Provided by Aanval (Snort & Syslog Intrusion Detection and Correlation Engine) www.aanval.com
--
| GEN:SID | 1:1368 |
| Message | WEB-ATTACKS /bin/ls| command attempt |
| Summary | Attempted ps command access via web |
| Impact | Attempt to gain information on system files and filestructure |
| Detailed Information | This is an attempt to gain intelligence on the filesystem on a webserver. The ls command lists the files and filesystem layout on a UNIX or Linux based system. The attacker could possibly gain information needed for other attacks on the host. |
| Affected Systems | |
| Attack Scenarios | The attacker can make a standard HTTP request that contains '/bin/ls'in the URI. |
| Ease of Attack | Simple HTTP request. |
| Corrective Action | Webservers should not be allowed to view or execute files and binaries outside of it's designated web root or cgi-bin. This command may also be requested on a command line should the attacker gain access to the machine. |
| Additional References | sid: 1369 |
--
DID:548546
--
http://www.aanval.com/