sos5.0.0,
sos5.1.0
high
This signature detects attempts to exploit a vulnerability in
popper_mod 1.2.1, a Web-based PHP POP3 e-mail client
based on Qpopper. Popper_mod relies on htaccess
authentication to authenticate administrators; if htaccess
is not used to protect administrator access, popper_mod
does not authenticate administrators. Attackers may browse
to the /mail/administrator directory to access the
administration PHP script and view a complete list of user
accounts and passwords, delete accounts, modify accounts,
and edit settings.
HTTP:PHP:POPPER-OPEN-ADMIN
sos5.0.0,
sos5.1.0
high
This signature detects attempts to exploit the vulnerable
passwd.php3 cgi-bin script in the Piranha virtual server
package (RedHat Linux 6.2). Because the script does not
validate input properly, attackers may authenticate to the
Piranha package with the effective ID of the Web server and
execute arbitrary commands.
HTTP:PHP:REDHAT-PIRANHA-PASSWD
sos5.1.0
low
This signature detects attempts to raise the privileges on an
account for the Silent Storm PHP Portal.
HTTP:PHP:SILENT-STORM-ADMIN
sos5.0.0,
sos5.1.0
high
This signature detects a maliciously crafted HTTP POST
request. Attackers may use a directory traversal attack within
the Content-Disposition field of a POST request to force
PHP to execute arbitrary code.
HTTP:PHP:UPLOAD-LOCATION
sos5.0.0,
sos5.1.0
medium
This signature detects attempts to exploit a vulnerability in
the calender.php script that is included with the VBulletin
package. Attackers may run the vbull.c exploit to execute
arbitrary commands with Web Server user permissions.
HTTP:PHP:VBULL-CAL-EXEC
sos5.0.0,
sos5.1.0
medium
Any user on the bulletin board can compromise any other
user's account by exploiting a vulnerability in board.php.
Board.php does not perform proper input validation, and
therefore is subject to executing user-supplied SQL
statements. This is known to affect Woltlab Burning Board
2.0 RC 1 and earlier versions.
HTTP:PHP:WOLTAB-SQL-INJ
sos5.0.0,
sos5.1.0
high
This signature detects attempts to exploit a vulnerability in
Packages.php in YabbSE. YabbSE 1.5.0 and earlier are
vulnerable. Attackers may include remote malicious code
in Packages.php to include remote malicious code to execute
arbitrary commands with Web server privileges.
HTTP:PHP:YABBSE-PKG-EXEC
sos5.0.0,
sos5.1.0
medium
This signature detects attempts to exploit a vulnerability in
YabbSE, a PHP/MySQL port of the forum software YaBB
(yet another bulletin board). YabbSE versions 1.5.2 and earlier
are vulnerable. Attackers may include PHP code in a
maliciously crafted URL request; when YabbSE receives the
request it runs the PHP code, enabling the attacker to
execute arbitrary commands on the server.
HTTP:PHP:YABBSE-SSI-INCLUDE
sos5.0.0,
sos5.1.0
high
This signature detects attacks against the PHP-based
zenTrack CRM system. A vulnerability exists in the
header.php that holds zenTrack configuration settings. It
allows remote command execution as the webserver process
privilege. This applies to zenTrack 2.4.1 and below.
HTTP:PHP:ZENTRACK-CMD-EXEC
903
Copyright © 2010, Juniper Networks, Inc.
Appendix E: Log Entries
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Page 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Page 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Page 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Page 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Page 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Page 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Page 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Page 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Page 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Page 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Page 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Page 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Page 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Page 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Page 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Page 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Page 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Page 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Page 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...