alert http $EXTERNAL_NET any -> $HTTP_SERVERS any (msg:"ET WEB_SPECIFIC_APPS phpMyAdmin setup.php Remote File inclusion Attempt"; flow:established,to_server; content:"POST"; http_method; content:"/setup.php"; nocase; http_uri; content:"action="; http_client_body; nocase; content:"&configuration="; distance:0; http_client_body; content:"PMA"; distance:0; http_client_body; content:"Config"; within:11; http_client_body; pcre:"/source(\x22\x3b\w\x3a|%22%3b\w%3a)\d+(\x3a\x22|%3a%22)((ftps?|%66%74%70(%73)?)|(https?|%68%74%74%70(%73)?)|(php|%70%68%70))(\x3a|%3A)(\x2f|%2f)/PRi"; reference:url,blog.spiderlabs.com/2012/04/honeypot-alert-phpmyadmin-setupphp-rfi-attacks-detected.html; reference:url,phpmyadmin.net/home_page/security/PMASA-2010-4.php; reference:cve,CVE-2010-3055; classtype:web-application-attack; sid:2014633; rev:4; metadata:created_at 2012_04_23, updated_at 2012_04_23;)

Added 2017-08-07 21:08:04 UTC


alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET WEB_SPECIFIC_APPS phpMyAdmin setup.php Remote File inclusion Attempt"; flow:established,to_server; content:"POST"; http_method; content:"/setup.php"; nocase; http_uri; content:"action="; http_client_body; nocase; content:"&configuration="; distance:0; http_client_body; content:"PMA"; distance:0; http_client_body; content:"Config"; within:11; http_client_body; pcre:"/source(\x22\x3b\w\x3a|%22%3b\w%3a)\d+(\x3a\x22|%3a%22)((ftps?|%66%74%70(%73)?)|(https?|%68%74%74%70(%73)?)|(php|%70%68%70))(\x3a|%3A)(\x2f|%2f)/Pi"; reference:url,blog.spiderlabs.com/2012/04/honeypot-alert-phpmyadmin-setupphp-rfi-attacks-detected.html; reference:url,phpmyadmin.net/home_page/security/PMASA-2010-4.php; reference:cve,CVE-2010-3055; classtype:web-application-attack; sid:2014633; rev:2;)

Added 2012-04-23 23:04:28 UTC


Topic revision: r1 - 2017-08-08 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats