⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 6403.txt

📁 This is the snapshot of Snot Latest Rules
💻 TXT
字号:
Rule:--Sid:6403--Summary:This event is generated when an attempt is made to exploit a known vulnerability in the Horde web application.--Impact:Serious, unauthorized remote execution of code.--Detailed Information:This event is generated when an attempt is made to exploit a known vulnerability in the Horde web application.Some applications do not perform stringent checks when validating the credentials of a client host connecting to the services offered on a host server. This can lead to unauthorized access and possibly escalated privileges to that of the administrator. Data stored on the machine can be compromised and trust relationships between the victim server and other hosts can be exploited by the attacker.The Horde web application, written in PHP, does not properly sanitize data passed to the Help Viewer scripts. This allows an attacker to supply code of their choosing to be executed on the server with the credentials of the user running the web server.--Affected Systems:Horde versions prior to and including 3.1.0--Attack Scenarios:An attacker can supply data of their choosing to the help scripts which may contain code to be executed or calls to system commands for execution.--Ease of Attack:Simple. Exploits exist.--False Positives:None known.--False Negatives:None known.--Corrective Action:Ensure the system is using an up to date version of the software and has had all vendor supplied patches applied.Check the host logfiles and application logs for signs of compromise.--Contributors:Sourcefire Vulnerability Research TeamBrian Caswell <bmc@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>--Additional References:--

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -