alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET WEB_SPECIFIC_APPS IBM ENOVIA SmarTeam? v5 LoginPage?.aspx Cross Site Scripting Attempt"; flow:established,to_server; content:"/WebEditor/Authentication/LoginPage.aspx?"; nocase; http_uri; content:"ReturnUrl="; nocase; http_uri; content:"errMsg="; nocase; http_uri; pcre:"/(script|onmouse[a-z]+|onkey[a-z]+|onload|onunload|ondragdrop|onblur|onfocus|onclick|ondblclick|onsubmit|onreset|onselect|onchange|style\x3D)/Ui"; reference:url,packetstorm.foofus.com/1003-exploits/ibmenovia-xss.txt; reference:url,doc.emergingthreats.net/2010980; classtype:web-application-attack; sid:2010980; rev:3;)

Added 2011-10-12 19:31:03 UTC


alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET WEB_SPECIFIC_APPS IBM ENOVIA SmarTeam? v5 LoginPage?.aspx Cross Site Scripting Attempt"; flow:established,to_server; content:"/WebEditor/Authentication/LoginPage.aspx?"; nocase; http_uri; content:"ReturnUrl="; nocase; http_uri; content:"errMsg="; nocase; http_uri; pcre:"/(script|onmouse[a-z]+|onkey[a-z]+|onload|onunload|ondragdrop|onblur|onfocus|onclick|ondblclick|onsubmit|onreset|onselect|onchange|style\x3D)/Ui"; classtype:web-application-attack; reference:url,packetstorm.foofus.com/1003-exploits/ibmenovia-xss.txt; reference:url,doc.emergingthreats.net/2010980; sid:2010980; rev:3;)

Added 2011-09-14 22:44:11 UTC


alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET WEB_SPECIFIC_APPS IBM ENOVIA SmarTeam? v5 LoginPage?.aspx Cross Site Scripting Attempt"; flow:established,to_server; content:"/WebEditor/Authentication/LoginPage.aspx?"; nocase; http_uri; content:"ReturnUrl="; nocase; http_uri; content:"errMsg="; nocase; http_uri; pcre:"/(script|onmouse[a-z]+|onkey[a-z]+|onload|onunload|ondragdrop|onblur|onfocus|onclick|ondblclick|onsubmit|onreset|onselect|onchange|style\x3D)/Ui"; classtype:web-application-attack; reference:url,packetstorm.foofus.com/1003-exploits/ibmenovia-xss.txt; reference:url,doc.emergingthreats.net/2010980; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SPECIFIC_APPS/WEB_IBM; sid:2010980; rev:3;)

Added 2011-02-04 17:30:41 UTC


alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET WEB_SPECIFIC_APPS IBM ENOVIA SmarTeam? v5 LoginPage?.aspx Cross Site Scripting Attempt"; flow:established,to_server; uricontent:"/WebEditor/Authentication/LoginPage.aspx?"; nocase; uricontent:"ReturnUrl="; nocase; uricontent:"errMsg="; nocase;pcre:"/(script|onmouse[a-z]+|onkey[a-z]+|onload|onunload|ondragdrop|onblur|onfocus|onclick|ondblclick|onsubmit|onreset|onselect|onchange|style\x3D)/Ui"; classtype:web-application-attack; reference:url,packetstorm.foofus.com/1003-exploits/ibmenovia-xss.txt; reference:url,doc.emergingthreats.net/2010980; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SPECIFIC_APPS/WEB_IBM; sid:2010980; rev:2;)

Added 2010-04-03 09:58:08 UTC


alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET WEB_SPECIFIC_APPS IBM ENOVIA SmarTeam? v5 LoginPage?.aspx Cross Site Scripting Attempt"; flow:established,to_server; uricontent:"/WebEditor/Authentication/LoginPage.aspx?"; nocase; uricontent:"ReturnUrl="; nocase; uricontent:"errMsg="; nocase;pcre:"/(script|onmouse[a-z]+|onkey[a-z]+|onload|onunload|ondragdrop|onblur|onfocus|onclick|ondblclick|onsubmit|onreset|onselect|onchange|style\x3D)/Ui"; classtype:web-application-attack; reference:url,packetstorm.foofus.com/1003-exploits/ibmenovia-xss.txt; reference:url,doc.emergingthreats.net/2010980; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SPECIFIC_APPS/WEB_IBM; sid:2010980; rev:2;)

Added 2010-04-03 09:58:08 UTC


alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET WEB_SPECIFIC_APPS IBM ENOVIA SmarTeam? v5 LoginPage?.aspx Cross Site Scripting Attempt"; flow:established,to_server; uricontent:"/WebEditor/Authentication/LoginPage.aspx?"; nocase; uricontent:"ReturnUrl="; nocase; uricontent:"errMsg="; nocase;pcre:"/(script|onmouse[a-z]+|onkey[a-z]+|onload|onunload|ondragdrop|onblur|onfocus|onclick|ondblclick|onsubmit|onreset|onselect|onchange|style\x3D)/Ui"; classtype:web-application-attack; reference:url,packetstorm.foofus.com/1003-exploits/ibmenovia-xss.txt; sid:2010980; rev:1;)

Added 2010-04-03 09:46:30 UTC


Topic revision: r1 - 2011-10-12 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats