alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET WEB Philips VOIP841 Web Server Directory Traversal"; flow:to_server,established; content:"GET "; depth:4; pcre:"/(\.\.\/){1,}/"; uricontent:"/etc/passwd";classtype:web-application-attack; reference:url,www.milw0rm.com/exploits/5113; reference:bugtraq,27790; reference:url,doc.emergingthreats.net/2007871; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB/WEB_Philips_VOIP; sid:2007871; rev:2;)
Added 2009-02-16 21:46:09 UTC
alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET WEB Philips VOIP841 Web Server Directory Traversal"; flow:to_server,established; content:"GET "; depth:4; pcre:"/(\.\.\/){1,}/"; uricontent:"/etc/passwd";classtype:web-application-attack; reference:url,www.milw0rm.com/exploits/5113; reference:bugtraq,27790; reference:url,doc.emergingthreats.net/2007871; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB/WEB_Philips_VOIP; sid:2007871; rev:2;)
Added 2009-02-16 21:46:09 UTC
alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET WEB Philips VOIP841 Web Server Directory Traversal"; flow:to_server,established; content:"GET "; depth:4; pcre:"/(\.\.\/){1,}/"; uricontent:"/etc/passwd";classtype:web-application-attack; reference:url,www.milw0rm.com/exploits/5113; reference:bugtraq,27790; reference:url,doc.emergingthreats.net/2007871; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB/WEB_Philips_VOIP; sid:2007871; rev:2;)
Added 2009-02-16 21:45:24 UTC
alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET WEB Philips VOIP841 Web Server Directory Traversal"; flow:to_server,established; content:"GET "; depth:4; pcre:"/(\.\.\/){1,}/"; uricontent:"/etc/passwd";classtype:web-application-attack; reference:url,www.milw0rm.com/exploits/5113; reference:bugtraq,27790; reference:url,doc.emergingthreats.net/2007871; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB/WEB_Philips_VOIP; sid:2007871; rev:2;)
Added 2009-02-16 21:45:24 UTC
alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET WEB Philips VOIP841 Web Server Directory Traversal"; flow:to_server,established; content:"GET "; depth:4; pcre:"/(\.\.\/){1,}/"; uricontent:"/etc/passwd";classtype:web-application-attack; reference:url,www.milw0rm.com/exploits/5113; reference:bugtraq,27790; sid:2007871; rev:1;)
Added 2008-02-22 10:03:25 UTC