File: 2277.txt

package info (click to toggle)
snort 2.9.7.0-5
  • links: PTS, VCS
  • area: main
  • in suites: bullseye, buster, sid, stretch
  • size: 55,000 kB
  • ctags: 38,464
  • sloc: ansic: 266,667; sh: 12,508; makefile: 2,908; yacc: 497; perl: 496; lex: 261; sed: 14
file content (58 lines) | stat: -rw-r--r-- 1,166 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
Rule:
--
Sid:
2277

--
Summary:
This event is generated when an attempt is made to exploit a directory
traversal vulnerability in the cgi application PeopleSoft PeopleBooks.

--
Impact:
Information gathering.

--
Detailed Information:
This event may indicate an attempt is made to exploit a directory
traversal vulnerability in the cgi application PeopleSoft PeopleBooks.
The script psdoccgi.exe does not sufficiently check script arguements
for the "headername" and "footername" variables. An attacker may exploit
this issue to access files outside the root of the web server.

--
Affected Systems:
	PeopleTools versions 8.43 and earlier.

--
Attack Scenarios:
An attacker can use directory traversal techniques to access sensitive
system files to gain information necessary for further system
compromise.

--
Ease of Attack:
Simple. No exploit code required.

--
False Positives:
None known.

--
False Negatives:
None known.

--
Corrective Action:
Upgrade to the latest non-affected version of the software.

--
Contributors:
Sourcefire Research Team
Brian Caswell <bmc@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>

--
Additional References:

--