TMS zl Module IPS/IDS Signature Reference Guide RLX.10.2.2.94
ProCurve TMS zl Module IPS/IDS Signature
Reference Guide Version RLX.10.2.2.94
92
send a specially-crafted HTTP GET request containing the name of the cookie(such as philboard_admin=True and
admin=True), an attacker can use this vulnerability to gain administrative access to the forum, including the backend
database. No remedy available as September, 2008.
Signature ID: 625
WEB-MISC philboard_admin.asp authentication bypass vulnerability
Threat Level: Information
Bugtraq: 7739 Nessus: 11675
Signature Description: Philboard is a web-based forum implemented using ASP script. Philboard(Philboard version
1.14 and prior) could allow a remote attacker to gain unauthorized administrative access to the forum. This event
indicates that an attempt has been made to exploit a weakness in the Philboard ASP application. By setting a cookie
value to "True" administration rights are granted to that user. The user would then gain control of the application and
have access to all administration functions. This rule generates an event if the attacker makes a request for the
administration page with the cookie "philboard_Admin" value set to true from a source external to the protected
network. No remedy available as of September, 2008.
Signature ID: 626
WEB-MISC philboard.mdb Vulnerability
Threat Level: Warning
Nessus: 11682
Signature Description: Phiboard is freeware forum application implemented in ASP Scripts. Philboard, version 1.14
and prior, could allow a remote attacker to gain unauthorized administrative access to the forum. By default, Philboard
installs the Access database file to database/philboard.mdb on the web server. Without authentication, an attacker can
download this file to access Philboard bulletin board user names, passwords, and message archives. No remedy
available as of September, 2008.
Signature ID: 627
WEB-MISC globals.pl access Vulnerability
Threat Level: Information
Industry ID: CVE-2007-4539 Bugtraq: 25425
Signature Description: Bugzilla is a bug or issue-tracking system. Bug-tracking systems allow individual or groups of
developers effectively to keep track of outstanding problems with their product. Bugzilla(Bugzilla versions 2.23.3
through 3.0.0) ships with a file called 'globals.pl', containing global variables and other information used by various
Bugzilla components. Among the more sensitive variables stored in this file are the database user name and password.
This file is possible to read by a user via a web browser and also obtain sensitive information, caused by insecure
permissions on time-tracking fields in the WebService(XML-RPC)interface.
Signature ID: 628
WEB-MISC lyris.pl access Vulnerability
Threat Level: Information
Industry ID: CVE-2000-0758 Bugtraq: 1584
Signature Description: Lyris ListManager is the world's most popular software for creating, sending, and tracking
highly effective email campaigns, newsletters, and discussion groups. This rule triggered when an attacker could send a
specially-crafted URL request to the lyris.pl script using the variable list_admin. The variable list_admin is used to
identify the user as an administrator, by changing this value from F to T the attacker can identify himself as the mailing
list administrator. An attacker can use this vulnerability to gain sensitive information and obtain administrator access.
The affected version of Lyris ListManager is 3.0.0. and 4.0.0.