alert http any any -> [$HOME_NET,$HTTP_SERVERS] any (msg:"ET EXPLOIT Possible rConfig 3.9.2 Remote Code Execution PoC? M1 (CVE-2019-16662)"; flow:established,to_server; content:"/install/lib/ajaxHandlers/ajaxServerSettingsChk.php?rootUname=%3B"; http_raw_uri; nocase; content:"/ajaxServerSettingsChk.php?rootUname="; http_uri; fast_pattern; reference:url,packetstormsecurity.com/files/154999/rConfig-3.9.2-Remote-Code-Execution.html; reference:cve,2019-16662; classtype:attempted-admin; sid:2028933; rev:3; metadata:affected_product Web_Server_Applications, attack_target Server, created_at 2019_11_04, deployment Perimeter, former_category EXPLOIT, signature_severity Major, updated_at 2021_07_26;)

Added 2021-07-26 18:47:18 UTC


alert http any any -> any any (msg:"ET EXPLOIT Possible rConfig 3.9.2 Remote Code Execution PoC? (CVE-2019-16662)"; flow:established,to_server; content:"GET"; http_method; content:"/install/lib/ajaxHandlers/ajaxServerSettingsChk.php?rootUname="; http_uri; fast_pattern; content:"exec"; distance:0; http_uri; reference:url,packetstormsecurity.com/files/154999/rConfig-3.9.2-Remote-Code-Execution.html; reference:cve,2019-16662; classtype:attempted-admin; sid:2028933; rev:2; metadata:affected_product Web_Server_Applications, attack_target Server, created_at 2019_11_04, deployment Perimeter, former_category EXPLOIT, signature_severity Major, updated_at 2020_10_21;)

Added 2020-10-21 17:52:01 UTC


alert http any any -> any any (msg:"ET EXPLOIT Possible rConfig 3.9.2 Remote Code Execution PoC? (CVE-2019-16662)"; flow:established,to_server; content:"GET"; http_method; content:"/install/lib/ajaxHandlers/ajaxServerSettingsChk.php?rootUname="; http_uri; fast_pattern; content:"exec"; distance:0; http_uri; reference:url,packetstormsecurity.com/files/154999/rConfig-3.9.2-Remote-Code-Execution.html; reference:cve,2019-16662; classtype:attempted-admin; sid:2028933; rev:2; metadata:affected_product Web_Server_Applications, attack_target Server, created_at 2019_11_04, deployment Perimeter, former_category EXPLOIT, signature_severity Major, updated_at 2019_11_04;)

Added 2020-08-05 19:17:08 UTC


alert http any any -> any any (msg:"ET EXPLOIT Possible rConfig 3.9.2 Remote Code Execution PoC? (CVE-2019-16662)"; flow:established,to_server; content:"GET"; http_method; content:"/install/lib/ajaxHandlers/ajaxServerSettingsChk.php?rootUname="; http_uri; fast_pattern; content:"exec"; distance:0; http_uri; metadata: former_category EXPLOIT; reference:url,packetstormsecurity.com/files/154999/rConfig-3.9.2-Remote-Code-Execution.html; reference:cve,2019-16662; classtype:attempted-admin; sid:2028933; rev:2; metadata:affected_product Web_Server_Applications, attack_target Server, deployment Perimeter, signature_severity Major, created_at 2019_11_04, updated_at 2019_11_04;)

Added 2019-11-04 17:56:09 UTC


Topic revision: r1 - 2021-07-26 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats