📄 1520.txt
字号:
Rule: --Sid:1520--Summary:This event is generated when an attempt is made to access server-info.Using the Apache webserver, this url is generally handled by themod_info module, which will happily disclose valuable information aboutyour webserver which may aid in their attack.--Impact:Information disclosure.--Detailed Information:The mod_info module "provides a comprehensive overview of the serverconfiguration including all installed modules and directives in theconfiguration files" for the Apache webserver. Successfully accessing the urlthat is handle by mod_info may give an attacker valuable information aboutthe server.If mod_info is in use and the attacking host is allowed to access it,every possible configuration option that the Apache server is using canbe viewed. This includes ACLs, modules, file and directory names, andother valuable information that will help an attacker determine ways ofattacking the server.--Affected Systems: Apache webservers with mod_info enabled. --Attack Scenarios:As part of an attack against an Apache webserver, an attacker may try toaccess "/server-info" which is typically handled by the mod_info module. Ifsucessful, this will give valuable information about the webserver foruse in further attacks. --Ease of Attack:Simple. No exploit software is required.--False Positives:Few, but certainly possible. Since this rule only checks for theexistance of "/server-info" in the url, any url containing that string willtrigger this rule. A few common false positives may include urls like:http://victim/server-info/contact.htmlhttp://victim/really/long/directory/server-info.html--False Negatives:None Known--Corrective Action:Determine if server-info exists on the victim in question, and if the attackeris allowed to access it.If mod_info is necessary on this server, consider restricting access toit via Apache directives, i.e.:<Location /server-info> SetHandler server-info Order deny,allow Deny from all Allow from .yourdomain.net</Location>--Contributors:Snort documentation contributed by Jon Hart <warchild@spoofed.org>Sourcefire Vulnerability Research TeamBrian Caswell <bmc@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>-- Additional References:Apache:http://httpd.apache.org/docs/mod/mod_info.html--
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -