File: 2388.txt

package info (click to toggle)
snort 2.9.7.0-5
  • links: PTS, VCS
  • area: main
  • in suites: buster, sid, stretch
  • size: 55,000 kB
  • ctags: 38,464
  • sloc: ansic: 266,667; sh: 12,508; makefile: 2,908; yacc: 497; perl: 496; lex: 261; sed: 14
file content (72 lines) | stat: -rw-r--r-- 1,975 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
Rule:

--
Sid:
2388

--
Summary:
This event is generated when an attempt is made to access
view_broadcast.cgi on a server used for streaming media services.

--
Impact:
Information gathering and system integrity compromise.

--
Detailed Information:
The view_broadcast.cgi script contains a known vulnerability that may
allow an attacker to perform a variety of cross-site scripting attacks.
This event is generated when an attempt is amde to access the script
directly from a source external to the protected network.

This event is generated when an attempt is made to gain unauthorized
access to a CGI application running ona web server. Some applications do
not perform stringent checks when validating the credentials of a client
host connecting to the services offered on a host server. This can lead
to unauthorized access and possibly escalated privileges to that of the
administrator. Data stored on the machine can be compromised and trust
relationships between the victim server and other hosts can be exploited by the attacker.

If stringent input checks are not performed by the CGI application, it
may also be possible for an attacker to execute system binaries or
malicious code of the attackers choosing.

--
Affected Systems:
	All systems running CGI applications

--
Attack Scenarios:
An attacker can access an authentication mechanism and supply his/her
own credentials to gain access. Alternatively the attacker can exploit
weaknesses to gain access as the administrator by supplying input of
their choosing to the underlying CGI script.

--
Ease of Attack:
Simple. No exploit software required.

--
False Positives:
None known.

--
False Negatives:
None known.

--
Corrective Action:
Ensure the system is using an up to date version of the software and has
had all vendor supplied patches applied.

--
Contributors:
Sourcefire Research Team
Brian Caswell <bmc@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>

--
Additional References:

--