TMS zl Module IPS/IDS Signature Reference Guide RLX.10.2.2.94
ProCurve TMS zl Module IPS/IDS Signature
Reference Guide Version RLX.10.2.2.94
10
Signature ID: 42
Access to Vulnerable Dbman CGI
Threat Level: Warning
Industry ID: CVE-2000-0381 Bugtraq: 1178
Signature Description: DBMan is a full-featured Database Manager that provides a web interface to add, remove,
modify or view records in a flatfile ascii database. It is possible to cause the DBMan 2.0.4 CGI to reveal sensitive
information, by requesting an invalid database file from a web server such as: GET
/scripts/dbman/db.cgi?db=nonexistant-db. An attacker can thus gain access to critical information that may be used in
further attacks.
Signature ID: 43
Dcforum cgi vulnerability
Threat Level: Severe
Industry ID: CVE-2001-0436 CVE-2001-0437 CVE-2001-0527 Bugtraq: 2611,2728 Nessus: 10583
Signature Description: DCForum is a commercial cgi script from DCScripts which is designed to facilitate web-based
threaded discussion forums. The 'dcforum' CGI in versions 1.0 to 6.0 and 2000v1.0 has a well known security flaw that
lets an attacker execute arbitrary commands with the privileges of the http daemon (usually root or nobody). DCForum
fails to properly validate user-supplied input to the script. By inserting shell commands in submitted querystrings, an
attacker can cause the script to open and parse commands in an external file on the target system. By supplying a long
path (containing '/../' sequences) an attacker can force the script to open a file from arbitrary locations on the filesystem.
Most of the 'DC Scripts DCForum' are vulnerable.
Signature ID: 44
Directorypro CGI Traversal Vulnerability
Threat Level: Severe
Industry ID: CVE-2001-0780 Bugtraq: 2793 Nessus: 10679
Signature Description: Webdirectory Pro is a web application used to create a searchable directory of links developed
by Cosmicperl. The CGI 'directorypro.cgi' in Cosmicperl Directory Pro 2.0 has a well known security flaw that lets an
attacker read arbitrary files with the privileges of the http daemon (usually root or nobody). The value of the 'show'
variable is not properly validated and can be used to force 'directorypro.cgi' to output the contents of an arbitrary
webserver-readable file to a remote attacker. This is due to a lack of checks for NULL bytes in user-supplied data.
Signature ID: 45
Access to /doc Directory vulnerability
Threat Level: Warning
Industry ID: CVE-1999-0678 Bugtraq: 318 Nessus: 10056
Signature Description: A default configuration of Apache on Debian Linux sets the ServerRoot to /usr/doc, which
allows remote users to read documentation files for the entire server. Therefore /doc directory is browsable. /doc shows
the content of the /usr/doc and /doc/package directories and therefore it reveals information about programs and more
important, the version of the installed programs. Debian Linux 2.1 is vulnerable.
Signature ID: 61
Access to Domino db related .nsf files detected
Threat Level: Warning
Nessus: 10629
Signature Description: The remote Lotus Domino server allows an anonymous user to access sensitive information
such as users, databases, configuration of servers. Lotus Domino server is vulnerable to information disclosure. A