📄 2655.txt
字号:
Rule:-- Sid:2655-- Summary:This event is generated when an attempt is made to exploit a vulnerabilityassociated with an HP WebJetAdmin web server.-- Impact:A successful attack may allow the execution of arbitrary code as root on UNIXand SYSTEM on Windows on a vulnerable server.-- Detailed Information:The HP Web JetAdmin application allows users to manage HP JetDirect-connectedprinters within their intranet using a browser. The httpd core supports anexported function called ExecuteFile. A vulnerability exists that allows theuploading and execution of unauthorized files by posting a malicious httprequest with the script /plugins/framework/script/content.hts in conjunctionwith ExecuteFile function to the web server. Discovery of the vulnerability iscredited to FX of Phenoelit.-- Affected Systems: HP Web JetAdmin 6.5.-- Attack Scenarios:An attacker can create upload and execute a malicious file on a vulnerable server.-- Ease of Attack:Simple.-- False Positives:None known.-- False Negatives:The default HP Web JetAdmin port is 8000. If an administrator selects adifferent port on which to run the web server, no event will begenerated. In that case, the rule should be altered to reflect the port on which the web server runs. -- Corrective Action:Upgrade to the latest non-affected version of the software.-- Contributors:Thomas Alex <talex@edhacker.com>Sourcefire Vulnerability Research TeamBrian Caswell <bmc@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>-- Additional References:Phenoelit:http://www.phenoelit.de/stuff/HP_Web_Jetadmin_advisory.txt>Hewlett-Packard:http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=PSD_HPSBPI01026--
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -