EmergingThreats
>
Main Web
>
2007871
(2009-02-17,
TWikiGuest
)
(raw view)
E
dit
A
ttach
<h2> alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET WEB Philips VOIP841 Web Server Directory Traversal"; flow:to_server,established; content:"GET "; depth:4; pcre:"/(\.\.\/){1,}/"; uricontent:"/etc/passwd";classtype:web-application-attack; reference:url,www.milw0rm.com/exploits/5113; reference:bugtraq,27790; reference:url,doc.emergingthreats.net/2007871; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB/WEB_Philips_VOIP; sid:2007871; rev:2;) </h2> Added 2009-02-16 21:46:09 UTC %COMMENT{type="threadmode" default="Please enter documentation, comments, false positives, or concerns with this signature. Press the Attach button below to add samples or Pcaps." button="Add to Documentation" }% <hr> <h2> alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET WEB Philips VOIP841 Web Server Directory Traversal"; flow:to_server,established; content:"GET "; depth:4; pcre:"/(\.\.\/){1,}/"; uricontent:"/etc/passwd";classtype:web-application-attack; reference:url,www.milw0rm.com/exploits/5113; reference:bugtraq,27790; reference:url,doc.emergingthreats.net/2007871; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB/WEB_Philips_VOIP; sid:2007871; rev:2;) </h2> Added 2009-02-16 21:46:09 UTC <hr> <h2> alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET WEB Philips VOIP841 Web Server Directory Traversal"; flow:to_server,established; content:"GET "; depth:4; pcre:"/(\.\.\/){1,}/"; uricontent:"/etc/passwd";classtype:web-application-attack; reference:url,www.milw0rm.com/exploits/5113; reference:bugtraq,27790; reference:url,doc.emergingthreats.net/2007871; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB/WEB_Philips_VOIP; sid:2007871; rev:2;) </h2> Added 2009-02-16 21:45:24 UTC <hr> <h2> alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET WEB Philips VOIP841 Web Server Directory Traversal"; flow:to_server,established; content:"GET "; depth:4; pcre:"/(\.\.\/){1,}/"; uricontent:"/etc/passwd";classtype:web-application-attack; reference:url,www.milw0rm.com/exploits/5113; reference:bugtraq,27790; reference:url,doc.emergingthreats.net/2007871; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB/WEB_Philips_VOIP; sid:2007871; rev:2;) </h2> Added 2009-02-16 21:45:24 UTC <hr> <h2> alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET WEB Philips VOIP841 Web Server Directory Traversal"; flow:to_server,established; content:"GET "; depth:4; pcre:"/(\.\.\/){1,}/"; uricontent:"/etc/passwd";classtype:web-application-attack; reference:url,www.milw0rm.com/exploits/5113; reference:bugtraq,27790; sid:2007871; rev:1;) </h2> Added 2008-02-22 10:03:25 UTC <hr>
E
dit
|
A
ttach
|
P
rint version
|
H
istory
: r1
|
B
acklinks
|
V
iew topic
|
WYSIWYG
|
M
ore topic actions
Topic revision: r1 - 2009-02-17
-
TWikiGuest
Main
Log In
Main Web
Create New Topic
Index
Search
Changes
Preferences
User Reference
ATasteOfTWiki
TextFormattingRules
Signature Reference
WebRss
Feed
EmergingFAQ
Copyright © Emerging Threats