⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 2060.txt

📁 snort入侵检测规则文件2.4 Snort是众所周知的网络入侵检测工具
💻 TXT
字号:
Rule:--Sid:2060--Summary:This event is generated when an attempt is made to exploit a known vulnerability in DB4Web.--Impact:Information disclosure--Detailed Information:DB4Web is an application server used to access various sources of data via a web interface.DB4Web does not handle the characters ":" and "\" correctly when they are URL encoded. An attacker can use this flaw to gain access to sensitive system information.Also the application does not correctly handle the use of extra "/" in aURI.It is also possible for the attacker to open arbitrary TCP connections using DB4Web and may be able to use it for portscanning other hosts.--Affected Systems:--Attack Scenarios:The attacker merely needs to make a normal HTTP request with the characters ":" or "\" encoded (%3A%5C) followed by the commands the attacker wishes to run.The attacker can also make a request like http://www.foo.com/cgi-bin/db4web_c/dbdirname//etc/passwd to view the contents of the password file.--Ease of Attack:Simple--False Positives:None Known--False Negatives:None Known--Corrective Action:Disable access to DB4Web from external sources.Apply the appropriate vendor patches.Run the webserver in a chroot environment to mitigate the risks of disclosure.--Contributors:Sourcefire Research TeamBrian Caswell <bmc@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>--Additional References:DB4Webhttp://www.db4web.de/DB4Web/home/DB4Web/hotfix_e.html--

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -