Provided by Aanval (Snort & Syslog Intrusion Detection and Correlation Engine) www.aanval.com
--
GEN:SID | 1:2323 |
Message | WEB-CGI quickstore.cgi access |
Summary | This event is generated when an attempt is made to exploit a known vulnerability in the QuickStore CGI web application running on a server. |
Impact | Information gathering and system integrity compromise. Possible unauthorized administrative access to the server or application. |
Detailed Information | This event is generated when an attempt is made to gain unauthorized access to the QuickStore CGI application running on a web server. This application does not perform stringent checks when validating the input from a user to the script. The error document produced by the application may disclose sensitive information about the installation of the application. |
Affected Systems | QuickStore 2.12 and prior |
Attack Scenarios | An attacker can supply input to the quickstore.cgi script using a single quote character in the "store" parameter. This will cause the script to generate an error and disclose the information described above. For example: http://vulnerable.com/cgi-bin/quickstore.cgi?store=' |
Ease of Attack | Simple. No exploit software required. |
Corrective Action | Ensure the system is using an up to date version of the software and has had all vendor supplied patches applied. |
Additional References | |
Rule References | bugtraq: 9282 nessus: 11975 |
--
DID:699471
--
http://www.aanval.com/