#alert tcp $HOME_NET $HTTP_PORTS -> $EXTERNAL_NET any (msg:"ET DELETED Tilde in URI after file, potential source disclosure vulnerability"; flow:established,from_server; pcre:"/^HTTP\x2f1\.[01] 200/"; reference:url,seclists.org/fulldisclosure/2009/Sep/0321.html; reference:url,doc.emergingthreats.net/2009954; classtype:web-application-attack; sid:2009954; rev:9; metadata:created_at 2010_07_30, updated_at 2010_07_30;)

Added 2017-08-07 21:03:04 UTC


##alert tcp $HOME_NET $HTTP_PORTS -> $EXTERNAL_NET any (msg:"ET DELETED Tilde in URI after file, potential source disclosure vulnerability"; flow:established,from_server; pcre:"/^HTTP\x2f1\.[01] 200/"; reference:url,seclists.org/fulldisclosure/2009/Sep/0321.html; reference:url,doc.emergingthreats.net/2009954; classtype:web-application-attack; sid:2009954; rev:9;)

Added 2012-10-22 20:58:51 UTC


#alert tcp $HOME_NET $HTTP_PORTS -> $EXTERNAL_NET any (msg:"ET WEB_SERVER Tilde in URI after file, potential source disclosure vulnerability"; flow:established,from_server; pcre:"/^HTTP\x2f1\.[01] 200/"; reference:url,seclists.org/fulldisclosure/2009/Sep/0321.html; reference:url,doc.emergingthreats.net/2009954; classtype:web-application-attack; sid:2009954; rev:8;)

Added 2011-10-12 19:28:37 UTC


#alert tcp $HOME_NET $HTTP_PORTS -> $EXTERNAL_NET any (msg:"ET WEB_SERVER Tilde in URI after file, potential source disclosure vulnerability"; flow:established,from_server; pcre:"/^HTTP\x2f1\.[01] 200/"; classtype:web-application-attack; reference:url,seclists.org/fulldisclosure/2009/Sep/0321.html; reference:url,doc.emergingthreats.net/2009954; sid:2009954; rev:8;)

Added 2011-09-14 22:41:55 UTC


#alert tcp $HOME_NET $HTTP_PORTS -> $EXTERNAL_NET any (msg:"ET WEB_SERVER Tilde in URI after file, potential source disclosure vulnerability"; flow:established,from_server; pcre:"/^HTTP\x2f1\.[01] 200/"; classtype:web-application-attack; reference:url,seclists.org/fulldisclosure/2009/Sep/0321.html; reference:url,doc.emergingthreats.net/2009954; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SERVER/WEB_SERVER_Tilde_Disclosure; sid:2009954; rev:8;)

Added 2011-02-04 17:29:23 UTC


#alert tcp $HOME_NET $HTTP_PORTS -> $EXTERNAL_NET any (msg:"ET WEB_SERVER Tilde in URI after file, potential source disclosure vulnerability"; flow:established,from_server; flowbits:isset,et.tilde.sloppyadmin; pcre:"/^HTTP\x2f1\.[01] 200/"; classtype:web-application-attack; reference:url,seclists.org/fulldisclosure/2009/Sep/0321.html; reference:url,doc.emergingthreats.net/2009954; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SERVER/WEB_SERVER_Tilde_Disclosure; sid:2009954; rev:7;)

Added 2010-06-09 20:41:08 UTC


#alert tcp $HOME_NET $HTTP_PORTS -> $EXTERNAL_NET any (msg:"ET WEB_SERVER Tilde in URI after file, potential source disclosure vulnerability"; flow:established,from_server; flowbits:isset,et.tilde.sloppyadmin; pcre:"/^HTTP\x2f1\.[01] 200/"; classtype:web-application-attack; reference:url,seclists.org/fulldisclosure/2009/Sep/0321.html; reference:url,doc.emergingthreats.net/2009954; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SERVER/WEB_SERVER_Tilde_Disclosure; sid:2009954; rev:7;)

Added 2010-06-09 20:41:08 UTC


#alert tcp $HOME_NET $HTTP_PORTS -> any 1024: (msg:"ET WEB_SERVER Tilde in URI after file, potential source disclosure vulnerability"; flow:established,from_server; flowbits:isset,et.tilde.sloppyadmin; pcre:"/^HTTP\x2f1\.[01] 200/"; classtype:web-application-attack; reference:url,seclists.org/fulldisclosure/2009/Sep/0321.html; reference:url,doc.emergingthreats.net/2009954; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SERVER/WEB_SERVER_Tilde_Disclosure; sid:2009954; rev:6;)

Added 2010-02-15 11:46:49 UTC


#alert tcp $HOME_NET $HTTP_PORTS -> any 1024: (msg:"ET WEB_SERVER Tilde in URI after file, potential source disclosure vulnerability"; flow:established,from_server; flowbits:isset,et.tilde.sloppyadmin; pcre:"/^HTTP\x2f1\.[01] 200/"; classtype:web-application-attack; reference:url,seclists.org/fulldisclosure/2009/Sep/0321.html; reference:url,doc.emergingthreats.net/2009954; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SERVER/WEB_SERVER_Tilde_Disclosure; sid:2009954; rev:6;)

Added 2010-02-15 11:46:49 UTC


#alert tcp $HOME_NET $HTTP_PORTS -> any 1024: (msg:"ET WEB_SERVER Tilde in URI after file, potential source disclosure vulnerability"; flow:established,from_server; flowbits:isset,et.tilde.sloppyadmin; pcre:"/^HTTP\x2f1\.[01] 200/"; classtype:web-application-attack; reference:url,seclists.org/fulldisclosure/2009/Sep/0321.html; reference:url,doc.emergingthreats.net/2009954; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SERVER/WEB_SERVER_Tilde_Disclosure; sid:2009954; rev:6;)

Added 2010-02-15 11:44:41 UTC


#alert tcp $HOME_NET $HTTP_PORTS -> any 1024: (msg:"ET WEB_SERVER Tilde in URI after file, potential source disclosure vulnerability"; flow:established,from_server; flowbits:isset,et.tilde.sloppyadmin; pcre:"/^HTTP\x2f1\.[01] 200/"; classtype:web-application-attack; reference:url,seclists.org/fulldisclosure/2009/Sep/0321.html; reference:url,doc.emergingthreats.net/2009954; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SERVER/WEB_SERVER_Tilde_Disclosure; sid:2009954; rev:6;)

Added 2010-02-15 11:44:41 UTC


alert tcp $HOME_NET $HTTP_PORTS -> any 1024: (msg:"ET WEB_SERVER Tilde in URI after file, potential source disclosure vulnerability"; flow:established,from_server; flowbits:isset,et.tilde.sloppyadmin; pcre:"/^HTTP\x2f1\.[01] 200/"; classtype:web-application-attack; reference:url,seclists.org/fulldisclosure/2009/Sep/0321.html; reference:url,doc.emergingthreats.net/2009954; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SERVER/WEB_SERVER_Tilde_Disclosure; sid:2009954; rev:6;)

Added 2010-02-15 10:46:51 UTC


alert tcp $HOME_NET $HTTP_PORTS -> any 1024: (msg:"ET WEB_SERVER Tilde in URI after file, potential source disclosure vulnerability"; flow:established,from_server; flowbits:isset,et.tilde.sloppyadmin; pcre:"/^HTTP\x2f1\.[01] 200/"; classtype:web-application-attack; reference:url,seclists.org/fulldisclosure/2009/Sep/0321.html; reference:url,doc.emergingthreats.net/2009954; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SERVER/WEB_SERVER_Tilde_Disclosure; sid:2009954; rev:6;)

Added 2010-02-15 10:46:51 UTC


alert tcp $HOME_NET $HTTP_PORTS -> any 1024: (msg:"ET WEB_SERVER Tilde in URI after file, potential source disclosure vulnerability"; flow:established,from_server; flowbits:isset,et.tilde.sloppyadmin; pcre:"/^HTTP\x2f1\.[01] 200/"; classtype:web-application-attack; reference:url,seclists.org/fulldisclosure/2009/Sep/0321.html; reference:url,doc.emergingthreats.net/2009954; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SERVER/WEB_SERVER_Tilde_Disclosure; sid:2009954; rev:6;)

Added 2010-02-15 10:44:44 UTC


alert tcp $HOME_NET $HTTP_PORTS -> any 1024: (msg:"ET WEB_SERVER Tilde in URI after file, potential source disclosure vulnerability"; flow:established,from_server; flowbits:isset,et.tilde.sloppyadmin; pcre:"/^HTTP\x2f1\.[01] 200/"; classtype:web-application-attack; reference:url,seclists.org/fulldisclosure/2009/Sep/0321.html; reference:url,doc.emergingthreats.net/2009954; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SERVER/WEB_SERVER_Tilde_Disclosure; sid:2009954; rev:6;)

Added 2010-02-15 10:44:44 UTC


#alert tcp $HOME_NET $HTTP_PORTS -> any 1024: (msg:"ET WEB_SERVER Tilde in URI after file, potential source disclosure vulnerability"; flow:established,from_server; flowbits:isset,et.tilde.sloppyadmin; pcre:"/^HTTP\x2f1\.[01] 200/"; classtype:web-application-attack; reference:url,seclists.org/fulldisclosure/2009/Sep/0321.html; reference:url,doc.emergingthreats.net/2009954; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SERVER/WEB_SERVER_Tilde_Disclosure; sid:2009954; rev:6;)

Added 2009-10-06 14:19:04 UTC


#alert tcp $HOME_NET $HTTP_PORTS -> any 1024: (msg:"ET WEB_SERVER Tilde in URI after file, potential source disclosure vulnerability"; flow:established,from_server; flowbits:isset,et.tilde.sloppyadmin; pcre:"/^HTTP\x2f1\.[01] 200/"; classtype:web-application-attack; reference:url,seclists.org/fulldisclosure/2009/Sep/0321.html; reference:url,doc.emergingthreats.net/2009954; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SERVER/WEB_SERVER_Tilde_Disclosure; sid:2009954; rev:6;)

Added 2009-10-06 14:19:04 UTC


#alert tcp $HOME_NET $HTTP_PORTS -> any 1024: (msg:"ET WEB Tilde in URI after file, potential source disclosure vulnerability"; flow:established,from_server; flowbits:isset,et.tilde.sloppyadmin; pcre:"/^HTTP\x2f1\.[01] 200/"; classtype:web-application-attack; reference:url,seclists.org/fulldisclosure/2009/Sep/0321.html; reference:url,doc.emergingthreats.net/2009954; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB/WEB_Tilde_Disclosure; sid:2009954; rev:4;)

Added 2009-09-23 20:04:26 UTC


#alert tcp $HOME_NET $HTTP_PORTS -> any 1024: (msg:"ET WEB Tilde in URI after file, potential source disclosure vulnerability"; flow:established,from_server; flowbits:isset,et.tilde.sloppyadmin; pcre:"/^HTTP\x2f1\.[01] 200/"; classtype:web-application-attack; reference:url,seclists.org/fulldisclosure/2009/Sep/0321.html; reference:url,doc.emergingthreats.net/2009954; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB/WEB_Tilde_Disclosure; sid:2009954; rev:4;)

Added 2009-09-23 20:04:26 UTC


#alert tcp $HOME_NET $HTTP_PORTS -> any 1024: (msg:"ET WEB Tilde in URI after file, potential source disclosure vulnerability"; flow:established,from_server; flowbits:isset,et.tilde.sloppyadmin; pcre:"/^HTTP\x2f1\.[01] 200/"; classtype:web-application-attack; reference:url,seclists.org/fulldisclosure/2009/Sep/0321.html; reference:url,doc.emergingthreats.net/2009954; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB/WEB_Tilde_Disclosure; sid:2009954; rev:4;)

