1073.txt
来自「This is the snapshot of Snot Latest Rule」· 文本 代码 · 共 70 行
TXT
70 行
Rule: Sid:1073--Summary:This event is generated when an attempt is made to read web applicationsource code.--Impact:Information gathering.--Detailed Information:The webhits.exe sample program that comes with Microsoft Index Server in IIScontains a vulnerability that allows the reading of web application sourcecode.Sometimes web application source code contains highly sensitive information,such as database passwords and information concerning backend setups. Thiscould be a prelude to further attacks.--Affected Systems: Microsoft Index Server when deployed in conjunction with Microsoft IIS.--Attack Scenarios:Attacker sends a simple URL like the following and then chooses whichfile they want to view:http://servername/scripts/samples/search/webhits.exe--Ease of Attack:Simple. No exploit software required.--False Positives:None Known.--False Negatives:None Known--Corrective Action:Remove the samples directory from the webserver.Check the host for signs of compromise.--Contributors:Original rule writer unknownOriginal document author unkownSourcefire Vulnerability Research TeamNigel Houghton <nigel.houghton@sourcefire.com>Alex Kirk <alex.kirk@sourcefire.com>--Additional References:http://www.win2000mag.com/Articles/Index.cfm?ArticleID=475&pg=2http://secinf.net/info/www/cgi-bugs.htm--
⌨️ 快捷键说明
复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?