1339.txt
来自「snort入侵检测规则文件2.4 Snort是众所周知的网络入侵检测工具」· 文本 代码 · 共 64 行
TXT
64 行
Rule:--Sid:1339--Summary:Attempted chsh command access via web--Impact:Attempt to change a users shell on a webserver.--Detailed Information:This is an attempt to change a users shell on a machine. Using thiscommand an attackermay change the shell of a user to suit his ownneeds. By changingthe shell an attacker may further compromise amachine by specifyinga shell that could contain a Trojan Horsecomponent or that couldcontain embedded commands specially crafted byanattacker.--Attack Scenarios:The attacker can make a standard HTTP request that contains '/bin/chsh'in the URIwhich can then change the shell of a user present on thehost.This commandmay also be requested on a command line should theattacker gainaccess to the machine.--Ease of Attack:Simple HTTP request.--False Positives:None Known--False Negatives:None Known--Corrective Action:Webservers should not be allowed to view or execute files and binariesoutside ofit's designated web root or cgi-bin.Whenever possible,sensitive filesand certain areas of the filesystem should have thesystem immutableflag set to negate the use of the chsh command. On BSDderived systems,setting the systems runtime securelevel also preventsthe securelevelfrom being changed. (note: the securelevel can only be increased)--Contributors:Sourcefire Research Team-- Additional References:man chsh--
⌨️ 快捷键说明
复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?