Provided by Aanval (Snort & Syslog Intrusion Detection and Correlation Engine) www.aanval.com
--
GEN:SID | 1:2304 |
Message | WEB-PHP files.inc.php access |
Summary | This event is generated when an attempt is made to exploit a known vulnerability in a PHP web application running on a server. |
Impact | Information gathering. |
Detailed Information | This event is generated when an attempt is made to access the file files.inc.php on a web server running a PHP application. This may lead to information disclosure, further attacks against the system may be possible with the information gained, |
Affected Systems | All systems running PHP applications |
Attack Scenarios | An attacker can access an authentication mechanism and supply his/her own credentials to gain access. Alternatively the attacker can exploit weaknesses to gain access as the administrator by supplying input of their choosing to the underlying PHP script. |
Ease of Attack | Simple. No exploit is required. |
Corrective Action | Ensure the system is using an up to date version of the software and has had all vendor supplied patches applied. |
Additional References | |
Rule References | bugtraq: 8910 |
--
DID:245814
--
http://www.aanval.com/