TMS zl Module IPS/IDS Signature Reference Guide RLX.10.2.2.94

ProCurve TMS zl Module IPS/IDS Signature
Reference Guide Version RLX.10.2.2.94
770
Signature ID: 34109
Magic Photo Storage Website Multiple Remote File Inclusion vulnerability
Threat Level: Severe
Industry ID: CVE-2007-0182 Bugtraq: 21965
Signature Description: Magic Photo Storage Website contains a flaw that may allow a remote attacker to execute
arbitrary commands. A remote attacker can send a specially-crafted URL request to approve_member.php,
delete_member.php, list_members.php, membership_pricing.php and admin/send_email.php scripts are not properly
sanitizing user input supplied to the '_config[site_path]' variable.It could upload a malicious file from another remote
system by http or https or ftp (admin/admin_password.php?_config[site_path]=http;//[target]/[path]/[maliciousfile] ).
While executing this malicious file in our system the attacker can access what ever he wants as per the malicious code.
Signature ID: 34110
Magic Photo Storage Website Multiple Remote File Include vulnerability
Threat Level: Severe
Industry ID: CVE-2007-0182 Bugtraq: 21965
Signature Description: Magic Photo Storage Website contains a flaw that may allow a remote attacker to execute
arbitrary commands. A remote attacker can send a specially-crafted URL request to admin_password.php,
include/common_function.php, include/db_config.php and config.php scripts are not properly sanitizing user input
supplied to the '_config[site_path]' variable. It could upload a malicious file from another remote system by http or
https or ftp (admin/admin_password.php?_config[site_path]=http://[target]/[path]/[maliciousfile]). While executing this
malicious file in our system the attacker can access what ever he wants as per the malicious code.
Signature ID: 34111
HTTP Microsoft Agent agentdpv.dll ActiveX Malformed URL Stack Overflow vulnerability
Threat Level: Severe
Industry ID: CVE-2007-3040 Bugtraq: 25566
Signature Description: The Microsoft Agent ActiveX control (agentdpv.dll) can be vulnerable with improper bounds
checking by the Agent Control function. By persuading a victim to visit a specially-crafted HTML email message or
document, a remote attacker could attack i.e., stack-based buffer overflow and execute arbitrary code on the system
with the victim's privileges.
Signature ID: 34113
Dayfox Blog Remote File Include Vulnerability
Threat Level: Severe
Industry ID: CVE-2007-0150
Signature Description: Dayfox Blog could allow a remote attacker to include arbitrary files. A remote attacker could
send a specially-crafted URL request to the index.php script using the page, subject or q parameter to specify a
malicious file from a remote system, which could allow the attacker to execute arbitrary code on the vulnerable Web
server.
Signature ID: 34114
Magic Photo Storage Website include/common_function.php Remote File Include vulnerability
Threat Level: Severe
Industry ID: CVE-2007-0181
CVE-2007-0182 Bugtraq: 21965
Signature Description: Magic Photo Storage Website contains a flaw that may allow a remote attacker to execute
arbitrary commands. A remote attacker can send a specially-crafted URL request to include/common_function.php
script not properly sanitizing user input supplied to the 'include/common_function.php variable. It could upload a