TMS zl Module IPS/IDS Signature Reference Guide RLX.10.2.2.94

ProCurve TMS zl Module IPS/IDS Signature
Reference Guide Version RLX.10.2.2.94
254
Signature ID: 1860
WEB-PHP Invision Board ipchat.php file include Vulnerability
Threat Level: Warning
Industry ID: CVE-2003-1385 Bugtraq: 6976
Signature Description: Invision Board is web forum software. It is implemented in PHP and it is available for Unix and
Linux and Microsoft Windows operating systems. Invision Board is prone to an issue that may allow remote attackers
to include files located on attacker-controlled servers.This vulnerability is as a result of insufficient sanitization
performed on remote user supplied data used in URI parameters of certain PHP pages.A remote attacker could send a
specially-crafted URL request to the ipchat.php script that specifies the conf_global.php script from a remote system as
a parameter, which would allow the attacker to execute code on the vulnerable Web server. Vulnerable platform is
Invision Board 1.1.1
Signature ID: 1861
WEB-PHP MatrikzGB privilege escalation Vulnerability
Threat Level: Information
Bugtraq: 8430
Signature Description: MatrikzGB Guestbook is a web application that is implemented in PHP. MatrikzGB could
allow a remote attacker to gain unauthorized administrative access to the guestbook, caused by a vulnerability in the
index.php script. A remote attacker with a valid user account can modify the account by sending a specially-crafted
HTTP request with the 'new_rights' parameter to a value of 'admin', allowing the attacker to gain unauthorized
administrative access to the guestbook and obtain other user's passwords in plain text. The affected version is
MatrikzGB 2.0 and prior. No remedy available as of August 2008.
Signature ID: 1862
WEB-PHP Messagerie supp_membre.php access Vulnerability
Threat Level: Information
Bugtraq: 4635
Signature Description: Messagerie is a web message board application maintained by La Basse.An issue has been
discovered in Messagerie, which could allow an attacker to delete arbitrary user accounts.Reportedly, submitting a
specially crafted URL will successfully remove user accounts. Messagerie 1.0 is a vulnerable version.
Signature ID: 1863
WEB-PHP Opt-X header.php remote file include Vulnerability
Threat Level: Warning
Industry ID: CVE-2004-2368 Bugtraq: 9732
Signature Description: WEB-PHP Opt-X header.php remote file include attemptOpt-X version 0.7.2 and possibly
earlier versions could allow a remote attacker to include malicious PHP files. A remote attacker could send a specially-
crafted URL request to the header.php script that specifies a malicious file from a remote system as a parameter, which
would allow the attacker to execute code on the vulnerable system. No remedy available as of August, 2008.
Signature ID: 1864
WEB-PHP PHP-Nuke remote file include vulnerability
Threat Level: Warning
Industry ID: CVE-2002-0206
Bugtraq: 3889
Signature Description: PHP-Nuke is a web based automated news publishing and content management system based
on PHP and MySQL. The system is fully controlled using a web-based user interface. PHP-Nuke (PHP-Nuke versions
5.3.1 and earlier, and possibly other version below 5.5) could allow remote attackers to execute arbitrary commands on
the Web server, caused by a vulnerability in the index.php script. A remote attacker could send a specially-crafted URL