📄 2307.txt
字号:
Rule:--Sid:2307--Summary:This event is generated when an attempt is made to exploit a known vulnerability in the PayPal Storefront PHP web application running on a server.--Impact:Possible execution of arbitrary code of the attackers choosing.--Detailed Information:This event is generated when an attempt is made to exploit a known vulnerability in the PayPal Storefront PHP web application running on a server. It may be possible for an attacker to include code of theirchoosing from a source external to the server running the application.This code will execute with the privileges of the user running the webserver.The vulnerability exists due to inadequate verification of include filelocations in the application.--Affected Systems: PayPal Store Front 3.0, others may also be affected.--Attack Scenarios:An attacker might include their code by including the URI to the scriptin the HTTP GET parameters when calling index.php.--Ease of Attack:Simple. Exploits exist.--False Positives:The content/pcre criteria: "content:"page="; pcre:"/page=(http|https|ftp)/i"; Are met frequently by the strings "page=http" and "lastpage=http" which occur relatively often in the text of cookies, most commonly ones associated with MSN passport.--False Negatives:None known.--Corrective Action:Ensure the system is using an up to date version of the software and hashad all vendor supplied patches applied.--Contributors:Sourcefire Vulnerability Research TeamBrian Caswell <bmc@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>False positive information contributed by Alan Whinery <whinery@hawaii.edu>--Additional References:--
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -