2670.txt
来自「snort入侵检测规则文件2.4 Snort是众所周知的网络入侵检测工具」· 文本 代码 · 共 59 行
TXT
59 行
Rule: --Sid: 2670-- Summary: This event is generated when an attempt is made to access the filepgpmail.pl.-- Impact: Possible unauthorized administrative access to the victim host.--Detailed Information:The script pgpmail.pl does not properly sanitize user supplied input.This may allow an attacker to supply commands of their choosing to thevictim host with the privileges of the user running the web server.--Affected Systems: pgpmail prior to and including 3.6--Attack Scenarios: An attacker can supply arbitrary commands to the pgpmail.pl script.-- Ease of Attack: Simple-- False Positives:None Known--False Negatives:None Known-- Corrective Action: Uninstall the script pgpmail.plOnly allow usage from authenticated users--Contributors: Sourcefire Vulnerability Research TeamAlex Kirk <alex.kirk@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>-- Additional References:--
⌨️ 快捷键说明
复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?