📄 1338.txt
字号:
Rule:--Sid:1338--Summary:Attempted chown command access via web--Impact:Attempt to change file ownership permissions on a webserver.--Detailed Information:This is an attempt to change file ownership permissions on a machine.Using thiscommand an attacker may change the permissions of a file tosuit his ownneeds, make a file owned by another user who wouldotherwise not havethese special permissions.--Attack Scenarios:The attacker can make a standard HTTP request that contains '/bin/chown'in the URI whichcan then change file permissions of files present onthe host.Thiscommand may also be requested on a command line shouldthe attacker gainaccess to the machine.--Ease of Attack:Simple HTTP request.--False Positives:None Known--False Negatives:None Known--Corrective Action:Webservers should not be allowed to view or execute files and binariesoutside of it'sdesignated web root or cgi-bin.Whenever possible,sensitive files andcertain areas of the filesystem should have thesystem immutable flagset to negate the use of the chown command. OnBSD derived systems,setting the systems runtime securelevel alsoprevents the securelevelfrom being changed. (note: the securelevel canonly beincreased)--Contributors:Sourcefire Research Team-- Additional References:sid: 1336sid: 1337man chown--
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -