⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 2144.txt

📁 This is the snapshot of Snot Latest Rules
💻 TXT
字号:
Rule:--Sid: 2144--Summary:This event is generated when an attempt is made to access the cafelog php application. --Impact:Possible arbitrary code execution.--Detailed Information:This event is generated when an attempt is made to access the cafelog PHP application.It is possible for an attacker to include a PHP file of his choosing via a URL, the script is processed and executed with the privileges of the user running the webserver. This is due to poor checking of user supplied variables in the gm-2-b2.php script.--Affected Systems:Any host using cafelog.--Attack Scenarios:An attacker could include a PHP file of his choice by including the file name in a URI supplied to the webserver that would in turn process the script via gm-2-b2.php.--Ease of Attack:Simple.--False Positives:None Known.--False Negatives:None Known.--Corrective Action:Check the php implementation on the host.Check the webserver log files for signs of this activity.Where possible, ensure the webserver is run as an unprivileged process.Check the host for signs of compromise.--Contributors:Sourcefire Vulnerability Research TeamBrian Caswell <bmc@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>--Additional References:--

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -