TMS zl Module IPS/IDS Signature Reference Guide RLX.10.2.2.94
ProCurve TMS zl Module IPS/IDS Signature
Reference Guide Version RLX.10.2.2.94
33
arbitrary directories by specifying the directory or invalid values in the 'query' parameter. This allows an attacker to
gain valuable information about the directory structure of the remote host and could reveal the presence of files which
are not intended to be visible. Such information can be used by the attacker in subsequent attacks.
Signature ID: 184
Sambar /session/sendmail vulnerability
Threat Level: Warning
Nessus: 10415
Signature Description: Sambar server is a multi-threaded, extensible application server with highly programmable API.
It provides a web interface for sending emails. An attacker can send mails to anyone by passing a POST request to
/session/sendmail. As Sambar server does not check the Referer mime field in the header, direct access to the server is
not necessary. Multiple versions may be vulnerable.
Signature ID: 185
Sambar /sysadmin directory vulnerability
Threat Level: Warning
Bugtraq: 2255 Nessus: 10416,11493
Signature Description: Sambar server is a multi-threaded, extensible application server with highly programmable API.
In Sambar Server 4.1 beta, the default authentication credentials for the administrator account are 'admin' with no
password. Once a remote user has gained knowledge of the path to log into the admin account, it is possible for the user
to login to the server using a http request. The path can be found by exploiting a vulnerable CGI script.
Signature ID: 186
Savant original form CGI access vulnerability
Threat Level: Warning
Industry ID: CVE-2000-0521 Bugtraq: 1313
Signature Description: Michael Lamont Savant WebServer is a freeware open source web server for the windows
operating system family. Michael Lamont Savant WebServer 2.1 allows remote attackers to read source code of CGI
scripts. Omitting the HTTP version from a "GET" request for a CGI script to the Savant Web Server discloses the
source code of the script. This can give an attacker valuable information that can be used in subsequent attacks.
Signature ID: 187
WEB-CGI sdbsearch.cgi access vulnerability
Threat Level: Severe
Industry ID: CVE-2001-1130 Nessus: 10720
Signature Description: Linux is a Unix-like computer operating system. SUSE is a major retail operating system based
on linux kernel, produced in Germany and owned by Novell, Inc. 'Sdbsearch.cgi' in SuSE Linux 6.0-7.2 could allow
remote attackers to execute arbitrary commands by uploading a 'keylist.txt' file that contains filenames with shell
metacharacters, then causing the file to be searched using a '..' in the HTTP referer (from the HTTP_REFERER
variable) to point to the directory that contains the keylist.txt file. Thus a user can execute arbitrary commands with the
privileges of the HTTP server.
Signature ID: 188
WEB-CGI Amaya templates sendtemp.pl directory traversal vulnerability
Threat Level: Severe
Industry ID: CVE-2001-0272 Bugtraq: 2504 Nessus: 10614
Signature Description: W3C's Amaya is a WYSIWYG web browser and authoring program. A complement package
called 'templates server' provides the ability to retrieve templates from an apache web server for use in Amaya-based
authoring. One of the scripts used by the W3C templates server for Amaya 1.1 on W3C Amaya 4.3.2 called