⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 3463.txt

📁 This is the snapshot of Snot Latest Rules
💻 TXT
字号:
Rule:--Sid:3463--Summary:This event is generated when an attempt is made to access the cgi scriptawstats.pl.--Impact:Possible execution of system commands.--Detailed Information:Adavanced Web Statistics (awstats) is used to process web server logfiles and produces reports of web server usage.Some versions of awstats do not correctly sanitize user input. This maypresent an attacker with the opportunity to supply system commands viathe "logfile" parameter. For the attack to be sucessful the "update"parameter must also have the value set to "1". This event indicates thatan attempt has been made to access the awstats.pl cgi script.--Affected Systems:	Awstats 6.1 and prior--Attack Scenarios:An attacker can supply commands of their choosing as a value for thelogfile parameter by enclosing the commands in pipe charecters. Forexample:  http://www.foo.com/cgi-bin/awstats.pl?update=1&logfile=|<command here>|--Ease of Attack:Simple. No exploit software required.--False Positives:None known.--False Negatives:None known.--Corrective Action:Ensure the system is using an up to date version of the software.Disallow access to awstats.pl as a CGI script.--Contributors:Sourcefire Vulnerability Research TeamAlex Kirk <akirk@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>--Additional References:--

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -