2323.txt
来自「snort入侵检测规则文件2.4 Snort是众所周知的网络入侵检测工具」· 文本 代码 · 共 66 行
TXT
66 行
Rule:--Sid:2323--Summary:This event is generated when an attempt is made to exploit a known vulnerability in the QuickStore CGI web application running on a server.--Impact:Information gathering and system integrity compromise. Possible unauthorizedadministrative access to the server or application.--Detailed Information:This event is generated when an attempt is made to gain unauthorizedaccess to the QuickStore CGI application running on a web server. Thisapplication does not perform stringent checks when validating the inputfrom a user to the script. The error document produced by the application may disclose sensitiveinformation about the installation of the application.--Affected Systems: QuickStore 2.12 and prior--Attack Scenarios:An attacker can supply input to the quickstore.cgi script using a singlequote character in the "store" parameter. This will cause the script togenerate an error and disclose the information described above.For example: http://vulnerable.com/cgi-bin/quickstore.cgi?store='--Ease of Attack:Simple. No exploit software required.--False Positives:None known.--False Negatives:None known.--Corrective Action:Ensure the system is using an up to date version of the software and hashad all vendor supplied patches applied.--Contributors:Sourcefire Research TeamBrian Caswell <bmc@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>--Additional References:--
⌨️ 快捷键说明
复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?