Provided by Aanval (Snort & Syslog Intrusion Detection and Correlation Engine) www.aanval.com
--
GEN:SID | 1:1485 |
Message | WEB-IIS mkilog.exe access |
Summary | This event is generated when an attempt is made to access the file mkilog.exe. |
Impact | Remote access. This attack may permit the execution of arbitrary commands on the vulnerable server. |
Detailed Information | This mkilog.exe is a Common Gateway Interface (CGI) script that can be used to view and modify SQL database contents. It posts data to another module, ctss,idc, that creates a table based on the parameters passed to it. If an attacker passes parameters such as a valid username and password to create a table, it may be possible to alter the table to execute commands on the vulnerable server. |
Affected Systems | Attack Scenarios: An attacker can attempt to exploit this vulnerability to execute remote commands on the vulnerable server. |
Attack Scenarios | |
Ease of Attack | Easy. |
Corrective Action | Delete file /scripts/tools/ctss.idc |
Additional References | Nessus http://cgi.nessus.org/plugins/dump.php3?id=10359 |
Rule References | nessus: 10359 url: www.osvdb.org/274 |
--
DID:506151
--
http://www.aanval.com/