?? 3463.txt
字號(hào):
Rule:--Sid:3463--Summary:This event is generated when an attempt is made to access the cgi scriptawstats.pl.--Impact:Possible execution of system commands.--Detailed Information:Adavanced Web Statistics (awstats) is used to process web server logfiles and produces reports of web server usage.Some versions of awstats do not correctly sanitize user input. This maypresent an attacker with the opportunity to supply system commands viathe "logfile" parameter. For the attack to be sucessful the "update"parameter must also have the value set to "1". This event indicates thatan attempt has been made to access the awstats.pl cgi script.--Affected Systems: Awstats 6.1 and prior--Attack Scenarios:An attacker can supply commands of their choosing as a value for thelogfile parameter by enclosing the commands in pipe charecters. Forexample: http://www.foo.com/cgi-bin/awstats.pl?update=1&logfile=|<command here>|--Ease of Attack:Simple. No exploit software required.--False Positives:None known.--False Negatives:None known.--Corrective Action:Ensure the system is using an up to date version of the software.Disallow access to awstats.pl as a CGI script.--Contributors:Sourcefire Vulnerability Research TeamAlex Kirk <akirk@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>--Additional References:--
?? 快捷鍵說(shuō)明
復(fù)制代碼
Ctrl + C
搜索代碼
Ctrl + F
全屏模式
F11
切換主題
Ctrl + Shift + D
顯示快捷鍵
?
增大字號(hào)
Ctrl + =
減小字號(hào)
Ctrl + -