alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET WEB_SPECIFIC_APPS Free PHP photo gallery script path parameter Remote File inclusion Attempt"; flow:established,to_server; content:"/jadro/libs/adodb/adodb.inc.php?"; nocase; http_uri; content:"path="; nocase; http_uri; pcre:"/path=\s*(ftps?|https?|php)\:\//Ui"; reference:url,packetstormsecurity.org/files/92079/Free-PHP-Photo-Gallery-Script-Remote-File-Inclusion.html; classtype:web-application-attack; sid:2014559; rev:2;)

Added 2012-04-13 18:55:28 UTC


Topic revision: r1 - 2012-04-13 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats