alert http $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"ET WEB_SERVER Tilde in URI - potential .asp source disclosure vulnerability"; flow:established,to_server; content:"GET "; depth:4; nocase; uricontent:".asp~"; nocase; metadata: former_category WEB_SERVER; reference:url,seclists.org/fulldisclosure/2009/Sep/0321.html; reference:url,doc.emergingthreats.net/2009952; classtype:web-application-attack; sid:2009952; rev:11; metadata:created_at 2010_07_30, updated_at 2017_04_28;)

Added 2017-08-07 21:03:04 UTC


alert http $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"ET WEB_SERVER Tilde in URI - potential .asp source disclosure vulnerability"; flow:established,to_server; content:"GET "; depth:4; nocase; uricontent:".asp~"; nocase; reference:url,seclists.org/fulldisclosure/2009/Sep/0321.html; reference:url,doc.emergingthreats.net/2009952; classtype:web-application-attack; sid:2009952; rev:11;)

Added 2017-05-05 16:58:50 UTC


alert http $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"ET WEB_SERVER Tilde in URI - potential .asp source disclosure vulnerability"; flow:established,to_server; content:"GET "; depth:4; nocase; uricontent:".asp~"; nocase; metadata: former_category WEB_SERVER; reference:url,seclists.org/fulldisclosure/2009/Sep/0321.html; reference:url,doc.emergingthreats.net/2009952; classtype:web-application-attack; sid:2009952; rev:11;)

Added 2017-05-03 17:35:07 UTC


alert http $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"ET WEB_SERVER Tilde in URI - potential .asp source disclosure vulnerability"; flow:established,to_server; content:"GET "; depth:4; nocase; uricontent:".asp~"; nocase; reference:url,seclists.org/fulldisclosure/2009/Sep/0321.html; reference:url,doc.emergingthreats.net/2009952; classtype:web-application-attack; sid:2009952; rev:11;)

Added 2017-05-01 16:57:58 UTC


alert http $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"ET WEB_SERVER Tilde in URI - potential .asp source disclosure vulnerability"; flow:established,to_server; content:"GET "; depth:4; nocase; uricontent:".asp~"; nocase; reference:url,seclists.org/fulldisclosure/2009/Sep/0321.html; reference:url,doc.emergingthreats.net/2009952; classtype:web-application-attack; sid:2009952; rev:10;)

Added 2017-04-28 17:24:32 UTC


alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"ET WEB_SERVER Tilde in URI, potential .asp source disclosure vulnerability"; flow:established,to_server; content:"GET"; nocase; http_method; content:".asp~"; nocase; http_uri; reference:url,seclists.org/fulldisclosure/2009/Sep/0321.html; reference:url,doc.emergingthreats.net/2009952; classtype:web-application-attack; sid:2009952; rev:10;)

Added 2011-10-12 19:28:37 UTC


alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"ET WEB_SERVER Tilde in URI, potential .asp source disclosure vulnerability"; flow:established,to_server; content:"GET"; nocase; http_method; content:".asp~"; nocase; http_uri; classtype:web-application-attack; reference:url,seclists.org/fulldisclosure/2009/Sep/0321.html; reference:url,doc.emergingthreats.net/2009952; sid:2009952; rev:10;)

Added 2011-09-14 22:41:55 UTC


alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"ET WEB_SERVER Tilde in URI, potential .asp source disclosure vulnerability"; flow:established,to_server; content:"GET"; nocase; http_method; content:".asp~"; nocase; http_uri; classtype:web-application-attack; reference:url,seclists.org/fulldisclosure/2009/Sep/0321.html; reference:url,doc.emergingthreats.net/2009952; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SERVER/WEB_SERVER_Tilde_Disclosure; sid:2009952; rev:10;)

Added 2011-02-04 17:29:22 UTC


alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"ET WEB_SERVER Tilde in URI, potential .asp source disclosure vulnerability"; flow:established,to_server; content:"GET "; depth:4; nocase; uricontent:".asp~"; nocase; classtype:web-application-attack; reference:url,seclists.org/fulldisclosure/2009/Sep/0321.html; reference:url,doc.emergingthreats.net/2009952; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SERVER/WEB_SERVER_Tilde_Disclosure; sid:2009952; rev:9;)

Added 2010-06-09 20:41:08 UTC


alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"ET WEB_SERVER Tilde in URI, potential .asp source disclosure vulnerability"; flow:established,to_server; content:"GET "; depth:4; nocase; uricontent:".asp~"; nocase; classtype:web-application-attack; reference:url,seclists.org/fulldisclosure/2009/Sep/0321.html; reference:url,doc.emergingthreats.net/2009952; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SERVER/WEB_SERVER_Tilde_Disclosure; sid:2009952; rev:9;)

Added 2010-06-09 20:41:08 UTC


alert tcp any 1024: -> $HOME_NET $HTTP_PORTS (msg:"ET WEB_SERVER Tilde in URI, potential .asp source disclosure vulnerability"; flow:established,to_server; content:"GET "; depth:4; nocase; uricontent:".asp~"; nocase; classtype:web-application-attack; reference:url,seclists.org/fulldisclosure/2009/Sep/0321.html; reference:url,doc.emergingthreats.net/2009952; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SERVER/WEB_SERVER_Tilde_Disclosure; sid:2009952; rev:7;)

Added 2010-02-17 10:45:53 UTC


alert tcp any 1024: -> $HOME_NET $HTTP_PORTS (msg:"ET WEB_SERVER Tilde in URI, potential .asp source disclosure vulnerability"; flow:established,to_server; content:"GET "; depth:4; nocase; uricontent:".asp~"; nocase; classtype:web-application-attack; reference:url,seclists.org/fulldisclosure/2009/Sep/0321.html; reference:url,doc.emergingthreats.net/2009952; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SERVER/WEB_SERVER_Tilde_Disclosure; sid:2009952; rev:7;)

Added 2010-02-17 10:45:53 UTC


alert tcp any 1024: -> $HOME_NET $HTTP_PORTS (msg:"ET WEB_SERVER Tilde in URI, potential .asp source disclosure vulnerability"; flow:established,to_server; flowbits:set,et.tilde.sloppyadmin; content:"GET "; depth:4; nocase; uricontent:".asp~"; nocase; classtype:web-application-attack; reference:url,seclists.org/fulldisclosure/2009/Sep/0321.html; reference:url,doc.emergingthreats.net/2009952; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SERVER/WEB_SERVER_Tilde_Disclosure; sid:2009952; rev:6;)

Added 2009-10-06 14:19:04 UTC


alert tcp any 1024: -> $HOME_NET $HTTP_PORTS (msg:"ET WEB_SERVER Tilde in URI, potential .asp source disclosure vulnerability"; flow:established,to_server; flowbits:set,et.tilde.sloppyadmin; content:"GET "; depth:4; nocase; uricontent:".asp~"; nocase; classtype:web-application-attack; reference:url,seclists.org/fulldisclosure/2009/Sep/0321.html; reference:url,doc.emergingthreats.net/2009952; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SERVER/WEB_SERVER_Tilde_Disclosure; sid:2009952; rev:6;)

Added 2009-10-06 14:19:04 UTC


alert tcp any 1024: -> $HOME_NET $HTTP_PORTS (msg:"ET WEB Tilde in URI, potential .asp source disclosure vulnerability"; flow:established,to_server; flowbits:set,et.tilde.sloppyadmin; content:"GET "; depth:4; nocase; uricontent:".asp~"; nocase; classtype:web-application-attack; reference:url,seclists.org/fulldisclosure/2009/Sep/0321.html; reference:url,doc.emergingthreats.net/2009952; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB/WEB_Tilde_Disclosure; sid:2009952; rev:4;)

Added 2009-09-23 20:04:26 UTC


alert tcp any 1024: -> $HOME_NET $HTTP_PORTS (msg:"ET WEB Tilde in URI, potential .asp source disclosure vulnerability"; flow:established,to_server; flowbits:set,et.tilde.sloppyadmin; content:"GET "; depth:4; nocase; uricontent:".asp~"; nocase; classtype:web-application-attack; reference:url,seclists.org/fulldisclosure/2009/Sep/0321.html; reference:url,doc.emergingthreats.net/2009952; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB/WEB_Tilde_Disclosure; sid:2009952; rev:4;)

Added 2009-09-23 20:04:26 UTC


alert tcp any 1024: -> $HOME_NET $HTTP_PORTS (msg:"ET WEB Tilde in URI, potential .asp source disclosure vulnerability"; flow:established,to_server; flowbits:set,et.tilde.sloppyadmin; content:"GET "; depth:4; nocase; uricontent:".asp~"; nocase; classtype:web-application-attack; reference:url,seclists.org/fulldisclosure/2009/Sep/0321.html; reference:url,doc.emergingthreats.net/2009952; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB/WEB_Tilde_Disclosure; sid:2009952; rev:4;)

Added 2009-09-23 20:00:38 UTC


alert tcp any 1024: -> $HOME_NET $HTTP_PORTS (msg:"ET WEB Tilde in URI, potential .asp source disclosure vulnerability"; flow:established,to_server; flowbits:set,et.tilde.sloppyadmin; content:"GET "; depth:4; nocase; uricontent:".asp~"; nocase; classtype:web-application-attack; reference:url,seclists.org/fulldisclosure/2009/Sep/0321.html; reference:url,doc.emergingthreats.net/2009952; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB/WEB_Tilde_Disclosure; sid:2009952; rev:4;)

Added 2009-09-23 20:00:38 UTC


alert tcp any 1024: -> $HOME_NET $HTTP_PORTS (msg:"ET WEB Tilde in URI, potential .asp source disclosure vulnerability"; flow:established,to_server; flowbits:set,et.tilde.sloppyadmin; content:"GET "; depth:4; nocase; uricontent:".asp~"; nocase; classtype:web-application-attack; reference:url,seclists.org/fulldisclosure/2009/Sep/0321.html; sid:2009952; rev:3;)

Added 2009-09-23 16:45:43 UTC


alert tcp any 1024: -> $HOME_NET $HTTP_PORTS (msg:"ET WEB Tilde in URI, potential .asp source disclosure vulnerability"; flow:established,to_server; flowbits:set,et.tilde.sloppyadmin; content:"GET "; depth:4; nocase; uricontent:".asp~"; nocase; classtype:web-application-attack; reference:url,seclists.org/fulldisclosure/2009/Sep/0321.html; sid:2009952; rev:3;)

Added 2009-09-23 16:45:43 UTC


alert tcp any 1024: -> $HOME_NET $HTTP_PORTS (msg:"ET WEB Tilde in URI, potential .asp source disclosure vulnerability"; flow:established,to_server; flowbits:set,et.tilde.sloppyadmin; flowbits:noalert; content:"GET "; depth:4; nocase; uricontent:".asp~"; nocase; classtype:web-application-attack; reference:url,seclists.org/fulldisclosure/2009/Sep/0321.html; sid:2009952; rev:2;)

Added 2009-09-23 16:00:39 UTC


alert tcp any 1024: -> $HOME_NET $HTTP_PORTS (msg:"ET WEB Tilde in URI, potential .asp source disclosure vulnerability"; flow:established,to_server; flowbits:set,et.tilde.sloppyadmin; flowbits:noalert; content:"GET "; depth:4; nocase; uricontent:".asp~"; nocase; classtype:web-application-attack; reference:url,seclists.org/fulldisclosure/2009/Sep/0321.html; sid:2009952; rev:2;)

Added 2009-09-23 16:00:39 UTC


alert tcp any 1024: -> $HOME_NET $HTTP_PORTS (msg:"ET WEB Tilde in URI, potential .asp source disclosure vulnerability"; flow:established,to_server; flowbits:set,et.tilde.sloppy.admin; flowbits:noalert; content:"GET "; depth:4; nocase; uricontent:".asp~"; nocase; classtype:web-application-attack; reference:url,seclists.org/fulldisclosure/2009/Sep/0321.html; sid:2009952; rev:1;)

Added 2009-09-23 14:16:06 UTC


Topic revision: r1 - 2017-08-08 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats