TMS zl Module IPS/IDS Signature Reference Guide RLX.10.2.2.94
ProCurve TMS zl Module IPS/IDS Signature
Reference Guide Version RLX.10.2.2.94
260
to include remote files on the system. By sending a specially-crafted URL request to the 'translation.php' script that
specifies a remote file using the 'ONLY' parameter, a remote attacker could use this vulnerability and execute arbitrary
code on the system. Upgrade the latest version, available at vendor's website.
Signature ID: 1887
WEB-PHP MediaWiki UpdateClasses.php access Vulnerability
Threat Level: Information
Bugtraq: 9057
Signature Description: A vulnerability has been reported in MediaWiki, which can be exploited by malicious people to
compromise a vulnerable system.The vulnerability is caused due to an input validation error in "UpdateClasses.php",
"Title.php", "Setup.php", "GlobalFunctions.php", and "DatabaseFunctions.php". This can be exploited to execute
arbitrary code on a vulnerable system by supplying a path to a malicious file on a remote system via the "$IP" variable.
Affected versions are MediaWiki-stable 20031107 and MediaWiki-stable 20030829. This signature detects access to
UpdateClasses.php.
Signature ID: 1888
WEB-PHP WAnewsletter db_type.php access Vulnerability
Threat Level: Warning
Bugtraq: 6964
Signature Description: WAnewsletter is a newsletter management script. It is implemented in PHP and will run on
Microsoft Windows and Unix/Linux operating systems. WAnewsletter(WAnewsletter versions 2.0.2-2.1.0) could allow
remote attacker to include malicious PHP files. By sending a specially-crafted URL request to the sql/db_type.php
script that specifies a remote file using the 'waroot' parameter, a remote attacker could exploit this vulnerability and
execute arbitrary code on the vulnerable web server. Upgrade the latest version of WAnewsletter, available at vendor's
website.
Signature ID: 1889
WEB-PHP WAnewsletter newsletter.php file include Vulnerability
Threat Level: Warning
Bugtraq: 6965
Signature Description: WAnewsletter is a newsletter management script. It is implemented in PHP and will run on
Microsoft Windows and Unix/Linux operating systems. WAnewsletter(WAnewsletter versions 2.0.2-2.1.0) could allow
remote attacker to include malicious PHP files. By sending a specially-crafted URL request to the newsletter.php script
script that specifies a remote file using the 'waroot' parameter, a remote attacker could exploit this vulnerability and
execute arbitrary code on the vulnerable web server. Upgrade the latest version of WAnewsletter, available at vendor's
website.
Signature ID: 1890
WEB-PHP WebChat db_mysql.php file include Vulnerability
Threat Level: Warning
Industry ID: CVE-2007-0485 Bugtraq: 7000,22153
Signature Description: WebChat is an open-source PHP-based chat program, developed by Webdev. WebChat version
0.77 could allow a remote attacker to include malicious PHP files. A remote attacker could send a specially-crafted
URL request to the defines.php script that specifies the db_mysql.php or english.php script from a remote system as a
parameter, which would allow the attacker to execute code on the vulnerable Web server. Upgrade to the latest version
of WebChat, available at Vendor's website.