##alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET DELETED Exploit Suspected PHP Injection Attack (name=)"; flow:to_server,established; content:"GET"; nocase; http_method; content:".php?"; nocase; http_uri; content:"name="; fast_pattern; nocase; http_uri; pcre:"/name=(https?|ftps?|php)/Ui"; reference:cve,2002-0953; reference:url,doc.emergingthreats.net/2001621; classtype:web-application-attack; sid:2001621; rev:36;)

Added 2011-10-12 19:10:43 UTC


##alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET DELETED Exploit Suspected PHP Injection Attack (name=)"; flow:to_server,established; content:"GET"; nocase; http_method; content:".php?"; nocase; http_uri; content:"name="; fast_pattern; nocase; http_uri; pcre:"/name=(https?|ftps?|php)/Ui"; classtype:web-application-attack; reference:cve,2002-0953; reference:url,doc.emergingthreats.net/2001621; sid:2001621; rev:36;)

Added 2011-09-14 21:02:11 UTC


##alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET DELETED Exploit Suspected PHP Injection Attack (name=)"; flow:to_server,established; content:"GET"; nocase; http_method; content:".php?"; nocase; http_uri; content:"name="; fast_pattern; nocase; http_uri; pcre:"/name=(https?|ftps?|php)/Ui"; classtype:web-application-attack; reference:cve,2002-0953; reference:url,doc.emergingthreats.net/2001621; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SERVER/WEB_PHP_Injection; sid:2001621; rev:36;)

Added 2011-06-10 16:25:20 UTC


alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET WEB_SERVER Exploit Suspected PHP Injection Attack (name=)"; flow:to_server,established; content:"GET"; nocase; http_method; content:".php?"; nocase; http_uri; content:"name="; fast_pattern; nocase; http_uri; pcre:"/name=(https?|ftps?|php)/Ui"; classtype:web-application-attack; reference:cve,2002-0953; reference:url,doc.emergingthreats.net/2001621; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SERVER/WEB_PHP_Injection; sid:2001621; rev:35;)

Added 2011-02-04 17:21:32 UTC


alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET WEB_SERVER Exploit Suspected PHP Injection Attack (name=)"; flow:to_server,established; content:"GET "; nocase; depth:4; uricontent:".php?"; nocase; uricontent:"name="; nocase; pcre:"/name=(https?|ftps?|php)/Ui"; reference:cve,2002-0953; classtype:web-application-attack; reference:url,doc.emergingthreats.net/2001621; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SERVER/WEB_PHP_Injection; sid:2001621; rev:33;)

Added 2010-03-10 15:00:57 UTC


alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET WEB_SERVER Exploit Suspected PHP Injection Attack (name=)"; flow:to_server,established; content:"GET "; nocase; depth:4; uricontent:".php?"; nocase; uricontent:"name="; nocase; pcre:"/name=(https?|ftps?|php)/Ui"; reference:cve,2002-0953; classtype:web-application-attack; reference:url,doc.emergingthreats.net/2001621; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SERVER/WEB_PHP_Injection; sid:2001621; rev:33;)

Added 2010-03-10 15:00:57 UTC


alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET WEB_SERVER Exploit Suspected PHP Injection Attack"; flow: to_server,established; content:"GET "; nocase; depth:4; uricontent:".php?"; nocase; pcre:"/(name=(https?|ftps?|php)|cmd=.*(cd|\;|echo|cat|perl|curl|wget|id|uname|t?ftp))/Ui"; reference:cve,2002-0953; classtype: trojan-activity; reference:url,doc.emergingthreats.net/2001621; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SPECIFIC_APPS/WEB_PHP_Injection; sid:2001621; rev:31;)

Added 2010-01-15 11:41:20 UTC


alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET WEB_SERVER Exploit Suspected PHP Injection Attack"; flow: to_server,established; content:"GET "; nocase; depth:4; uricontent:".php?"; nocase; pcre:"/(name=(https?|ftps?|php)|cmd=.*(cd|\;|echo|cat|perl|curl|wget|id|uname|t?ftp))/Ui"; reference:cve,2002-0953; classtype: trojan-activity; reference:url,doc.emergingthreats.net/2001621; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SPECIFIC_APPS/WEB_PHP_Injection; sid:2001621; rev:31;)

Added 2010-01-15 11:41:20 UTC


alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET WEB_SPECIFIC_APPS Exploit Suspected PHP Injection Attack"; flow: to_server,established; content:"GET "; nocase; depth:4; uricontent:".php?"; nocase; pcre:"/(name=(https?|ftps?|php)|cmd=.*(cd|\;|echo|cat|perl|curl|wget|id|uname|t?ftp))/Ui"; reference:cve,2002-0953; classtype: trojan-activity; reference:url,doc.emergingthreats.net/2001621; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SPECIFIC_APPS/WEB_PHP_Injection; sid:2001621; rev:30;)

Added 2009-10-06 14:39:22 UTC


alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET WEB_SPECIFIC_APPS Exploit Suspected PHP Injection Attack"; flow: to_server,established; content:"GET "; nocase; depth:4; uricontent:".php?"; nocase; pcre:"/(name=(https?|ftps?|php)|cmd=.*(cd|\;|echo|cat|perl|curl|wget|id|uname|t?ftp))/Ui"; reference:cve,2002-0953; classtype: trojan-activity; reference:url,doc.emergingthreats.net/2001621; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SPECIFIC_APPS/WEB_PHP_Injection; sid:2001621; rev:30;)

Added 2009-10-06 14:39:22 UTC


alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET WEB Exploit Suspected PHP Injection Attack"; flow: to_server,established; content:"GET "; nocase; depth:4; uricontent:".php?"; nocase; pcre:"/(name=(https?|ftps?|php)|cmd=.*(cd|\;|echo|cat|perl|curl|wget|id|uname|t?ftp))/Ui"; reference:cve,2002-0953; classtype: trojan-activity; reference:url,doc.emergingthreats.net/2001621; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SPECIFIC_APPS/WEB_PHP_Injection; sid:2001621; rev:30;)

Added 2009-10-06 14:19:55 UTC


alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET WEB Exploit Suspected PHP Injection Attack"; flow: to_server,established; content:"GET "; nocase; depth:4; uricontent:".php?"; nocase; pcre:"/(name=(https?|ftps?|php)|cmd=.*(cd|\;|echo|cat|perl|curl|wget|id|uname|t?ftp))/Ui"; reference:cve,2002-0953; classtype: trojan-activity; reference:url,doc.emergingthreats.net/2001621; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SPECIFIC_APPS/WEB_PHP_Injection; sid:2001621; rev:30;)

Added 2009-10-06 14:19:55 UTC


alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET WEB Exploit Suspected PHP Injection Attack"; flow: to_server,established; content:"GET "; nocase; depth:4; uricontent:".php?"; nocase; pcre:"/(name=(https?|ftps?|php)|cmd=.*(cd|\;|echo|cat|perl|curl|wget|id|uname|t?ftp))/Ui"; reference:cve,2002-0953; classtype: trojan-activity; reference:url,doc.emergingthreats.net/2001621; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SPECIFIC_APPS/WEB_PHP_Injection; sid:2001621; rev:30;)

Added 2009-10-06 14:16:33 UTC


alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET WEB Exploit Suspected PHP Injection Attack"; flow: to_server,established; content:"GET "; nocase; depth:4; uricontent:".php?"; nocase; pcre:"/(name=(https?|ftps?|php)|cmd=.*(cd|\;|echo|cat|perl|curl|wget|id|uname|t?ftp))/Ui"; reference:cve,2002-0953; classtype: trojan-activity; reference:url,doc.emergingthreats.net/2001621; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SPECIFIC_APPS/WEB_PHP_Injection; sid:2001621; rev:30;)

Added 2009-10-06 14:16:33 UTC


alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET WEB Exploit Suspected PHP Injection Attack"; flow: to_server,established; content:"GET "; nocase; depth:4; uricontent:".php?"; nocase; pcre:"/(name=(https?|ftps?|php)|cmd=.*(cd|\;|echo|cat|perl|curl|wget|id|uname|t?ftp))/Ui"; reference:cve,2002-0953; classtype: trojan-activity; reference:url,doc.emergingthreats.net/2001621; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SQL_INJECTION/WEB_PHP_Injection; sid:2001621; rev:29;)

Added 2009-05-11 20:45:34 UTC


alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET WEB Exploit Suspected PHP Injection Attack"; flow: to_server,established; content:"GET "; nocase; depth:4; uricontent:".php?"; nocase; pcre:"/(name=(https?|ftps?|php)|cmd=.*(cd|\;|echo|cat|perl|curl|wget|id|uname|t?ftp))/Ui"; reference:cve,2002-0953; classtype: trojan-activity; reference:url,doc.emergingthreats.net/2001621; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SQL_INJECTION/WEB_PHP_Injection; sid:2001621; rev:29;)

Added 2009-05-11 20:45:34 UTC


alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET Exploit Suspected PHP Injection Attack"; flow: to_server,established; content:"GET "; nocase; depth:4; uricontent:".php?"; nocase; pcre:"/(name=(https?|ftps?|php)|cmd=.*(cd|\;|echo|cat|perl|curl|wget|id|uname|t?ftp))/Ui"; reference:cve,2002-0953; classtype: trojan-activity; reference:url,doc.emergingthreats.net/2001621; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SQL_INJECTION/WEB_PHP_Injection; sid:2001621; rev:28;)

Added 2009-03-13 20:47:16 UTC


alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET Exploit Suspected PHP Injection Attack"; flow: to_server,established; content:"GET "; nocase; depth:4; uricontent:".php?"; nocase; pcre:"/(name=(https?|ftps?|php)|cmd=.*(cd|\;|echo|cat|perl|curl|wget|id|uname|t?ftp))/Ui"; reference:cve,2002-0953; classtype: trojan-activity; reference:url,doc.emergingthreats.net/2001621; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SQL_INJECTION/WEB_PHP_Injection; sid:2001621; rev:28;)

Added 2009-03-13 20:47:16 UTC


alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET Exploit Suspected PHP Injection Attack"; flow: to_server,established; content:"GET"; nocase; depth:3; uricontent:".php?"; nocase; pcre:"/(name=(https?|ftps?|php)|cmd=.*(cd|\;|echo|cat|perl|curl|wget|id|uname|t?ftp))/Ui"; reference:cve,2002-0953; classtype: trojan-activity; reference:url,doc.emergingthreats.net/2001621; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SQL_INJECTION/WEB_PHP_Injection; sid: 2001621; rev:27;)

Added 2009-02-24 21:30:26 UTC


alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET Exploit Suspected PHP Injection Attack"; flow: to_server,established; content:"GET"; nocase; depth:3; uricontent:".php?"; nocase; pcre:"/(name=(https?|ftps?|php)|cmd=.*(cd|\;|echo|cat|perl|curl|wget|id|uname|t?ftp))/Ui"; reference:cve,2002-0953; classtype: trojan-activity; reference:url,doc.emergingthreats.net/2001621; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SQL_INJECTION/WEB_PHP_Injection; sid: 2001621; rev:27;)

Added 2009-02-24 21:30:26 UTC


alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET Exploit Suspected PHP Injection Attack"; flow: to_server,established; content:"GET"; nocase; depth:3; uricontent:".php?"; nocase; pcre:"/(name=(https?|ftps?|php)|cmd=.*(cd|\;|echo|cat|perl|curl|wget|id|uname|t?ftp))/Ui"; reference:cve,2002-0953; classtype: trojan-activity; sid: 2001621; rev:26;)

Added 2008-02-01 10:46:27 UTC


alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET Exploit Suspected PHP Injection Attack"; flow: to_server,established; content:"GET"; nocase; depth:3; uricontent:".php?"; nocase; pcre:"/(name=(https?|ftps?|php)|cmd=.*(cd|\;|echo|cat|perl|curl|wget|id|uname|t?ftp))/Ui"; reference:cve,2002-0953; classtype: trojan-activity; sid: 2001621; rev:26;)

Added 2008-02-01 10:46:27 UTC


alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg: "BLEEDING-EDGE Exploit Suspected PHP Injection Attack"; flow: to_server,established; content:"GET"; nocase; depth:3; uricontent:".php?"; nocase; pcre:"/(name=(https?|ftps?|php)|cmd=.*(cd|\;|echo|cat|perl|curl|wget|id|uname|t?ftp))/Ui"; reference:cve,2002-0953; classtype: trojan-activity; sid: 2001621; rev:15; )

Added 2007-05-31 13:09:54 UTC


alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg: "BLEEDING-EDGE Exploit Suspected PHP Injection Attack"; flow: to_server,established; content:"GET"; nocase; depth:3; uricontent:".php?"; nocase; pcre:"/(name=(http|ftp)|cmd=.*(cd|\;|echo|cat|perl|curl|wget|id|uname|t?ftp))/Ui"; reference:cve,2002-0953; classtype: trojan-activity; sid: 2001621; rev:14; )



Topic revision: r1 - 2011-10-12 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats