⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 1080.txt

📁 snort入侵检测规则文件2.4 Snort是众所周知的网络入侵检测工具
💻 TXT
字号:
Rule:  --Sid:1080--Summary:This event is generated when an attempt is made to access the Unify eWave ServletExec uploader servlet, which may lead to a web server compromise.--Impact:Serious. Execution of arbitrary code is possible.--Detailed Information:Unify eWave ServletExec is a webserver-based JSP and Java Servletenvironment available for many popular web servers (e.g., Apache, Netscapeweb server, and IIS).  Versions of ServletExec before 3.0E contain avulnerability in UploadServlet that could allow an attacker to uploadarbitrary files, including executables used to compromise the web server.--Affected Systems:Unify eWave ServletExec versions before 3.0E. --Attack Scenarios:Attacker sends a simple HTTP GET or POST like the following:GET http://target/servlet/com.unify.ewave.servletexec.UploadServlet HTTP/1.0The attacker could upload any arbitrary file onto the web server, includingexecutable code that can then be used to compromise the web server.--Ease of Attack:Relatively simple handcrafted HTTP GET or POST.--False Positives:It is possible that legitimate web administrators could use UploadServlet.--False Negatives:None Known--Corrective Action:Examine the packet to see if a web request was being done.  Try todetermine if the request was by a legitimate web admin or not.Determine from the web server's configuration whether it was a threat or not(e.g., whether the web server even runs ServletExec, and if so whetherit was running a vulnerable version).--Contributors:Original rule writer unknownOriginal document author unkownSourcefire Vulnerability Research TeamNigel Houghton <nigel.houghton@sourcefire.com>Alex Kirk <alex.kirk@sourcefire.com>--Additional References:--

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -