Provided by Aanval (Snort & Syslog Intrusion Detection and Correlation Engine) www.aanval.com
--
| GEN:SID | 1:2323 |
| Message | WEB-CGI quickstore.cgi access |
| Summary | This event is generated when an attempt is made to exploit a known vulnerability in the QuickStore CGI web application running on a server. |
| Impact | Information gathering and system integrity compromise. Possible unauthorized administrative access to the server or application. |
| Detailed Information | This event is generated when an attempt is made to gain unauthorized access to the QuickStore CGI application running on a web server. This application does not perform stringent checks when validating the input from a user to the script. The error document produced by the application may disclose sensitive information about the installation of the application. |
| Affected Systems | QuickStore 2.12 and prior |
| Attack Scenarios | An attacker can supply input to the quickstore.cgi script using a single quote character in the "store" parameter. This will cause the script to generate an error and disclose the information described above. For example: http://vulnerable.com/cgi-bin/quickstore.cgi?store=' |
| Ease of Attack | Simple. No exploit software required. |
| Corrective Action | Ensure the system is using an up to date version of the software and has had all vendor supplied patches applied. |
| Additional References | |
| Rule References | bugtraq: 9282 nessus: 11975 |
--
DID:699471
--
http://www.aanval.com/