⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 2154.txt

📁 snort入侵检测规则文件2.4 Snort是众所周知的网络入侵检测工具
💻 TXT
字号:
Rule:--Sid:2154--Summary:This event is generated when a remote user attempts to access autohtml.php on a web server. This may indicate an attempt to exploit a  vulnerability in PHP-Proxima, a web site portal application.--Impact:Information gathering.--Detailed Information:This event may indicate an attempt to exploit a vulnerability in the autohtml.php script within PHP-Proxima. An attacker can use directory traversal techniques when accessing autohtml.php to view hidden files and directories on the web server with the access privileges of the server. In addition, an attacker can enter an arbitrary file name within the "name" parameter of the autohtml.php call, and if the file exists, the attacker can view it.--Affected Systems:Any server running PHP-Proxima.--Attack Scenarios:An attacker can use directory traversal techniques or use a specific filename in the "name" parameter of the URL when executing autohtml.php to view specific directories and files on the web server.--Ease of Attack:Simple. A proof of concept exists.--False Positives:If a legitimate remote user accesses autohtml.php, this rule may generate an event.--False Negatives:None known.--Corrective Action:Comment out or remove the "include("autohtml/$name");" line from the autohtml.php script.--Contributors:Sourcefire Research TeamBrian Caswell <bmc@sourcefire.com>Sourcefire Technical Publications TeamJen Harvey <jennifer.harvey@sourcefire.com>--Additional References:Bugtraqhttp://www.securityfocus.com/bid/7598Nessushttp://cgi.nessus.org/plugins/dump.php3?id=11630--

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -