1103.txt
来自「This is the snapshot of Snot Latest Rule」· 文本 代码 · 共 65 行
TXT
65 行
Rule:--Sid:1103--Summary:This event is generated when a client is requesting a file that may contain an administrator name and password.--Impact:An attacker may be able to gain administrator access to your web server.--Detailed Information:Some versions of Netscape Enterprise Server put a world readable text file containing the administrator user name and encrypted password in a standard location within the URI space. By acessing this, an attacker may be able to brute force guess or even decrypt the password.--Affected Systems: Netscape Enterprise/3.6 SP3 Netscape Fasttrack/3.0.2 Netscape Messaging Server/3.6 Netscape Messaging Server/4.15p2 Netscape Collabra Server/3.54--Attack Scenarios:This is an information gathering operation that could allow an attacker to execute a brute force password guessing attack.--Ease of Attack:Moderate. The file is easy enough to get access to, but the password is still encrypted.--False Positives:None.--False Negatives:None known.--Corrective Action:Set appropriate permissions on this file or upgrade your web server software.--Contributors:Sourcefire Vulnerability Research TeamBrian Caswell <bmc@sourcefire.com>Snort documentation contributed by Kevin Peuhkurinen-- Additional References:Secureiteamhttp://www.securiteam.com/securitynews/5OR040A1UG.html--
⌨️ 快捷键说明
复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?