TMS zl Module IPS/IDS Signature Reference Guide RLX.10.2.2.94
ProCurve TMS zl Module IPS/IDS Signature
Reference Guide Version RLX.10.2.2.94
35
Signature ID: 193
Shells in /cgi-bin vulnerability
Threat Level: Severe
Industry ID: CVE-1999-0509
Nessus: 10252
Signature Description: A shell interpreter is a software for interacting with the computer operating system using
commands to perform specific tasks. The Common Gateway Interface (CGI) is a standard protocol for interfacing
external application software with an information server, commonly a web server. All CGI based services are placed in
a particular folder on the http server. If a shell interpreter is placed in this folder, an attacker can execute any
commands with the privileges of the http server. This signature detects the access to TENEX C shell in the CGI
directory.
Signature ID: 194
Shells in /cgi-bin vulnerability
Threat Level: Severe
Industry ID: CVE-1999-0509 Nessus: 10252
Signature Description: A shell interpreter is a software for interacting with the computer operating system using
commands to perform specific tasks. The Common Gateway Interface (CGI) is a standard protocol for interfacing
external application software with an information server, commonly a web server. All CGI based services are placed in
a particular folder on the http server. If a shell interpreter is placed in this folder, an attacker can execute any
commands with the privileges of the http server. This signature detects the access to Z shell in the CGI directory.
Signature ID: 195
Shells in /cgi-bin vulnerability
Threat Level: Severe
Industry ID: CVE-1999-0509 Nessus: 10252
Signature Description: A shell interpreter is a software for interacting with the computer operating system using
commands to perform specific tasks. The Common Gateway Interface (CGI) is a standard protocol for interfacing
external application software with an information server, commonly a web server. All CGI based services are placed in
a particular folder on the http server. If a shell interpreter is placed in this folder, an attacker can execute any
commands with the privileges of the http server. This signature detects the access to Bourne shell in the CGI directory.
Signature ID: 196
ShopPlus Arbitrary Command Execution vulnerability
Threat Level: Warning
Industry ID: CVE-2001-0992 Bugtraq: 3294 Nessus: 10774
Signature Description: Kabotie Software Technologies ShopPlus Cart is an e-commerce software for web stores.
Kabotie Software Technologies ShopPlus Cart 1.0 does not filter certain types of user-supplied input from web requests
via the "file" parameter. Characters like '|' or ';' are treated as valid by the software. This makes it possible for a
malicious user to submit a request which causes arbitrary commands to be executed on the host. The commands will be
executed with the privileges of the webserver process.
Signature ID: 197
Cobalt siteUserMod cgi vulnerability
Threat Level: Warning
Industry ID: CVE-2000-0117 Bugtraq: 951 Nessus: 10253
Signature Description: The Cobalt RaQ is a 1U rackmount server product line developed by Cobalt Networks, Inc.
featuring a modified Red Hat Linux operating system and a proprietary GUI for server management. In Cobalt RaQ 1.1
to 3.0(inclusive), a malicious site administrator of any account on the server can gain 'admin'(root) privileges. The