1754.txt
来自「This is the snapshot of Snot Latest Rule」· 文本 代码 · 共 54 行
TXT
54 行
Rule:--Sid:1754--Summary:This event is generated when an attempt is made to access the as_web4.exe component associated with the askSam Web Publisher software.--Impact:Cross-site scripting. This may allow execution of arbitrary commands on a victim host that visits the vulnerable server.--Detailed Information:askSam Web Publisher is a product that allows the creation and publication of documents and databases on the Internet. A vulnerability exists in the as_web.exe or as_web4.exe component that may allow cross-site scripting because of a failure to filter script and HTML when error messages are returned. This may allow an attacker to execute arbitrary code on the victim host that visits the vulnerable server.--Affected Systems:askSam Web Publisher 4.0--Attack Scenarios:An attacker can inject malicious code in vulnerable askSam input fields that use as_web.exe or as_web4.exe. The may allow execution of arbitrary code on a victim host that visits the vulnerable server.--Ease of Attack:Simple.--False Positives:This alert will trigger on any access to the as_web4.exe module.--False Negatives:None Known.--Corrective Action:Disable scripting language support in your browser and e-mail client software to prevent becoming a victim host.--Contributors:Original rule written by Brian Caswell <bmc@sourcefire.com>Sourcefire Vulnerability Research TeamJudy Novak <judy.novak@sourcefire.com>--Additional References:--
⌨️ 快捷键说明
复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?