File: 2307.txt

package info (click to toggle)
snort 2.9.2.2-3
  • links: PTS, VCS
  • area: main
  • in suites: wheezy
  • size: 53,752 kB
  • sloc: ansic: 214,625; sh: 13,872; makefile: 2,574; yacc: 505; perl: 496; lex: 260; sql: 213; sed: 14
file content (67 lines) | stat: -rw-r--r-- 1,682 bytes parent folder | download | duplicates (8)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
Rule:

--
Sid:
2307

--
Summary:
This event is generated when an attempt is made to exploit a known 
vulnerability in the PayPal Storefront PHP web application running on a server.

--
Impact:
Possible execution of arbitrary code of the attackers choosing.

--
Detailed Information:
This event is generated when an attempt is made to exploit a known 
vulnerability in the PayPal Storefront PHP web application running 
on a server. It may be possible for an attacker to include code of their
choosing from a source external to the server running the application.
This code will execute with the privileges of the user running the web
server.

The vulnerability exists due to inadequate verification of include file
locations in the application.

--
Affected Systems:
	PayPal Store Front 3.0, others may also be affected.

--
Attack Scenarios:
An attacker might include their code by including the URI to the script
in the HTTP GET parameters when calling index.php.

--
Ease of Attack:
Simple. Exploits exist.

--
False Positives:
The content/pcre criteria: "content:"page="; pcre:"/page=(http|https|ftp)/i"; 
Are met frequently by the strings "page=http" and "lastpage=http" which 
occur relatively often in the text of cookies, most commonly ones associated 
with MSN passport.

--
False Negatives:
None known.

--
Corrective Action:
Ensure the system is using an up to date version of the software and has
had all vendor supplied patches applied.

--
Contributors:
Sourcefire Research Team
Brian Caswell <bmc@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>
False positive information contributed by Alan Whinery <whinery@hawaii.edu>

--
Additional References:

--