⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 3464.txt

📁 snort入侵检测规则文件2.4 Snort是众所周知的网络入侵检测工具
💻 TXT
字号:
Rule:--Sid:3464--Summary:This event is generated when an attempt is made to execute systemcommands via the cgi script awstats.pl.--Impact:Possible execution of system commands.--Detailed Information:Adavanced Web Statistics (awstats) is used to process web server logfiles and produces reports of web server usage.Some versions of awstats do not correctly sanitize user input. This maypresent an attacker with the opportunity to supply system commands viathe "logfile" parameter. For the attack to be sucessful the "update"parameter must also have the value set to "1". This event indicates thatan attempt has been made to pass a system command as a value to the"logfile" parameter the awstats.pl cgi script.--Affected Systems:	Awstats 6.1 and prior--Attack Scenarios:An attacker can supply commands of their choosing as a value for thelogfile parameter by enclosing the commands in pipe charecters. Forexample:  http://www.foo.com/cgi-bin/awstats.pl?update=1&logfile=|<command here>|--Ease of Attack:Simple. No exploit software required.--False Positives:None known.--False Negatives:None known.--Corrective Action:Ensure the system is using an up to date version of the software.Disallow access to awstats.pl as a CGI script.--Contributors:Sourcefire Research TeamAlex Kirk <akirk@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>--Additional References:--

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -