TMS zl Module IPS/IDS Signature Reference Guide RLX.10.2.2.94

ProCurve TMS zl Module IPS/IDS Signature
Reference Guide Version RLX.10.2.2.94
265
between the victim server and other hosts can be exploited by the attacker. phpBB Advanced Quick Reply Hack 1.1.0
and phpBB Advanced Quick Reply Hack 1.0.0 are vulnerable.
Signature ID: 1913
WEB-PHP phpbb quick-reply.php arbitrary command Vulnerability
Threat Level: Warning
Industry ID: CVE-2002-2287 Bugtraq: 6173
Signature Description: PhpBB Advanced Quick Reply Hack is a freely available phpBB modification. It adds the
functionality of allowing users to post quick replies to messages. The phpBB Advanced Quick Reply Hack is prone to
an issue which may allow attackers to include arbitrary files from a remote server. It is possible for remote attackers to
influence the include path for 'extension.inc' in the 'quick_reply.php' script. As a result, an attacker may cause an
arbitrary PHP script to be included from an attacker-supplied source, which may result in execution of commands with
the privileges of the web server. phpBB Advanced Quick Reply Hack 1.1.0 and phpBB Advanced Quick Reply Hack
1.0.0 are vulnerable.
Signature ID: 1914
WEB-PHP BadBlue phptest.php access Vulnerability
Threat Level: Warning
Industry ID: CVE-2004-2374 Bugtraq: 9737
Signature Description: BadBlue is a P2P file sharing application distributed by Working Resources, its powerful Office
file sharing works over the web. BadBlue Server is prone to a remote path disclosure vulnerability that may allow an
attacker to disclose the installation path by issuing a request for 'phptest.php' script, the source code of the html
contains the local path of the server on the machine.BadBlue version 2.4 has been reported to be affected by this issue,
however, other versions may be vulnerable as well.
Signature ID: 1915
WEB-PHP piranha passwd.php3 access Vulnerability
Threat Level: Warning
Industry ID: CVE-2000-0322 Bugtraq: 1149
Signature Description: A vulnerability exists in the passwd.php3 cgi-bin script, as included by RedHat as part of the
Piranha virtual server package, in RedHat Linux 6.2. Due to improper checking of input, The security problem arises
from the "http://localhost/piranha/secure/passwd.php3" file. It is possible to execute commands by entering 'blah;some-
command' into the password fields. Everything after the semicolon is executed with the same privilege as the
webserver. This may be used to leverage access to the machine, resulting in further compromise.
Signature ID: 1916
WEB-PHP pmachine remote file include Vulnerability
Threat Level: Warning
Industry ID: CVE-2003-1086 Bugtraq: 7919 Nessus: 11739
Signature Description: PMachine is a freely available PHP-based publishing program that uses a MySQL backend
database. pMachineFree version 2.2.1 could allow a remote attacker to include malicious PHP files, caused by
improper filtering of user-supplied input. A remote attacker could send a specially-crafted URL request to the
lib.inc.php? script using the pm_path variable that specifies a malicious PHP file on a remote system as a parameter,
which could then be used by the attacker to execute arbitrary code on the vulnerable system.
Signature ID: 1918
WEB-PHP remote include path Vulnerability
Threat Level: Information
Signature Description: PHP is a computer scripting language. It is designed for creating dynamic web pages. When a