907.txt
来自「This is the snapshot of Snot Latest Rule」· 文本 代码 · 共 80 行
TXT
80 行
Rule:--Sid:907--Summary:This event is generated when an attempt is made to access an Example application on a Coldfusion 4.x server. The 'Web Publish Example Script'can be exploited to allow the attacker to upload an arbitrary file to the server.--Impact:Serious. The vulnerability allows custom code to be uploaded to the server.--Detailed Information:ColdFusion (Macromedia, formerly Allaire) web servers have severaldefault Example applications installed that have vulnerabilities. The'Web Publish Example script' application can be exploited to allow theuploading of arbitrary files.See Macromedia Security Bulletin (MPSB01-08) for complete information.--Affected Systems: ColdFusion versions 2.x, 3.x, 4.x for Windows ColdFusion versions 4.x for Solaris, HP-UX ColdFusion versions 4.5.x for Linux Expression Evaluator Patch (ASB99-01)--Attack Scenarios:The web application allows file uploading via a URL like this:http://www.target.com/CFDOCS/exampleapps/publish/admin/addcontent.cfmOnce the file has been uploaded, it can be executed by crafting a 2ndURL to the uploaded file.--Ease of Attack:Simple.--False Positives:If ColdFusion 4.x's example code is being used, This rule will generate an event.--False Negatives:None known.--Corrective Action:Delete all example code. This is one of several significantvulnerabilities that are exploitable if the example code is left on aproduction server.--Contributors:Original Rule Writer UnknownSourcefire Vulnerability Research TeamNigel Houghton <nigel.houghton@sourcefire.com>Snort documentation contributed by Darryl Davidson <ddavidson@talisman-intl.com>-- Additional References:Macromedia Security Bulletin (MPSB01-08)http://www.macromedia.com/devnet/security/security_zone/mpsb01-08.htmlCAN-2001-0535http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0535--
⌨️ 快捷键说明
复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?