TMS zl Module IPS/IDS Signature Reference Guide RLX.10.2.2.94

ProCurve TMS zl Module IPS/IDS Signature
Reference Guide Version RLX.10.2.2.94
176
Signature Description: Native Solutions, The Banner Engine (tbe) 4.0 and prior are vulnerable to cross-site scripting. A
remote attacker could exploit this vulnerability using the 'adminlogin', 'adminpass' or 'text' parameter to execute script
in a victim's Web browser within the security context of the hosting Web site, allowing the attacker to steal the victim's
cookie-based authentication credentials.
Signature ID: 1287
Microsoft IE Crafted URL Cross Domain Cookie Disclosure vulnerability
Threat Level: Warning
Industry ID: CVE-2000-0439 Bugtraq: 1194
Signature Description: Windows Internet Explorer (MSIE), commonly abbreviated to IE, is a series of graphical web
browsers developed by Microsoft and included as part of the Microsoft Windows line of operating systems. Microsoft,
Internet Explorer 4.0, Microsoft, Internet Explorer 4.0.1, Microsoft, Internet Explorer 5.0 and Microsoft, Internet
Explorer 5.01 are vulnerable to Cross Domain Cookie Disclosure. An attacker by embedding a specially-crafted URL
with certain escape characters, the malicious Web operator can trick Internet Explorer into thinking the pages
originated from another domain, allowing the Web site operator to access cookies from the spoofed domain.
Signature ID: 1288
Avenger's News System Directory Traversal Vulnerability
Threat Level: Warning
Industry ID: CVE-2002-0307 CVE-2002-0306 Bugtraq: 4147,4149 Nessus: 10875
Signature Description: Avenger's News System (ANS) is a simple form-based web site management tool written in
Perl, this tool is usefull to creating an easy to update and easy tomaintain web site. Instead of constantly uploading new
news pages and wrestling with HTML. It will run on most Unix and Linux variants. Avenger's News System 2.11 and
earlier versions are vulnerable, A malicious user(remote attacker) will send a request with dot-dot-slash (../) sequences
in the 'p'(plugin) parameter, these vulnerable versions are does not filter dot-dot-slash (../) sequences from web
requests, making it prone to directory traversal attacks. As a result, the attacker may display the contents of arbitrary
web-readable files. No remedy is available. It will generate log whenever accessing the ans.pl file.
Signature ID: 1289
Avenger's News System Directory Traversal Vulnerability
Threat Level: Warning
Industry ID: CVE-2002-0306
CVE-2002-0307 Bugtraq: 4147,4149 Nessus: 10875
Signature Description: Avenger's News System (ANS) is a simple form-based web site management tool written in
Perl, this tool is usefull to creating an easy to update and easy tomaintain web site. Instead of constantly uploading new
news pages and wrestling with HTML. It will run on most Unix and Linux variants. Avenger's News System 2.11 and
earlier versions are vulnerable, A malicious user(remote attacker) will send a request with dot-dot-slash (../) sequences
in the 'p'(plugin) parameter, these vulnerable versions are does not filter dot-dot-slash (../) sequences from web
requests, making it prone to directory traversal attacks. As a result, the attacker may display the contents of arbitrary
web-readable files. <br>No remedy is available.
Signature ID: 1290
Sun AnswerBook2 Unauthorized Administrative Script Access
Threat Level: Information
Industry ID: CVE-2000-0696 Bugtraq: 5383,1554
Signature Description: Sun Microsystems Solaris AnswerBook2 versions 1.4.2 and prior contains a flaw that may
allow a malicious user to create an arbitrary account. This vulnerability is due to a lack of authentication checks for
certain scripts within the administration interface of AnswerBook2. A successful exploitation of this vulnerability
allows an attacker to access sensitive information on the vulnerable system. This issue is fixed in AnswerBook2 version
1.4.2 patched or higher. Administrators are advised to update 1.4.2 patched or later version to resolve this issue.