📄 3131.txt
字号:
Rule: --Sid: 3131-- Summary: This event is generated when an attempt is made to exploit a knownvulnerability in GNU Mailman.-- Impact: Information disclosure.--Detailed Information:GNU Mailman is used to manage mailing lists. It is written in Python andis available on a variety of platforms.GNU Mailman when used with webservers that do not remove extra slashesfrom URLs, is prone to a directory traversal attack that may allow anattacker access to sensitive files on an affected system.--Affected Systems: GNU Mailman in conjunction with Apache 1.3.x--Attack Scenarios: An attacker can supply extra slashes and dots (....///) to a URL toescape the web root and access other parts of the host filesystem.-- Ease of Attack: Simple. Exploit software is not required.-- False Positives:None known.--False Negatives:None known.-- Corrective Action: Apply the appropriate vendor supplied patches.--Contributors: Sourcefire Vulnerability Research TeamBrian Caswell <bmc@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>-- Additional References:--
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -