
Sourcefire Research Team
Brian Caswell <bmc@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>

--
Additional References:

--