alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET WEB_SPECIFIC_APPS ViArt? Shop Evaluation previews_functions.php Remote File Inclusion Attempt"; flow:established,to_server; content:"/includes/previews_functions.php?"; nocase; http_uri; content:"root_folder_path="; fast_pattern:only; nocase; http_uri; pcre:"/root\_folder\_path=\s*(?:(?:ht|f)tps?|data|php)\x3a\//Ui"; reference:url,packetstormsecurity.org/files/116871/ViArt-Shop-Evaluation-4.1-Remote-File-Inclusion.html; classtype:web-application-attack; sid:2016004; rev:1;)

Added 2012-12-07 19:21:01 UTC


Topic revision: r1 - 2012-12-08 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats