📄 2323.txt
字号:
Rule:--Sid:2323--Summary:This event is generated when an attempt is made to exploit a known vulnerability in the QuickStore CGI web application running on a server.--Impact:Information gathering and system integrity compromise. Possible unauthorizedadministrative access to the server or application.--Detailed Information:This event is generated when an attempt is made to gain unauthorizedaccess to the QuickStore CGI application running on a web server. Thisapplication does not perform stringent checks when validating the inputfrom a user to the script. The error document produced by the application may disclose sensitiveinformation about the installation of the application.--Affected Systems: QuickStore 2.12 and prior--Attack Scenarios:An attacker can supply input to the quickstore.cgi script using a singlequote character in the "store" parameter. This will cause the script togenerate an error and disclose the information described above.For example: http://vulnerable.com/cgi-bin/quickstore.cgi?store='--Ease of Attack:Simple. No exploit software required.--False Positives:None known.--False Negatives:None known.--Corrective Action:Ensure the system is using an up to date version of the software and hashad all vendor supplied patches applied.--Contributors:Sourcefire Research TeamBrian Caswell <bmc@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>--Additional References:--
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -