119-11.txt

来自「This is the snapshot of Snot Latest Rule」· 文本 代码 · 共 63 行

TXT
63
字号
Rule: --Sid: 119-11-- Summary: This event is generated when the pre-processor http_inspectdetects network traffic that may constitute an attack.-- Impact: Unknown. This event may also constitute an attempt to evade an IDS.--Detailed Information:This event is generated when the http_inspect pre-processor detects theuse of directory traversal in a web request. This may be an attempt toescape the web root directory or it may be an attempt to evade an IDS.--Affected Systems:	Microsoft IIS Servers--Attack Scenarios: An attacker may supply a path to a file outside the web root by using"../" in the uri.-- Ease of Attack: Simple.-- False Positives:This event may be generated if a web site uses "../" in links to otherfiles on the site.--False Negatives:None Known.-- Corrective Action:Check the target host for signs of compromise.Apply any appropriate vendor supplied patches.--Contributors:Daniel Roelker <droelker@sourcefire.com> Sourcefire Vulnerability Research TeamNigel Houghton <nigel.houghton@sourcefire.com>-- Additional References:HTTP IDS Evasions Revisited - Daniel Roelkerhttp://docs.idsresearch.org/http_ids_evasions.pdf--

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?