Provided by Aanval (Snort & Syslog Intrusion Detection and Correlation Engine) www.aanval.com
--
GEN:SID | 1:1364 |
Message | WEB-ATTACKS lsof command attempt |
Summary | Attempted lsof command access via web |
Impact | Attempt to gain information on system processes on webserver |
Detailed Information | This is an attempt to gain intelligence on the processes being run on a webserver. The lsof command lists information about files that are open by the running processes. An open file may be a regular file, a directory, a block special file, a character special file, an executing text reference, a library, a stream or a network file (Internet socket, NFS file or Unix domain socket). The attacker could possibly gain information needed for other attacks on the system. |
Affected Systems | |
Attack Scenarios | The attacker can make a standard HTTP request that contains 'lsof' in the URI. |
Ease of Attack | Simple HTTP request. |
Corrective Action | Webservers should not be allowed to view or execute files and binaries outside of it's designated web root or cgi-bin. This command may also be requested on a command line should the attacker gain access to the machine. |
Additional References | sid: 1329 man lsof |
--
DID:754093
--
http://www.aanval.com/