TMS zl Module IPS/IDS Signature Reference Guide RLX.10.2.2.94
ProCurve TMS zl Module IPS/IDS Signature
Reference Guide Version RLX.10.2.2.94
137
Signature Description: IBM Net.Data is a scripting language used to create web applications, it supports a wide range
of language environments and is compatible with most recognized databases.Net.Data contains a vulnerability which
reveals server information. Requesting a specially crafted URL, by way of the CGI application, comprised of an invalid
request and known database, will reveal the physical path of server files.Successful exploitation of this vulnerability
could assist in further attacks against the victim host.IBM Net.Data 7.0 is prone to this vulnerability.
Signature ID: 1094
Matt Wright's download.cgi Remote Command Execution Vulnerability
Threat Level: Warning
Industry ID: CVE-1999-1377
CVE-2002-0749 Bugtraq: 4579 Nessus: 11748
Signature Description: Matt Wright's Script archive is a collection of CGI scripts written in Perl. Matt Wright's Script
Archive provides a File download script which allows users to keep track of the number of file downloads for specific
files. Matt Wright's download.cgi 1.0 vulnerable, this version contains a directory traversal vulnerability where an
attacker can use directory traversal techniques. The malicious user(remote attacker) will send specially-crafted url with
the "f" parameter followed by "../" to download.cgi script, after received this type of requests from user the user passed
input values does not properly validating, so there is a chance to view hidden files on the server.
Signature ID: 1095
Extropia WebStore Directory Traversal Vulnerability
Threat Level: Warning
Industry ID: CVE-2000-1005 Bugtraq: 1774
Signature Description: WebStore is the culmination of eXtropia's experience with online shopping applications. It
merges both the Electronic Outlet HTML and Database versions and adds all new routines for error handling, order
processing, encrypted mailing, frames, Javascript and VBscript and other goodies. Extropia WebStore versions 1.0 and
2.0 are vulnerable, the routine web_store.cgi does not properly validating the $file_extension variable if null characters
are used by malicious user(remote attacker). The attacker will send the specially-crafted url with 'page' follwing '../' to
web_store.cgi script. Patches available at vendor website.
Signature ID: 1096
Webmin edit_action.cgi based Directory Traversal Vulnerability
Threat Level: Warning
Industry ID: CVE-2001-1196
CVE-2002-0749 Bugtraq: 3698,4579 Nessus: 11748
Signature Description: Webmin is a web-based system configuration tool for OpenSolaris, Linux and other Unix-based
systems. With it we can configure many operating system internals, such as users, disk quotas, services, configuration
files etc., as well as modify and control many open source apps. Webmin is largely based on Perl, running as its own
process and web server. Webmin Webmin 0.91 version vulnerable, this version is not validatintg properly '../'
sequences from web requests, so this is the chance to make directory traversal attacks. A malicious user(remote
attacker) could use this directory traversal techniques within an argument sent to the edit_action.cgi script in order to
view hidden files on the server or execute programs to which Webmin has security privileges. No remedy available as
of August 2008.
Signature ID: 1097
EMU Webmail emumail.cgi Script Injection Vulnerability
Threat Level: Warning
Industry ID: CVE-2002-1526
Bugtraq: 5824
Signature Description: Emumail is an open source web mail application. It is available for the Unix, Linux, and
Microsoft Windows operating systems. EMUMail EMUMail 5.0 and 5.1 versions for Windows 5.0, EMUMail
EMUMail 5.0 and 5.1 versions for Unix 5.0 and EMUMail EMUMail 5.0 and 5.1 versions for Red Hat Linux 5.0 are
vulnerable versions, these verions does not properly validating user input values in request URL. By using this flaw the
malicious user(attacker) pass an email containing script or html code through the EmuMail web mail interface. This