alert http any any -> any any (msg:"ET EXPLOIT Possible rConfig 3.9.2 Remote Code Execution PoC? (CVE-2019-16662)"; flow:established,to_server; content:"GET"; http_method; content:"/install/lib/ajaxHandlers/ajaxServerSettingsChk.php?rootUname="; http_uri; fast_pattern; content:"exec"; distance:0; http_uri; metadata: former_category EXPLOIT; reference:url,packetstormsecurity.com/files/154999/rConfig-3.9.2-Remote-Code-Execution.html; reference:cve,2019-16662; classtype:attempted-admin; sid:2028933; rev:2; metadata:affected_product Web_Server_Applications, attack_target Server, deployment Perimeter, signature_severity Major, created_at 2019_11_04, updated_at 2019_11_04;)

Added 2019-11-04 17:56:09 UTC


Topic revision: r1 - 2019-11-04 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats