text
stringlengths 0
383k
|
---|
WebAttackOSX.MacKeeperDownload3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects OSX.Trojan.Gen activity on the infected machine.
Additional Information
OSX.Trojan.Gen is a generic detection for many individual but varied OS X Trojans for which specific definitions have not been created. A generic detection is used because it protects against many Trojans that share similar characteristics.
Affected
MAC OS
Response
The following instructions pertain to all current and recent Symantec antivirus products, including the Symantec AntiVirus and Norton AntiVirus product lines.
1. Update the virus definitions.
2. Run a full system scan.
|
WebAttackOSXRevirTrojanDownloader
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects Trojan OSX.Revir activity on the infected machine.
Additional Information
OSX.Revir Trojan disguises itself as a PDF when downloaded on the user's machine. When the user executes the file it will drop executables that will download additional malware on the machine.
Affected
MAC OS
Response
The following instructions pertain to all current and recent Symantec antivirus products, including the Symantec AntiVirus and Norton AntiVirus product lines.
1. Update the virus definitions.
2. Run a full system scan.
|
WebAttackOTRSHelpDeskCVE20179324
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects Security Bypass Vulnerability in OTRS Help Desk which allows to bypass certain security restrictions and perform unauthorized actions.
Additional Information
OTRS Help Desk is a ticket management application.
OTRS Help Desk is prone to a security-bypass vulnerability because it allows remote authenticated users to access and modify arbitrary tickets through unspecified vectors. Specifically, this issue occurs in the 'GenericInterface' in the OTRS Help Desk.
An attacker can exploit this issue to bypass certain security restrictions and perform unauthorized actions; this may aid in launching further attacks.
Affected
OTRS Help Desk
Response
Updates are available. Please see the references or vendor advisory for more information.
|
WebAttackOTRSHelpDeskCVE201793242
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects Security Bypass Vulnerability in OTRS Help Desk which allows to bypass certain security restrictions and perform unauthorized actions.
Additional Information
OTRS Help Desk is a ticket management application.
OTRS Help Desk is prone to a security-bypass vulnerability because it allows remote authenticated users to access and modify arbitrary tickets through unspecified vectors. Specifically, this issue occurs in the 'GenericInterface' in the OTRS Help Desk.
An attacker can exploit this issue to bypass certain security restrictions and perform unauthorized actions; this may aid in launching further attacks.
Affected
OTRS Help Desk
Response
Updates are available. Please see the references or vendor advisory for more information.
|
WebAttackOXIDeShopPre-AuthSQLInjection
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to exploit SQL injection vulnerability on the affected machine.
Additional Information
OXID eShop is vulnerable to SQL Injection attack. Successfully exploiting these issues will allow attackers to execute arbitrary code within the context of the application.
Affected
OXID eShop up to 6.0.4/6.1.3
Response
|
WebAttackPack200JARDownload
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This is a silent signature to monitor all Jar downloads(clean and malicious)
Additional Information
This is a silent signature to monitor all Jar downloads(clean and malicious)
Affected
Various Windows Platforms
|
WebAttackPandoraFMSAuthenticatedRemoteCodeExecution
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to exploit Authentication Remote Code Execution vulnerability on the affected machine.
Additional Information
Pandora FMS is vulnerable to Authentication Remote Code Execution attack. Successfully exploiting these issues will allow attackers to execute arbitrary code within the context of the application.
Affected
Pandora FMS prior to version 7.0NG
Response
|
Web Attack: Papercut NG CVE-2023-27350 2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to exploit Authentication Bypass vulnerability on the affected machine.
Additional Information
PaperCut NG is vulnerable to Authentication Bypass attack. Successfully exploiting these issues will allow attackers to execute arbitrary code within the context of the application.
Affected
PaperCut NG 22.0.5 (Build 63914)
Response
|
Web Attack: PaperCut Path Traversal CVE-2023-39143
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit path traversal vulnerability in PaperCut NG and PaperCut MF.
Additional Information
PaperCut NG and PaperCut MF before 22.1.3 on Windows allow path traversal, enabling attackers to upload, read, or delete arbitrary files. This leads to remote code execution when external device integration is enabled (a very common configuration).
Affected
PaperCut NG and PaperCut MF before 22.1.3 on Windows
Response
|
Web Attack: Passwd File Download Attempt
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects an attempt to access the /etc/passwd file directly through an HTTP request.
Additional Information
An attempt to access the /etc/passwd file was detected.This file contains the passwords of all users on a Unix system.
Affected
Any Unix/Linux HTTP Server
Response
|
WebAttackPayloadMagnitudeExploitKit2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attacks from Magnitude Exploit Kit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Magnitude exploit kit is an attack toolkit that allows the remote attacker to perform various malicious actions on the compromised computer. The user is infected by visiting some compromised websites. Exploits may include IE exploit, Adobe flash player exploit.
Affected
Various windows platforms
Response
It is highly recommended to do the following action if this exploit kit is in action.
Update your product definitions and perform a full system scan.
• Submit suspicious files to Symantec for analysis.
If you believe that the signature is reported erroneously, please read the following:
|
WebAttackPcVueActiveXControlCVE-2011-40442
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects an attempt to exploit a remote code execution vulnerability in PcVue ActiveX control.
Additional Information
PcVue is a Multi-station HMI/SCADA controller available for Microsoft Windows.
The application is prone to the following issues:
1. A remote code-execution vulnerability affects the 'SaveObject()' and 'LoadObject()' methods of the 'SVUIGrd.ocx' ActiveX control. The ActiveX control is identified by CLSID: 2BBD45A5-28AE-11D1-ACAC-0800170967D9.
2. A memory-corruption vulnerability affects the 'GetExtendedColor()' method of the 'SVUIGrd.ocx' ActiveX control.
3. A memory-corruption vulnerability affects the 'SaveObject()'' and 'LoadObject()' methods of the 'SVUIGrd.ocx' ActiveX control.
4. A buffer-overflow vulnerability affects the 'DeletePage()' method of the 'aipgctl.ocx' ActiveX control. The ActiveX control is identified by CLSID: 083B40D3-CCBA-11D2-AFE0-00C04F7993D6.
A remote attacker can exploit these issues by enticing an unsuspecting victim to visit a malicious HTML page.
Successfully exploiting these issues allows remote attackers to create or overwrite arbitrary local files and to execute arbitrary code. Failed exploit attempts will result in a denial-of-service condition.
Affected
PcVue 10.0
|
WebAttackPDFCoolStudioCVE-2013-4986
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects an attempt of leveraging a stack buffer overflow vulnerability in PDFCool Studio which may leads to arbitrary code execution.
Additional Information
PDFCool Studio is a PDF document handler used to create, edit, sign, compare, split, combine, replace, encrypt and convert PDF documents.
The application is prone to a stack-based buffer-overflow vulnerability because it fails to properly bounds-check user-supplied data when processing specially crafted PDF files.
Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely cause denial-of-service conditions.
Affected
PDFCool Studio 7.22.1125.2121 is vulnerable; other versions may also be affected.
|
WebAttackPEDownloadFromSuspiciousDownloader
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects an attempt of a file download executed from a suspicious application.
Additional Information
This signature detects an attempt of a file download executed from a suspicious application.
|
WebAttackPeercast.orgPeerCastRemoteBufferOverflow
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
PeerCast is prone to a remote buffer overflow vulnerability. This can facilitate a remote compromise due to arbitrary code execution.
Additional Information
PeerCast is a streaming audio server. It is available for Linux, Microsoft Windows, and Mac OS X platforms.
PeerCast is prone to a remote buffer overflow vulnerability. This issue arises because the application fails to perform boundary checks before copying user-supplied data into sensitive process buffers.
Specifically, the vulnerability presents itself when the application handles a specially crafted URI containing excessive data. A successful attack can result in memory corruption as finite-sized buffers in the 'procConnectArgs' function of the 'servmgr.cpp' are overflowed due to a call to the 'nextCGIarg' function. This can facilitate a remote compromise due to arbitrary code execution.
PeerCast 0.1215 and prior versions are vulnerable.
Affected
Gentoo Linux
peercast.org PeerCast 0.1211, 0.1212, 0.1215
Response
The vendor has released version 0.1217 to address this issue. See the referenced advisories for more information and fixes.
peercast.org PeerCast 0.1215:
peercast.org Upgrade PeerCast v0.1217
peercast.org PeerCast 0.1211:
peercast.org Upgrade PeerCast v0.1217
peercast.org PeerCast 0.1212:
peercast.org Upgrade PeerCast v0.1217
|
WebAttackPeercast.orgPeerCastRemoteFormatString
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
PeerCast is affected by a remote format string vulnerability.
Additional Information
PeerCast is a streaming audio server. It is available for Linux, Microsoft Windows, and Mac OS X platforms.
PeerCast is affected by a remote format string vulnerability. This issue is due to a failure of the application to properly sanitize user-supplied input data prior to using it in a formatted-printing function.
The vulnerability arises when the server attempts to handle a malformed HTTP GET request. An attacker can issue a URI request containing format specifiers resulting the server generating an error message containing the URI and supplying the format specifiers to a formatted-printing function.
A successful attack may result in crashing the server or lead to arbitrary code execution. This may facilitate unauthorized access.
PeerCast 0.1211 and prior versions are affected by this issue.
Affected
Gentoo Linux
peercast.org PeerCast 0.1211, 0.1212
Response
The vendor has released PeerCast 0.1212 to address this issue.
Gentoo Linux has released advisory GLSA 200506-15 to address this issue. Users of affected packages are urged to execute the following commands with superuser privileges:
emerge --sync
emerge --ask --oneshot --verbose ">=media-sound/peercast-0.1212"
Please see the referenced advisory for further information.
|
Web Attack: PE File Download Through IIS Worker Process
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code.
Additional Information
Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code.
Affected
Various platforms.
Response
|
WebAttackPersitsSoftwareXUploadActiveXBO
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects an attempt to exploit a buffer overflow vulnerability in Persits Software XUpload ActiveX control.
Additional Information
The XUpload ActiveX control allows users to upload files to a server.
XUpload is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input.
This issue affects the 'AddFile()' method of the 'xupload.ocx' control identified by CLSID {E87F6C8E-16C0-11D3-BEF7-009027438003}. If the method is passed excessive data, a buffer overflow may occur because the method fails to verify the length of the user-supplied string before copying it to a finite-sized buffer.
An attacker may exploit this issue to execute arbitrary code in the context of an application using the ActiveX control (typically Internet Explorer). Failed attacks will likely cause denial-of-service conditions.
'xupload.ocx' 3.0.0.4 of XUpload 3.0 is vulnerable; other versions may also be affected.
Affected
Persits XUpload 3.0
|
Web Attack: PfSense PfBlockerNG Shell Upload CVE-2022-31814
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to exploit Shell Upload vulnerability in PfSense PfBlockerNG.
Additional Information
pfSense pfBlockerNG through 2.1.4_26 allows remote attackers to execute arbitrary OS commands as root via shell metacharacters in the HTTP Host header.
Affected
pfSense pfBlockerNG through 2.1.4_26
Response
|
WebAttackPhishingDomainActivity
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects a fake antivirus scan page that displays false virus scan results.
Additional Information
This signature is designed to prevent access to sites that redirect users or perform actions to trick users into calling the scammer and installing misleading applications such as fake antivirus software.
The creators of misleading applications often use web pages with fake antivirus scanners in order to convince users to download and run an executable file. They may also use intermediate sites that redirect users from the site they are visiting to another one offering misleading applications for download.
Misleading applications such as fake antivirus scanners ("http://www.symantec.com/security_response/writeup.jsp?docid=2007-101013-3606-99" Trojan.FakeAV ) or bogus disk defragmenters ("http://www.symantec.com/business/security_response/writeup.jsp?docid=2010-112113-1147-99" UltraDefraggerFraud) are designed to mislead users into thinking that their computer has serious problems that must be fixed by paying for a license of the software. For example, a fake antivirus scanner may perform fake scans of the hard disk and then report multiple non-existent threats. To remove the threats, the misleading application tells the user to purchase a license for the software which may amount to anything from forty to one a hundred dollars plus, depending on whether a "support" package is purchased or not. Of course the software and any support packages offered are bogus and will offer no help whatsoever in cleaning up the problem or protecting against any other threats.
Newer generations of misleading applications may also cause instability on the computer such as moving files around, hiding them, or preventing access to certain resources. This is done to coerce the user into buying the fake software.
Affected
Various operating systems
Response
No further action is required but you may wish to perform some of the following actions as a precautionary measure.
|
WebAttackPhoenixToolkitDownload
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Affected
Various
Response
Update all vendor patches to the latest versions.
|
WebAttackPhoenixToolkitFileDownload
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Affected
Various
Response
Update all vendor patches to the latest versions.
|
WebAttackPhoenixToolkitFileDownload2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
Phoenix is an attack toolkit that allows the remote attacker to perform various malicious actions on the compromised computer.
Additional Information
Phoenix is an attack toolkit that allows the remote attacker to perform various malicious actions on the compromised computer.
Affected
Multiple platform
Response
NA
|
WebAttackPhoenixToolkitJavaDownload2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature will detect attempts to download exploits from a Phoenix toolkit that may compromise a computer through various vendor vulnerabilities.
Additional Information
This signature will detect attempts to download exploits from a Phoenix toolkit that may compromise a computer through various vendor vulnerabilities.
Affected
Various
|
WebAttackPhoenixToolkitPayloadDownload
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackPhoenixToolkitVariantActivity4
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
Phoenix is an attack toolkit that allows the remote attacker to perform various malicious actions on the compromised computer.
Additional Information
Phoenix is an attack toolkit that allows the remote attacker to perform various malicious actions on the compromised computer.
Affected
Multiple platform
Response
NA
|
WebAttackPhoenixToolkitWebsite
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempt to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Affected
Various
Response
Update all vendor patches to the latest versions.
|
WebAttackPhoenixToolkitWebsite2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Affected
Various
Response
Update all vendor patches to the latest versions.
|
WebAttackPhoenixToolkitWebsite3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
Phoenix is an attack toolkit that allows the remote attacker to perform various malicious actions on the compromised computer.
Additional Information
Phoenix is an attack toolkit that allows the remote attacker to perform various malicious actions on the compromised computer.
Affected
Multiple platform
Response
NA
|
WebAttackPhoenixToolkitWebsite4
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Affected
Various
Response
Update all vendor patches to the latest versions.
|
WebAttackPhoenixToolkitWebsite5
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
Phoenix is an attack toolkit that allows the remote attacker to perform various malicious actions on the compromised computer.
Additional Information
Phoenix is an attack toolkit that allows the remote attacker to perform various malicious actions on the compromised computer.
Affected
Multiple platform
Response
NA
|
WebattackPhonebookServer
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a buffer overflow vulnerability in Microsoft Phone Book Service.
Additional Information
The Phone Book Service is an optional component that ships with the NT 4 Option Pack and Windows 2000. It is not installed by default.
A buffer overflow vulnerability was discovered in the URL processing routines of the Phone Book Service requests on IIS 4 and IIS 5. If exploited, this vulnerability allows an attacker to execute arbitrary code and obtain a remote command shell with those privileges of the IUSR_machinename account (IIS 4) or the IWAM_machinename account (IIS 5).
Affected
Avaya DefinityOne Media Servers
Avaya IP600 Media Servers
Avaya S3400 Message Application Server
Avaya S8100 Media Servers
Microsoft Windows 2000 Advanced Server SP1
Microsoft Windows 2000 Server SP1
Microsoft Windows 2000 Workstation
Microsoft Windows NT 4.0
Microsoft Windows NT Enterprise Server 4.0, 4.0 SP1, 4.0 SP2, 4.0 SP3, 4.0 SP4, 4.0 SP5, 4.0 SP6, 4.0 SP6a
Microsoft Windows NT Server 4.0, 4.0 SP1, 4.0 SP2, 4.0 SP3, 4.0 SP4, 4.0 SP5, 4.0 SP6, 4.0 SP6a
Response
NOTE: The NT 4.0 fix can be applied to systems running NT 4.0 Service Pack 6a. The Windows 2000 fix can be applied to Windows 2000 Gold or Service Pack 1. This fix will be included in Windows 2000 Service Pack 2.
|
WebAttackPHP-FusionDatabaseBackupInformationDisclosure
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
PHP-Fusion is a web content management system written in PHP. It uses a MySQL database for site content storage.
Additional Information
PHP-Fusion is a web content management system written in PHP. It uses a MySQL database for site content storage.
It is reported that PHP-Fusion is susceptible to a database backup information disclosure vulnerability. An anonymous remote attacker may be able to download a complete database backup from the server. Authentication would not be required.
PHP-Fusion has the capability to make database backups to a file on the web server. These backups are stored in a file with a predictalbe file name, and are not protected by any form of authentication.
The backup files are stored in the format: name_YYYY-MM-DD_HHMM with either a ".sql" or a ".sql.gz" extension. The "name" is an arbitrary, site administrator chosen name.
An attacker is able to either guess the name, bruteforce the name, or possibly use social engineering tactics to assist in locating the name of the backup files. As these files are located in the web servers document root, by knowing the name of the database backup, an attacker would then just directly request the backup file. No authentication checks are required to succeed in downloading the database dump.
A remote attacker may exploit this vulnerability to download the full contents of the application database. The backup includes user information and password hashes. This information could then be used in further attacks against the application. Furthermore, since the database uses the MD5 hash of passwords for authentication, and the authentication cookie directly includes both the username and the MD5 password hash, an attacker would not need to bruteforce the retrieved password hashes.
Version 4.00 was reported vulnerable. Other versions are also likely affected.
Update:
This issue is being retired due to the fact that this is not a vulnerability in the application. Configuring the Web server to restrict access to sensitive files can prevent this problem.
Affected
PHP-Fusion PHP-Fusion 4.00
Response
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected]
|
WebAttackPHPBazarClassified_right.PHPRemoteFileInclude
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
phpBazar is prone to a remote file-include vulnerability.
Additional Information
phpBazar is a web-based classified-ad and match-making application implemented in PHP.
phpBazar is prone to a remote file-include vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input to the 'language_dir' parameter of 'classified_right.php'.
An attacker can exploit this issue to include an arbitrary remote file containing malicious PHP code and execute it in the context of the webserver process. This may allow the attacker to compromise the application and the underlying system; other attacks are also possible.
Affected
SmartISoft phpBazar 2.1
Response
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: mailto:[email protected].
|
WebAttackPHPBBURLDecodeSQLInjection
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This event indicates an attempt to exploit vulnerabilities in phpBB open-source application.
Additional Information
phpBB is an open-source web forum application that is written in PHP and supported by a number of database products. It will run on most Unix and Linux variants, as well as Microsoft Windows operating systems.
The 'viewtopic.php' phpBB script is prone to a remote PHP script injection vulnerability as well as a remote input validation vulnerability due to a failure in the urldecode function reportedly affects phpBB.
A remote input validation vulnerability due to a failure in the urldecode function reportedly affects phpBB. This issue is due to a failure to filter critical characters from user-supplied input.
This script injection issue is due to a failure to filter critical characters from user-supplied input.
This input validation issue is due to a failure of the application to properly sanitize user-supplied URI parameters before using them to construct dynamically generated web pages.
The script injection problem presents itself when a malicious user provides specially formatted URL encoded data to the vulnerable script through the 'highlight' parameter. This may allow a remote attacker to execute arbitrary commands in the context of the web server that is hosting the vulnerable software. This issue may also potentially be exploited to trigger SQL injection attacks, this is not confirmed.
The input validation problem presents itself as the urldecode function used to filter potentially malicious content from user-supplied input fails to properly translate user-specified input. Specifically all '%2527' strings are translated to '%27', corresponding to the single quote character. Apparently the application fails to properly escape this character once translated, facilitating SQL injection and potentially PHP code execution.
**Update: These vulnerabilities are being actively exploited by the Perl.Santy.* worms
Affected
Gentoo Linux
phpBB Group phpBB 1.0.0, 1.2.0, 1.2.1, 1.4.0, 1.4.1, 1.4.2, 1.4.4, 2.0 Beta 1, 2.0 RC1, 2.0 RC2, 2.0 RC3, 2.0 RC4, 2.0.0, 2.0.1, 2.0.2, 2.0.3, 2.0.4, 2.0.5, 2.0.6, 2.0.6 c, 2.0.6 d, 2.0.7, 2.0.7 a, 2.0.8
PNphpBB PNphpBB 1.2, 1.2 f, 1.2 g
Response
Workaround:
A temporary workaround is available at the following location:
howdark.com exploits - follow up
Additionally it is suggested that customers using mod_security may employ the following line to help prevent attacks. The viability of this workaround is not verified by Symantec:
SecFilterSelective "THE_REQUEST" "(system|exec|passthru|popen|shell_exec|proc_open|fopen|fwrite)s*("
Solution:
Gentoo has released a security advisory (GLSA 200411-32) and an updated eBuild to address this vulnerability. Gentoo users are advised to execute the following sequence of commands as a superuser in order to apply the updates:
emerge --sync
emerge --ask --oneshot --verbose ">=www-apps/phpbb-2.0.11"
The vendor has released an update to address this vulnerability:
phpBB Group phpBB 1.0 .0:
phpBB Group Upgrade phpBB-2.0.6.zip
phpBB Group Upgrade phpBB-2.0.9.zip
Xore Upgrade CashMod222.zip
phpBB Group Upgrade phpBB 2.0.11
phpBB Group phpBB 1.2 .0:
phpBB Group Upgrade phpBB-2.0.6.zip
phpBB Group Upgrade phpBB-2.0.9.zip
Xore Upgrade CashMod222.zip
phpBB Group Upgrade phpBB 2.0.11
phpBB Group phpBB 1.2.1:
phpBB Group Upgrade phpBB-2.0.6.zip
phpBB Group Upgrade phpBB-2.0.9.zip
Xore Upgrade CashMod222.zip
phpBB Group Upgrade phpBB 2.0.11
phpBB Group phpBB 1.4 .0:
phpBB Group Upgrade phpBB 1.4.1
phpBB Group Upgrade phpBB-2.0.6.zip
phpBB Group Upgrade phpBB-2.0.9.zip
Xore Upgrade CashMod222.zip
phpBB Group Upgrade phpBB 2.0.11
phpBB Group phpBB 1.4.1:
phpBB Group Upgrade phpBB-2.0.6.zip
phpBB Group Upgrade phpBB-2.0.9.zip
Xore Upgrade CashMod222.zip
phpBB Group Upgrade phpBB 2.0.11
phpBB Group phpBB 1.4.2:
phpBB Group Upgrade phpBB-2.0.6.zip
phpBB Group Upgrade phpBB-2.0.9.zip
Xore Upgrade CashMod222.zip
phpBB Group Upgrade phpBB 2.0.11
phpBB Group phpBB 1.4.4:
phpBB Group Upgrade phpBB-2.0.6.zip
phpBB Group Upgrade phpBB-2.0.9.zip
Xore Upgrade CashMod222.zip
phpBB Group Upgrade phpBB 2.0.11
phpBB Group phpBB 2.0 Beta 1:
phpBB Group Upgrade phpBB-2.0-RC4.tar.gz
phpBB Group Upgrade phpBB 2.0.1
phpBB Group Upgrade phpBB-2.0.6.zip
phpBB Group Upgrade phpBB-2.0.9.zip
phpBB Group Upgrade phpBB-2.0.10
Xore Upgrade CashMod222.zip
phpBB Group Upgrade phpBB 2.0.11
phpBB Group phpBB 2.0 RC1:
phpBB Group Upgrade phpBB-2.0-RC4.tar.gz
phpBB Group Upgrade phpBB 2.0.1
phpBB Group Upgrade phpBB-2.0.6.zip
phpBB Group Upgrade phpBB 2.0.7
phpBB Group Upgrade phpBB-2.0.9.zip
phpBB Group Upgrade phpBB-2.0.10
Xore Upgrade CashMod222.zip
phpBB Group Upgrade phpBB 2.0.11
phpBB Group phpBB 2.0 RC2:
phpBB Group Upgrade phpBB-2.0-RC4.tar.gz
phpBB Group Upgrade phpBB 2.0.1
phpBB Group Upgrade phpBB-2.0.6.zip
phpBB Group Upgrade phpBB 2.0.7
phpBB Group Upgrade phpBB-2.0.9.zip
phpBB Group Upgrade phpBB-2.0.10
Xore Upgrade CashMod222.zip
phpBB Group Upgrade phpBB 2.0.11
phpBB Group phpBB 2.0 RC3:
phpBB Group Upgrade phpBB-2.0-RC4.tar.gz
phpBB Group Upgrade phpBB 2.0.1
phpBB Group Upgrade phpBB-2.0.6.zip
phpBB Group Upgrade phpBB 2.0.7
phpBB Group Upgrade phpBB-2.0.9.zip
phpBB Group Upgrade phpBB-2.0.10
Xore Upgrade CashMod222.zip
phpBB Group Upgrade phpBB 2.0.11
phpBB Group phpBB 2.0 RC4:
phpBB Group Upgrade phpBB 2.0.1
phpBB Group Upgrade phpBB-2.0.6.zip
phpBB Group Upgrade phpBB 2.0.7
phpBB Group Upgrade phpBB-2.0.9.zip
phpBB Group Upgrade phpBB-2.0.10
Xore Upgrade CashMod222.zip
phpBB Group Upgrade phpBB 2.0.11
phpBB Group phpBB 2.0 .0:
phpBB Group Upgrade phpBB 2.0.1
phpBB Group Upgrade phpBB 2.0.2
phpBB Group Upgrade phpBB 2.0.3
phpBB Group Upgrade phpBB-2.0.6.zip
phpBB Group Upgrade phpBB 2.0.7
phpBB Group Upgrade phpBB-2.0.8.zip
phpBB Group Upgrade phpBB-2.0.9.zip
phpBB Group Upgrade phpBB-2.0.10
Xore Upgrade CashMod222.zip
phpBB Group Upgrade phpBB 2.0.11
phpBB Group phpBB 2.0.1:
phpBB Group Upgrade phpBB-2.0.6.zip
phpBB Group Upgrade phpBB 2.0.7
phpBB Group Upgrade phpBB-2.0.8.zip
phpBB Group Upgrade phpBB-2.0.9.zip
phpBB Group Upgrade phpBB-2.0.10
Xore Upgrade CashMod222.zip
phpBB Group Upgrade phpBB 2.0.11
phpBB Group phpBB 2.0.2:
phpBB Group Upgrade phpBB-2.0.6.zip
phpBB Group Upgrade phpBB 2.0.7
phpBB Group Upgrade phpBB-2.0.8.zip
phpBB Group Upgrade phpBB-2.0.9.zip
phpBB Group Upgrade phpBB-2.0.10
Xore Upgrade CashMod222.zip
phpBB Group Upgrade phpBB 2.0.11
phpBB Group phpBB 2.0.3:
phpBB Group Upgrade phpBB 2.0.4
phpBB Group Upgrade phpBB-2.0.6.zip
phpBB Group Upgrade phpBB 2.0.7
phpBB Group Upgrade phpBB-2.0.8.zip
phpBB Group Upgrade phpBB-2.0.9.zip
phpBB Group Upgrade phpBB-2.0.10
Xore Upgrade CashMod222.zip
phpBB Group Upgrade phpBB 2.0.11
phpBB Group phpBB 2.0.4:
phpBB Group Upgrade phpBB-2.0.6.zip
phpBB Group Upgrade phpBB 2.0.7
phpBB Group Upgrade phpBB-2.0.8.zip
phpBB Group Upgrade phpBB-2.0.9.zip
phpBB Group Upgrade phpBB-2.0.10
Xore Upgrade CashMod222.zip
phpBB Group Upgrade phpBB 2.0.11
phpBB Group phpBB 2.0.5:
phpBB Group Upgrade phpBB-2.0.6.zip
phpBB Group Upgrade phpBB 2.0.7
phpBB Group Upgrade phpBB-2.0.8.zip
phpBB Group Upgrade phpBB-2.0.9.zip
phpBB Group Upgrade phpBB-2.0.10
Xore Upgrade CashMod222.zip
phpBB Group Upgrade phpBB 2.0.11
phpBB Group phpBB 2.0.6:
phpBB Group Upgrade phpBB-2.0.6.zip
phpBB Group Upgrade phpBB 2.0.7
phpBB Group Upgrade phpBB-2.0.8.zip
phpBB Group Upgrade phpBB-2.0.9.zip
phpBB Group Upgrade phpBB-2.0.10
Xore Upgrade CashMod222.zip
phpBB Group Upgrade phpBB 2.0.11
phpBB Group phpBB 2.0.6 c:
phpBB Group Upgrade phpBB 2.0.7
phpBB Group Upgrade phpBB-2.0.8.zip
phpBB Group Upgrade phpBB-2.0.9.zip
phpBB Group Upgrade phpBB-2.0.10
Xore Upgrade CashMod222.zip
phpBB Group Upgrade phpBB 2.0.11
phpBB Group phpBB 2.0.6 d:
phpBB Group Upgrade phpBB 2.0.7
phpBB Group Upgrade phpBB-2.0.8.zip
phpBB Group Upgrade phpBB-2.0.9.zip
phpBB Group Upgrade phpBB-2.0.10
Xore Upgrade CashMod222.zip
phpBB Group Upgrade phpBB 2.0.11
phpBB Group phpBB 2.0.7:
phpBB Group Upgrade phpBB-2.0.9.zip
phpBB Group Upgrade phpBB-2.0.10
Xore Upgrade CashMod222.zip
phpBB Group Upgrade phpBB 2.0.11
phpBB Group phpBB 2.0.7 a:
phpBB Group Upgrade phpBB-2.0.9.zip
phpBB Group Upgrade phpBB-2.0.10
Xore Upgrade CashMod222.zip
phpBB Group Upgrade phpBB 2.0.11
phpBB Group phpBB 2.0.8:
phpBB Group Upgrade phpBB-2.0.9.zip
phpBB Group Upgrade phpBB-2.0.10
Xore Upgrade CashMod222.zip
phpBB Group Upgrade phpBB 2.0.11
|
WebAttackphpBBViewtopic.PHPSQLInjection
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
phpBB is prone to a SQL injection vulnerability that may be exploited to reveal password hash data; other attacks may also be possible.
Additional Information
phpBB is an open-source web forum application that is written in PHP and supported by a number of database products. It will run on most Unix and Linux variants, as well as Microsoft Windows operating systems.
A SQL injection vulnerability has been reported for phpBB systems that may result in the disclosure of user password hashes; other attacks may also be possible.
phpBB, in some cases, does not sufficiently sanitize user-supplied input, which is used when constructing SQL queries to execute on the underlying database. As a result, it is possible to manipulate SQL queries. This may allow a remote attacker to modify query logic or potentially corrupt the database.
This vulnerability was reported to exist in the viewtopic.php script file. A remote attacker can exploit this vulnerability by manipulating the $topic_id URI parameter to modify SQL query logic.
SQL injection attacks may also potentially be used to exploit latent vulnerabilities in the underlying database implementation.
Affected
phpBB Group phpBB 2.0.4, 2.0.5
Response
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected] <mailto:[email protected]>.
Gentoo Linux has released an advisory. Users who have installed net-www/phpbb are advised to upgrade to phpbb-2.0.5 by issuing the following commands:
emerge sync
emerge phpbb
emerge clean
|
WebAttackPHPBrobotActivity1
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects PHP Brobot Activity in the system which can lead to compromised networks, file execution and data leakage of confidential information.
Additional Information
PHP Brobot is a php script that is usually uploaded to compromised webservers to allow more access to systems. When used, the malware author can then view directories, execute files in the system and potentially get confidential information from systems.
Affected
PHP servers
|
WebAttackPHPBrobotActivity2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects PHP Brobot Activity in the system which can lead to compromised networks, file execution and data leakage of confidential information.
Additional Information
PHP Brobot is a php script that is usually uploaded to compromised webservers to allow more access to systems. When used, the malware author can then view directories, execute files in the system and potentially get confidential information from systems.
Affected
PHP servers
|
WebAttackPHPBrobotActivity3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects PHP Brobot Activity in the system which can lead to compromised networks, file execution and data leakage of confidential information.
Additional Information
PHP Brobot is a php script that is usually uploaded to compromised webservers to allow more access to systems. When used, the malware author can then view directories, execute files in the system and potentially get confidential information from systems.
Affected
PHP servers
|
WebAttackPHPBrobotActivity4
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects PHP Brobot Activity in the system which can lead to compromised networks, file execution and data leakage of confidential information.
Additional Information
PHP Brobot is a php script that is usually uploaded to compromised webservers to allow more access to systems. When used, the malware author can then view directories, execute files in the system and potentially get confidential information from systems.
Affected
PHP servers
|
Web Attack: PHP CGI CVE-2012-1823 2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature dectects attempts to exploit a vulnerability in PHP CGI which could result to remote code execution
Additional Information
PHP is a freely available, open source web scripting language package. It is available for Microsoft Windows, Linux, and Unix operating systems.
Direct access to the CGI binary can be prevented by using the configuration option '--enable-force-cgi-redirect' and the php.ini option 'cgi.force_redirect'.
A vulnerability exists in PHP when configured as a CGI script that renders these options useless. This is because it fails to properly handle query strings that lack an equals sign character. This allows remote attackers to directly access the CGI binary and to read any file that is readable by the web server user, or to potentially execute arbitrary PHP code.
Affected
PHP before 5.3.12 and 5.4.x before 5.4.2
|
Web Attack: PHPCMS2008 Code Injection Vulnerability
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in PHPCMS2008.
Additional Information
PHPCMS2008 is a content management system which is prone to a code injection vulnerability that can lead to execution of arbitrary code.
Affected
PHPCMS2008.
Response
|
Web Attack: PhpCollab Unrestricted File Upload CVE-2017-6090
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit an unrestricted file upload vulnerability in PhpCollab.
Additional Information
An unrestricted file upload vulnerability exists in phpCollab that allows remote authenticated users to execute arbitrary code.
Affected
PhpCollab 2.5.1 and earlier.
Response
|
Web Attack: PHP CVE-2019-11043
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to exploit Remote Code Execution vulnerability on the affected products.
Additional Information
PHP is a programming language commonly used for web applications.
PHP is prone to a remote code-execution vulnerability. Specifically, this issue occurs due to underflow error in the 'env_path_info()' funcion of the 'fpm_main.c' source file.
Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely cause a denial-of-service condition.
Affected
PHP versions 7.1.x below 7.1.33, 7.2.x below 7.2.24 and 7.3.x below 7.3.11
Response
Updates are available. Please see the references or vendor advisory for more information.
|
Web Attack: PHPKB Authenticated Remote Code Execution CVE-2020-10386
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to exploit Authenticated Remote Code Execution vulnerability on the affected machine.
Additional Information
PHPKB is vulnerable to Authenticated Remote Code Execution attack. Successfully exploiting these issues will allow attackers to execute arbitrary code within the context of the application.
Affected
PHPKB Standard Multi-Language 9
Response
|
WebAttackPHPKBMulti-LanguageCVE-2020-10389
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to exploit vulnerability on the affected machine.
Additional Information
MACHINE is vulnerable to EXPLOIT attack. Successfully exploiting these issues will allow attackers to execute arbitrary code within the context of the application.
Affected
Various Windows machines.
Response
|
WebAttackPHPKMMulti-LanguageCVE-2020-10387
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to exploit Authenticated Directory Traversal vulnerability on the affected machine.
Additional Information
PHPKB Multi-Language is vulnerable to Authenticated Directory Traversal attack. Successfully exploiting these issues will allow attackers to execute arbitrary code within the context of the application.
Affected
PHPKB Multi-Language 9
Response
|
WebAttackPHPLDAPAdminWelcome.PHPMultipleVulnerabilities
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
phpldapadmin is prone to multiple input validation vulnerabilities.
Additional Information
phpldapadmin is a Web based application for administering LDAP servers; it is implemented in PHP.
phpldapadmin is prone to multiple input validation vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input to the 'custom_welcome_page' of 'welcome.php'.
An unauthorized user can exploit this vulnerability to retrieve arbitrary files by supplying directory traversal strings '../' to the vulnerable parameter. Files will be retrieved in the security context of the Web server process. Information obtained may aid in further attacks against the underlying system; other attacks are also possible.
phpldapadmin is prone to a remote file include vulnerability. An attacker can exploit this vulnerability to execute arbitrary PHP script code in the security context of the Web server process.
phpldapadmin is also prone to a cross-site scripting vulnerability. An attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user. This may facilitate the theft of cookie-based authentication credentials as well as other attacks.
Affected
MandrakeSoft Corporate Server 3.0, 3.0 x86_64
phpldapadmin phpldapadmin 0.9.6, 0.9.7 alpha 5
Response
Mandriva Security Advisory MDKSA-2005:212 has been released to address this issue; please see the referenced advisory for further information.
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected] <mailto:[email protected]>.
|
WebAttackPHPMoAdminRCECVE-2015-2208
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
Invalidated POST parameter 'object' allow attacker run arbitrary code.
Additional Information
Invalidated POST parameter 'object' allow attacker run arbitrary code.
Affected
PHP
|
WebAttackPHPMoAdminRemoteCodeExecutionCVE-2015-2208
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to exploit Remote Code Execution Vulnerability on the affected machines.
Additional Information
PHPMoAdmin is a MongoDB administration tool for PHP.
PHPMoAdmin is prone to a remote code-execution vulnerability. Specifically, this issue affects the 'moadmin.php' script.
Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause a denial-of-service condition.
Affected
phpMoAdmin 1.1.2 and prior.
Response
Currently, we are not aware of any vendor-supplied patches. If you feel we are in error or are aware of more recent information, please mail us at: [email protected].
|
Web Attack: phpMyAdmin Arbitrary File Read Vulnerability CVE-2019-6799
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to arbitrary file read vulnerability in phpMyAdmin.
Additional Information
An issue was discovered in phpMyAdmin before 4.8.5. When the AllowArbitraryServer configuration setting is set to true, with the use of a rogue MySQL server, an attacker can read any file on the server that the web server's user can access. This is related to the mysql.allow_local_infile PHP configuration, and the inadvertent ignoring of "options(MYSQLI_OPT_LOCAL_INFILE" calls.
Affected
phpMyAdmin before 4.8.5.
Response
Update to latest available version.
|
WebAttackphpMyAdminCVE-2009-1151PHPCodeInjection
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
An attacker may leverage this issue to execute arbitrary server-side script code on an affected computer with the privileges of the webserver process.
Additional Information
phpMyAdmin is a PHP-based web application.
phpMyAdmin is prone to a vulnerability that lets attackers inject arbitrary PHP code. The issue occurs because the application fails to properly sanitize user-supplied input to the 'setup.php' script. An attacker may exploit this issue to write arbitrary PHP commands to the configuration file generated by the affected script.
The attacker's malicious PHP code would run in the context of the webserver process. This may facilitate a compromise of the application and the underlying system; other attacks are also possible.
Affected
Versions prior to phpMyAdmin 2.11.9.5 and 3.1.3.1 are vulnerable.
Response
Vendor updates are available. Please see the references for more information.
|
WebAttackphpMyAdminCVE-2009-1151PHPCommandExecution
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
An attacker may leverage this issue to execute arbitrary server-side script code on an affected computer with the privileges of the webserver process.
Additional Information
phpMyAdmin is a PHP-based web application.
phpMyAdmin is prone to a vulnerability that lets attackers inject arbitrary PHP code. The issue occurs because the application fails to properly sanitize user-supplied input to the 'setup.php' script. An attacker may exploit this issue to write arbitrary PHP commands to the configuration file generated by the affected script.
The attacker's malicious PHP code would run in the context of the webserver process. This may facilitate a compromise of the application and the underlying system; other attacks are also possible.
Affected
Versions prior to phpMyAdmin 2.11.9.5 and 3.1.3.1 are vulnerable.
Response
Vendor updates are available. Please see the references for more information.
|
Web Attack: phpMyAdmin RFI CVE-2018-12613
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote file inclusion vulnerability in phpMyAdmin.
Additional Information
phpMyAdmin is a PHP-based web application.
phpMyAdmin is prone to a remote file inclusion vulnerability. Specifically, this issue occurs because the application fails to properly test whitelisted pages. An attacker can exploit this issue to include files on the server.
An attacker can exploit this issue to include arbitrary remote files and execute arbitrary code on the affected application. This may facilitate a compromise of the application and the underlying system; other attacks are also possible.
Affected
phpMyAdmin 4.8.0 and 4.8.1 are vulnerable.
|
WebAttackphpMyAdminSQLInjectionCVE-2020-5504
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempts to exploit SQL Injection vulnerability on the affected machines.
Additional Information
phpMyAdmin is a PHP-based web application.
phpMyAdmin is prone to an SQL-injection vulnerability because it fails to properly sanitize user-supplied input before using it in an SQL query. Specifically, this issue affects the 'username' field in 'user accounts' page.
Note: To exploit this issue, attacker must have MySQL account to access the server.
Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
Affected
phpMyAdmin versions 4.x through and prior to 4.9.4, and 5.x through and prior to 5.0.1 are vulnerable.
Response
Updates are available. Please see the references or vendor advisory for more information.
|
WebAttackPHPMyVisitesSet_LangFileInclude
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
phpMyVisites allows unauthorized file includes; this may disclose local files or potentially allow for inclusion of remote files.
Additional Information
phpMyVisites is a Web site statistics application.
phpMyVisites allows attackers to include arbitrary files. While it has been demonstrated that local files may be included through this vulnerability, there is an unconfirmed possibility of remote file inclusion.
The source of the vulnerability is that remote attackers may influence the include path of a file through the 'set_lang.php' PHP script. This may be accomplished by submitting an HTTP POST request that sets the 'mylang' variable to a malicious include path.
Exploitation could disclose local files, or in the case of remote file inclusion, let the attacker execute malicious PHP code.
The issue is known to affect phpMyVisites 1.3. Other versions may also be affected.
Affected
phpMyVisites phpMyVisites 1.3
Response
The vendor has addressed this version in the CVS development version. An official release containing fixes is pending.
|
Web Attack: PHP Nuke ConfigFile Request
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
This signature detects attempts to view PHP-Nuke configuration data via file manipulation operation.
Additional Information
PHP Nuke is a web portal creation and management package, implemented in the PHP scripting language. The default installation includes the script admin/case/case.filemanager.php, which can be used to copy and delete files on the server file system.
The script case.filemanager.php is designed such that it can only be called from the script admin.php, which is responsible for authentication of the remote user. This implementation is flawed, due to a bug in PHPs handling of the $PHP_SELF variable. It is possible for a remote user to include information in the url which is appended to the $PHP_SELF variable, allowing him to bypass this check.
By calling the script in this manner and passing arbitrary file names to the script, a remote user is able to copy and delete any file on the web server. This is subject to the user permissions the web server is running under.
The remote user may, for example, copy '/etc/passwd' over a file normally displayed by the web server, gaining access to sensitive information. If the remote user is able to upload files to the server, they may be able to copy them over a standard PHP Nuke script, and have arbitrary scripts executed by the web user.
Affected
Francisco Burzi PHP-Nuke 5.2
Response
Magnux Software has suggested the following as a solution:
To deny file system access to the web server one may use the following commands:
# cd php-nuke-document-root
# chmod 0 admin/case/case.filemanager.php
Francisco Burzi PHP-Nuke 5.2:
Francisco Burzi Upgrade PHP-Nuke-5.5.tar.gz
|
WebAttackPHPObjectInjectionAttempt2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects PHP Object Injection attempts.
Additional Information
PHP Object Injection vulnerability occurs when user's input is not properly validated before passing it to unserialize PHP function. This can lead to execution of arbitrary code.
Affected
Various PHP applications.
Response
|
Web Attack: PHP Shell Command Execution 7
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects PHP shell uploads and PHP shell commands sent to web servers.
Additional Information
PHP Shell is a shell created in PHP script. This PHP script is uploaded into remote webservers which are later used as a tool to run arbitrary commands, upload arbitrary files to the compromised server.
Affected
Various webservers.
|
Web Attack: PHP Shell Upload
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects PHP shell uploads and PHP shell commands sent to web servers.
Additional Information
PHP Shell is a shell created in PHP script. This PHP script is uploaded into remote webservers which are later used as a tool to run arbitrary commands, upload arbitrary files to the compromised server.
Affected
Various webservers.
|
WebAttackPHPShellUpload11
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects PHP shell uploads and PHP shell commands sent to web servers.
Additional Information
PHP Shell is a shell created in PHP script. This PHP script is uploaded into remote webservers which are later used as a tool to run arbitrary commands, upload arbitrary files to the compromised server.
Affected
Various webservers.
|
WebAttackPHPShellUpload2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects PHP shell uploads and PHP shell commands sent to web servers.
Additional Information
PHP Shell is a shell created in PHP script. This PHP script is uploaded into remote webservers which are later used as a tool to run arbitrary commands, upload arbitrary files to the compromised server.
Affected
Various webservers.
|
Web Attack: PHP Shell Upload 3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects PHP shell uploads and PHP shell commands sent to web servers.
Additional Information
PHP Shell is a shell created in PHP script. This PHP script is uploaded into remote webservers which are later used as a tool to run arbitrary commands, upload arbitrary files to the compromised server.
Affected
Various webservers.
|
Web Attack: PHP Shell Upload 4
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects PHP shell uploads and PHP shell commands sent to web servers.
Additional Information
PHP Shell is a shell created in PHP script. This PHP script is uploaded into remote webservers which are later used as a tool to run arbitrary commands, upload arbitrary files to the compromised server.
Affected
Various webservers.
|
WebAttackPHPShellUpload5
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects PHP shell uploads and PHP shell commands sent to web servers.
Additional Information
PHP Shell is a shell created in PHP script. This PHP script is uploaded into remote webservers which are later used as a tool to run arbitrary commands, upload arbitrary files to the compromised server.
Affected
Various webservers.
|
Web Attack: PHP Shell Upload 7
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects PHP shell uploads and PHP shell commands sent to web servers.
Additional Information
PHP Shell is a shell created in PHP script. This PHP script is uploaded into remote webservers which are later used as a tool to run arbitrary commands, upload arbitrary files to the compromised server.
Affected
Various webservers.
|
Web Attack: PHP Shell Upload 8
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects PHP shell uploads and PHP shell commands sent to web servers.
Additional Information
PHP Shell is a shell created in PHP script. This PHP script is uploaded into remote webservers which are later used as a tool to run arbitrary commands, upload arbitrary files to the compromised server.
Affected
Various webservers.
|
Web Attack: PHPStudy Backdoor Request
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempts to access a backdoor in PHPStudy.
Additional Information
PhpStudy is a program integration package for a PHP debugging environment. It has a backdoor that allows attackers to execute arbitrary commands on the affected webserver.
Affected
Various PHPStudy versions.
Response
|
Web Attack: PhpThumb Command Injection CVE-2010-1598
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a command injection vulnerability in phpThumb.
Additional Information
phpThumb() is an application used to create thumbnails from images.
The application is prone to a command-injection vulnerability because it fails to adequately sanitize user-supplied input to the 'fltr[]' parameter in the 'phpThumb.php' script.
Attackers can exploit this issue to execute arbitrary commands in the context of the webserver.
Note that successful exploitation requires 'ImageMagick' to be installed.
Affected
phpThumb() 1.7.9 is affected; other versions may also be vulnerable.
|
Web Attack: PHPUnit RCE CVE-2017-9841
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in PHPUnit.
Additional Information
PHPUnit is prone to an arbitrary code-execution vulnerability. Specifically, this issue affects the 'Util/PHP/eval-stdin.php' source file. Successful exploits may allow attackers to execute arbitrary PHP code using HTTP POST request.
Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause a denial-of-service condition.
Affected
PHPUnit prior to 4.8.28 and 5.x prior to 5.6.3 are vulnerable.
|
WebAttackPhpWikiPloticusCVE-2014-5519
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts of leveraging a command injection vulnerability in PhpWiki Ploticus module which could lead to system compromise.
Additional Information
PhpWiki is a WikiWikiWeb clone in PHP.
PhpWiki is prone to a remote command-injection vulnerability because it fails to properly sanitize user-supplied input. Specifically, this issue occurs in the Ploticus module.
An attacker may exploit this issue to execute arbitrary commands in context of the affected application.
Affected
PhpWiki 1.5.0
|
WebAttackPi-holeAuthenticatedRCE
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit vulnerability in Pi-hole to acheive remote code execution.
Additional Information
Pi-hole is a specialized DNS server that will block ads and malicious domains for devices that use it. This makes it easy to block ads network wide, rather than relying on something like a browser plugin. The Gravity updater in Pi-hole through 4.4 allows an authenticated adversary to upload arbitrary files. This can be abused for Remote Code Execution by writing to a PHP file in the web directory. Also, it can be used in conjunction with the sudo rule for the www-data user to escalate privileges to root.
Affected
Pi-hole version less than 4.4
Response
Update to the latest version of Pi-hole
|
WebAttackPimcoreCVE-2019-10867
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to exploit Code Execution vulnerability on the affected machine.
Additional Information
Pimcore is vulnerable to Code Execution attack.
The vulnerability exists in the "ClassController.php" class, where the "bulk-commit" method makes it possible to exploit the unserialize function when passing untrusted values in "data" parameter.
Affected
Pimcore prior to version 5.7.1
Response
|
WebAttackPinterestFakeOffer
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature will detect malicious web pages which are used for facebook likejacking attacks.
Additional Information
This signature will detect malicious web pages which creates invisible Like buttons at different locations of a webpage where the user can normally click and unknowingly Like a malicious Page.
Affected
Various browsers.
Response
No further action is required but you may wish to perform some of the following actions as a precautionary measure.
• Update your product definitions and perform a full system scan.
• Submit suspicious files to Symantec for analysis.
If you believe that the signature is reported erroneously, please read the following:
• Report a potential false positive to Symantec.
|
Web Attack: Plesk Command Injection
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit php-cgi information disclosure vulnerability
Additional Information
Exploiting this issue allows remote attackers to view the source code of files in the context of the server process. This may allow the attacker to obtain sensitive information and to run arbitrary PHP code on the affected computer; other attacks are also possible.
Affected
various
|
WebAttackPluginDetectResearch
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects valid usages of applet tags in HTML.
Additional Information
This signature detects applet tags in HTML which will be used to gather clean traffic for IPS QA. This signature should not be toggled to blocking as it detects both legit and malicious instances for applet tags.
Affected
Microsoft .NET Framework 1.0 SP3
Response
No further action is required but you may wish to perform some of the following actions as a precautionary measure.
• Update your product definitions and perform a full system scan.
• Submit suspicious files to Symantec for analysis.
If you believe that the signature is reported erroneously, please read the following:
• Report a potential false positive to Symantec.
|
WebAttackPluginDetectResearch2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects valid usages of applet tags in HTML.
Additional Information
This signature detects applet tags in HTML which will be used to gather clean traffic for IPS QA. This signature should not be toggled to blocking as it detects both legit and malicious instances for applet tags.
Affected
Microsoft .NET Framework 1.0 SP3
Response
No further action is required but you may wish to perform some of the following actions as a precautionary measure.
• Update your product definitions and perform a full system scan.
• Submit suspicious files to Symantec for analysis.
If you believe that the signature is reported erroneously, please read the following:
• Report a potential false positive to Symantec.
|
WebAttackPluginDetectResearch3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects valid usages of applet tags in HTML.
Additional Information
This signature detects applet tags in HTML which will be used to gather clean traffic for IPS QA. This signature should not be toggled to blocking as it detects both legit and malicious instances for applet tags.
Affected
Microsoft .NET Framework 1.0 SP3
Response
No further action is required but you may wish to perform some of the following actions as a precautionary measure.
• Update your product definitions and perform a full system scan.
• Submit suspicious files to Symantec for analysis.
If you believe that the signature is reported erroneously, please read the following:
• Report a potential false positive to Symantec.
|
WebAttackPOP3GenericUserBO
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a buffer overflow vulnerability in Mail Servers.
Additional Information
Mail Servers for Windows platforms allows a single Internet connection to be simultaneously shared by multiple computers. A vulnerability in the POP3 proxy portion could allow a remote attacker to crash the server. Many Mail Servers fails to check the length of arguments submitted to the USER command.
Affected
RevilloC MailServer 1.21
Response
Apply all available patches for the applicable POP3 server.
|
WebAttackPossibleAdobeExploitGeneric
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
An attacker can exploit these issues to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial-of-service conditions.
Additional Information
Adobe Reader and Acrobat are applications for handling PDF files.
Adobe Reader and Acrobat are prone to multiple remote code-execution vulnerabilities. Specifically, these issues occurs due to an Out-of-bounds write error.
Few technical details are currently available. This BID will be updated as more information emerges.
An attacker can exploit these issues to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial-of-service conditions.
Affected
Adobe Reader and Acrobat are applications
|
WebAttackPossibleExploitGeneric
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackPossibleExploitGeneric2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackPossibleExploitGeneric3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackPossibleExploitGeneric4
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
Web Attack: Postgres Insecure Trust Authentication
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to exploit Insecure TRUST Authentication vulnerability on the affected machine.
Additional Information
Misconfigured Postgres trust authentication setting could allow attacker to abuse the connection to the server and achieve code execution.
Affected
Various Postgres versions
Response
|
Web Attack: Powercat Payload Download
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects PowerCat activity.
Additional Information
PowerCat is a powershell version for the famous netcat tool. It is seen used by various actors during data exfiltration or remote access.
Affected
Various Windows machines.
Response
|
WebAttackPowerTCPFTPActivexBO
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature will detect attempts to exploit a Buffer Overflow Vulnerability in Dart Communications PowerTCP FTP for ActiveX control.
Additional Information
PowerTCP FTP for ActiveX is an ActiveX control that uses an FTP client.
The application is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input.
The issue affects the 'SecretKey' property of the control identified by CLSID:
39FDA070-61BA-11D2-AD84-00105A17B608
An attacker can exploit this issue to execute arbitrary code in the context of the application using the ActiveX control (typically Internet Explorer). Failed attacks will likely cause denial-of-service conditions.
The issue affects PowerTCP FTP for ActiveX 2.0.2.0; other versions may also be affected.
Affected
The issue affects PowerTCP FTP for ActiveX 2.0.2.0; other versions may also be affected.
Response
Download and install all vendor patches related to this vulnerability.
|
WebAttackPrestashopCrossSiteRequestForgery
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to exploit Cross Site Request Forgery vulnerability on the affected machine.
Additional Information
PrestaShop is a PHP-based ecommerce application.
PrestaShop is prone to cross-site request-forgery vulnerabilities because the application does not properly validate HTTP requests. An attacker can exploit these issues to modify account passwords and mail addresses or to add/remove products from the cart if a logged-in administrative user visits a malicious web site.
Exploiting these issues may allow a remote attacker to perform certain unauthorized actions in the context of the affected application. Other attacks are also possible.
Affected
PrestaShop 1.7.6.4 is vulnerable; other versions may also be affected.
Response
|
Web Attack: PrestaShop Remote Code Execution CVE-2018-8823
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempts to exploit a remote code executoin vulnerability in PrestaShop.
Additional Information
PrestaShop is prone to a vulnerability that can lead to execution of remote code.
Affected
PrestaShop 1.5.5.0 through 1.7.2.5.
Response
|
WebAttackProPackExploitKitDownload
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackPUAFirefoxExtensionActivity2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects a fake antivirus scan page that displays false virus scan results.
Additional Information
This signature is designed to prevent access to sites that redirect users or perform actions to trick users into calling the scammer and installing misleading applications such as fake antivirus software.
The creators of misleading applications often use web pages with fake antivirus scanners in order to convince users to download and run an executable file. They may also use intermediate sites that redirect users from the site they are visiting to another one offering misleading applications for download.
Misleading applications such as fake antivirus scanners ("http://www.symantec.com/security_response/writeup.jsp?docid=2007-101013-3606-99" Trojan.FakeAV ) or bogus disk defragmenters ("http://www.symantec.com/business/security_response/writeup.jsp?docid=2010-112113-1147-99" UltraDefraggerFraud) are designed to mislead users into thinking that their computer has serious problems that must be fixed by paying for a license of the software. For example, a fake antivirus scanner may perform fake scans of the hard disk and then report multiple non-existent threats. To remove the threats, the misleading application tells the user to purchase a license for the software which may amount to anything from forty to one a hundred dollars plus, depending on whether a "support" package is purchased or not. Of course the software and any support packages offered are bogus and will offer no help whatsoever in cleaning up the problem or protecting against any other threats.
Newer generations of misleading applications may also cause instability on the computer such as moving files around, hiding them, or preventing access to certain resources. This is done to coerce the user into buying the fake software.
Affected
Various operating systems
Response
No further action is required but you may wish to perform some of the following actions as a precautionary measure.
|
WebAttackPUAOpencandyDownload
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects Adware.Gen communicating and requesting information from its controlling server.
Additional Information
Adware and PUAs are known to download and execute Malicious applications which can harm the system and can steal data.
Affected
Various Windows Platforms.
|
WebAttackPulseConnectSecureDirectoryTraversalVulnerability
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Pulse Connect Secure.
Additional Information
Pulse Connect Secure is prone to a vulnerability that can lead to remote code execution.
Affected
Pulse Connect Secure.
Response
|
Web Attack: Pulse Secure SSL VPN File Disclosure CVE-2019-11510
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to exploit vulnerability on the affected machine.
Additional Information
Pulse Secure SSL VPN that enables extranet users to connect to corporate network securely. Pulse Secure SSL VPN is prone to a file disclosure vulnerability that can further lead to device compromise.
Affected
Version: 8.1R15.1, 8.2 before 8.2R12.1, 8.3 before 8.3R7.1, and 9.0 before 9.0R3.4.
Response
|
WebAttackPulseSecureSuspiciousRequest
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects suspicious requests to Pulse Secure server.
Additional Information
Pulse Secure is prone to a vulnerability that allows unauthenticated users to gain access to sensitive files.
Affected
Pulse Secure Server.
Response
|
WebAttackPulseSecureVPNCVE-2019-11539
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to exploit Arbitrary Command Execution vulnerability on the affected machine.
Additional Information
Pulse Secure SSL VPN is vulnerable to Arbitrary Command Execution attack. The admin web interface allows an authenticated attacker to inject and execute commands as root.
Affected
Pulse Secure Pulse Connect Secure version 9.0RX before 9.0R3.4, 8.3RX before 8.3R7.1, 8.2RX before 8.2R12.1, and 8.1RX before 8.1R15.1
Pulse Policy Secure version 9.0RX before 9.0R3.2, 5.4RX before 5.4R7.1, 5.3RX before 5.3R12.1, 5.2RX before 5.2R12.1, and 5.1RX before 5.1R15.1
Response
|
WebAttackPUP.SearchProtectDownload
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature will detect attempts to download Potentially Unwanted Program - SearchProtect.
Additional Information
PUA.SearchProtect is a potentially unwanted app that modifies settings on the Web browser.
The program arrives on the computer through a third-party installer or download manager. It has the ability to install itself silently.
The program may connect to the following remote locations while it's installing itself:
sp-installer.conduit-data.com
sp-storage.conduit-services.com
sp-installer.databssint.com
sp-download.spccint.com
sp-storage.spccinta.com
sp-settings.spccint.com
sp-installer.databssint.com
servicemap.spccint.com
sp-ip2location.spccint.com
sp-alive-msg.databssint.com
sp-autoupdate.spccint.com
c.api.seccint.com
sp-usage.databssint.com
Once the program is installed, it changes the Web browser's default home page, new tab settings and search engine to the following remote locations:
search.conduit.com
www.trovi.com
The program prevents other software from changing the Web browser's default home page, new tab and search engine. It allows users to change these settings through the program itself.
Affected
Various
Response
No further action is required but you may wish to perform some of the following actions as a precautionary measure.
• Update your product definitions and perform a full system scan.
• Submit suspicious files to Symantec for analysis.
If you believe that the signature is reported erroneously, please read the following:
|
WebAttackPUPAdwareFakeApplicationDownload
Severity:Low
This attack poses a minor threat. Corrective action may not be possible or is not required.
Description
This signature detects a file installer download which are associated with adware.
Additional Information
Adware are programs that secretly gather personal information through the Internet and relay it back to another computer. This is done by tracking browsing habits, generally for advertising purposes.
Adware is a type of program that displays an advertisement of some sort. Adware is usually related to a specific Web site that is cached in the Web browser. In some cases, it changes the home page of your Web browser to point to a specific Web site. Because adware is not malicious in nature, it is not considered a virus.
Affected
Various Windows Platforms
Response
Unless otherwise known, any unintended PUA/Adware Activity in this network traffic should be treated as Malicious. Actions should be taken to suspend and audit the communication and potentially block this network Activity from further communication.
If you want to block this network traffic, refer the following link:
https://support.symantec.com/en_US/article.HOWTO80883.html
|
WebAttackPUPAdwareFakeApplicationDownload2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackPUPAdwareFakeApplicationDownload4
Severity:Low
This attack poses a minor threat. Corrective action may not be possible or is not required.
Description
This signature detects a file installer download which are associated with adware.
Additional Information
Adware are programs that secretly gather personal information through the Internet and relay it back to another computer. This is done by tracking browsing habits, generally for advertising purposes.
Adware is a type of program that displays an advertisement of some sort. Adware is usually related to a specific Web site that is cached in the Web browser. In some cases, it changes the home page of your Web browser to point to a specific Web site. Because adware is not malicious in nature, it is not considered a virus.
Affected
Various Windows Platforms
Response
Unless otherwise known, any unintended PUA/Adware Activity in this network traffic should be treated as Malicious. Actions should be taken to suspend and audit the communication and potentially block this network Activity from further communication.
If you want to block this network traffic, refer the following link:
https://support.symantec.com/en_US/article.HOWTO80883.html
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.