Added 2009-09-23 20:00:38 UTC


#alert tcp $HOME_NET $HTTP_PORTS -> any 1024: (msg:"ET WEB Tilde in URI after file, potential source disclosure vulnerability"; flow:established,from_server; flowbits:isset,et.tilde.sloppyadmin; pcre:"/^HTTP\x2f1\.[01] 200/"; classtype:web-application-attack; reference:url,seclists.org/fulldisclosure/2009/Sep/0321.html; reference:url,doc.emergingthreats.net/2009954; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB/WEB_Tilde_Disclosure; sid:2009954; rev:4;)

Added 2009-09-23 20:00:38 UTC


#alert tcp $HOME_NET $HTTP_PORTS -> any 1024: (msg:"ET WEB Tilde in URI after file, potential source disclosure vulnerability"; flow:established,from_server; flowbits:isset,et.tilde.sloppyadmin; pcre:"/^HTTP\x2f1\.[01] 200/"; classtype:web-application-attack; reference:url,seclists.org/fulldisclosure/2009/Sep/0321.html; sid:2009954; rev:3;)

Added 2009-09-23 16:45:43 UTC


#alert tcp $HOME_NET $HTTP_PORTS -> any 1024: (msg:"ET WEB Tilde in URI after file, potential source disclosure vulnerability"; flow:established,from_server; flowbits:isset,et.tilde.sloppyadmin; pcre:"/^HTTP\x2f1\.[01] 200/"; classtype:web-application-attack; reference:url,seclists.org/fulldisclosure/2009/Sep/0321.html; sid:2009954; rev:3;)

Added 2009-09-23 16:45:43 UTC


alert tcp $HOME_NET $HTTP_PORTS -> any 1024: (msg:"ET WEB Tilde in URI after file, potential source disclosure vulnerability"; flow:established,from_server; flowbits:isset,et.tilde.sloppyadmin; pcre:"/^HTTP\x2f1\.[01] 200/"; classtype:web-application-attack; reference:url,seclists.org/fulldisclosure/2009/Sep/0321.html; sid:2009954; rev:3;)

Added 2009-09-23 16:00:39 UTC


alert tcp $HOME_NET $HTTP_PORTS -> any 1024: (msg:"ET WEB Tilde in URI after file, potential source disclosure vulnerability"; flow:established,from_server; flowbits:isset,et.tilde.sloppyadmin; pcre:"/^HTTP\x2f1\.[01] 200/"; classtype:web-application-attack; reference:url,seclists.org/fulldisclosure/2009/Sep/0321.html; sid:2009954; rev:3;)

Added 2009-09-23 16:00:39 UTC


alert tcp $HOME_NET $HTTP_PORTS -> any 1024: (msg:"ET WEB Tilde in URI after file, potential source disclosure vulnerability"; flow:established,from_server; flowbits:isset,et.tilde.sloppy.admin; pcre:"/^HTTP\x2f1\.[01] 200/"; classtype:web-application-attack; reference:url,seclists.org/fulldisclosure/2009/Sep/0321.html; sid:2009954; rev:2;)

Added 2009-09-23 14:53:13 UTC


alert tcp $HOME_NET $HTTP_PORTS -> any 1024: (msg:"ET WEB Tilde in URI after file, potential source disclosure vulnerability"; flow:established,from_server; flowbits:isset,et.tilde.sloppy.admin; pcre:"/^HTTP\x2f1\.[01] 200/"; classtype:web-application-attack; reference:url,seclists.org/fulldisclosure/2009/Sep/0321.html; sid:2009954; rev:2;)

Added 2009-09-23 14:53:13 UTC


alert tcp $HOME_NET $HTTP_PORTS -> any 1024: (msg:"ET WEB Tilde in URI after file, potential source disclosure vulnerability"; flow:established,from_server; flowbits:isset,et.tilde.sloppy.admin; pcre:"/HTTP\x2f1\.[01] 200/"; classtype:web-application-attack; reference:url,seclists.org/fulldisclosure/2009/Sep/0321.html; sid:2009954; rev:1;)

Added 2009-09-23 14:16:06 UTC


Topic revision: r1 - 2017-08-08 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats