1021.txt

来自「This is the snapshot of Snot Latest Rule」· 文本 代码 · 共 56 行

TXT
56
字号
Rule:  Sid:1021--Summary:This event is generated when an attempt is made to retrieve file contents by exploiting a vulnerability in Microsoft Internet Information Server (IIS) ISAPI component.--Impact:Information Disclosure.--Detailed Information:Default installations of IIS 4.0 and IIS 5.0 contain a vulnerability in ISM.DLL that can allow an attacker to retrieve the contents of files on the system.  This could be used to retrieve web application source code or the contents of other sensitive files.--Affected Systems:Microsoft IIS 4.0 and 5.0Multiple vendor implementations of IIS.--Attack Scenarios:The attacker sends a URL containing the file to be retrieved (without the extension), followed by approximately 230 "%20" (ascii space) characters followed by ".htr".Note: This attempt can only be performed once. The server must be restarted to make another sucessful request.--Ease of Attack:Simple. No exploit software required.--False Positives:None Known--False Negatives:None known--Corrective Action:Check server logs for signs of compromise.--Contributors:Original rule writer unknownOriginal document author unkownSourcefire Vulnerability Research TeamNigel Houghton <nigel.houghton@sourcefire.com>--References:--

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?