TMS zl Module IPS/IDS Signature Reference Guide RLX.10.2.2.94
ProCurve TMS zl Module IPS/IDS Signature
Reference Guide Version RLX.10.2.2.94
187
is made to login to see the files and folders in the repository. Owl Intranet Engine version 0.71 is vulnerable to Login
bypass due to an error in the validation of user credentials supplied to the PHP script 'browse.php'. This can be
exploited by a malicious person to bypass user authentication by requesting the affected PHP script and supply an
invalid username.
Signature ID: 1340
Allaire JRun Web Root Directory Disclosure Vulnerability
Threat Level: Warning
Industry ID: CVE-2001-1510 Bugtraq: 3592 Nessus: 10814
Signature Description: Allaire JRun is a web application development suite with JSP and Java Servlets. Macromedia
JRun 3.0 and Macromedia JRun 3.1 are vulnerable versions, a remote attacker could send a malformed URL for server
jsp page, after received this due to the improper handling this malformed URLs, a vulnerability exists in Allaire JRun
which could disclose the contents under the web server root directory. It is also possible to view the contents of any sub
directories along with ACL protected resources. This vulnerability could also be used to disclose the source of known
files residing on the host, including the source of ASP files.
Signature ID: 1341
Diva LAN ISDN Modem Denial of Service vulnerability
Threat Level: Warning
Industry ID: CVE-1999-1533 Bugtraq: 665
Signature Description: Diva LAN ISDN Modem is a powerful networking solution for SOHO and branch office users.
It creates a complete networking, fax, phone and data communications system in one box. Eicon Networks DIVA T/A
ISDN Modem 2.0, Eicon Networks DIVA T/A ISDN Modem 1.0 and Eicon Networks DIVA LAN ISDN Modem 1.0
Release 2.5 are vulnerable versions to denial of service. A remote attacker can connect to the Diva HTTP port and send
a Get request (using the syntax 'login.html?password=<very long string>') to cause the system to lock down, here
attacker is sending connection request to login.gtml page with very long values to 'password' parameter, after received
this it can not give any response, now the system under DoS.
Signature ID: 1342
WEB ls%20-l
Threat Level: Information
Signature Description: The ls command lists all of the files and subdirectories in a given directory. To look at details
about these files and directories, we can use ls -l which shows a long listing. This rule will triggers when an attacker to
send a 'ls -l' to http web server.
Signature ID: 1343
Mailman cross site scripting vulnerability
Threat Level: Warning
Industry ID: CVE-2002-0855 Bugtraq: 5298
Signature Description: Mailman is the GNU mailing list manager. It provides standard list management features,
integrated with a web interface.<br>All versions from GNU Mailman 2.0 to GNU Mailman 2.0.11 are vulnerable,
GNU Mailman is prone to a cross-site scripting vulnerability. A remote attacker could send a specially-crafted script
code, after received this request it is not sanitized from the URI parameters of mailing list subscribe scripts. An attacker
may exploit this issue by creating a malicious link containing arbitrary script code and enticing a web user to visit the
link.