📄 1331.txt
字号:
Rule:--Sid:1331--Summary:Attempted uname command access via web--Impact:Attempt to gain information on the host operating system using the unamecommand.--Detailed Information:This is an attempt to gain intelligence about the operating system beingused on a webserver. uname is a UNIX command that will returninformation about the operating system, the machine's architecture, theprocessor architecture and the version level of the software being used.This information is valuable to an attacker who can use it to planfurther attacks based on possible vulnerabilities in the machine'soperating system.Using "uname -a", the attackers might be able to gain accurateintelligence on the web server platform. The rule looks for the "uname"command in the URL part of the client to web server connection and doesnot indicate whether the command was actually successful in showing thesystem information. The presence of the "uname" command in the URLindicates that an attacker attempted to trick the web server intoexecuting system commands in non-interactive mode i.e. without a validshell session. Another case when this rule might trigger is unencryptedHTTP tunneling connection to the server.--Attack Scenarios:The attacker can make a standard HTTP request that contains 'uname' inthe URI which can then return the machine's operating system environmentarchitecture.--Ease of Attack:Simple HTTP request.--False Positives:None Known--False Negatives:None Known--Corrective Action:Webservers should not be allowed to view or execute files and binariesoutside of it's designated web root or cgi-bin. This command may also berequested on a command line should the attacker gain access to the machine. --Contributors:Sourcefire Research TeamNigel Houghton <nigel.houghton@sourcefire.com>Additional information from Anton Chuvakin <http://www.chuvakin.org>-- Additional References:man uname--
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -