alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET WEB_SPECIFIC_APPS WHCMS smarty Parameter Remote File inclusion Attempt 2"; flow:established,to_server; content:"/includes/smarty/internals/core.process_compiled_include.php?"; nocase; http_uri; fast_pattern:26,20; content:"smarty="; nocase; http_uri; pcre:"/smarty=\s*(ftps?|https?|php)\:\//Ui"; reference:url,packetstormsecurity.org/files/113912/WHCMS-5.0.3-Remote-File-Inclusion.html; classtype:web-application-attack; sid:2014946; rev:3;)

Added 2012-06-22 19:10:35 UTC


Topic revision: r1 - 2012-06-22 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats