[Snort-sigs] CVE-2018-1143, CVE-2018-1144, CVE-2018-1146

Y M snort at outlook.com
Fri Apr 27 10:47:48 EDT 2018


Hi,

The below signatures attempt at detecting exploits against the listed CVEs. No pcaps available.

# Title: Belkin N750 F9K1103 v1 Multiple Vulnerabilities
# Reference: www.tenable.com/security/research/tra-2018-0<http://www.tenable.com/security/research/tra-2018-08>9
# CVEs: CVE-2018-1143, CVE-2018-1144, CVE-2018-1146

alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Belkin twonky blind command injection attempt"; flow:to_server,established; content:"/twonky_cmd.cgi?"; fast_pattern:only; http_uri; content:"?path="; http_uri; content:"/%60"; http_uri; metadata:ruleset community, service http; reference:cve,2018-1143; reference:url,www.tenable.com/security/research/tra-2018-08; classtype:attempted-admin; sid:8000009; rev:1;)
alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Belkin proxy.cgi command injection attempt"; flow:to_server,established; content:"/proxy.cgi?"; fast_pattern:only; http_uri; content:"url=|60|"; http_uri; metadata:ruleset community, service http; reference:cve,2018-1144; reference:url,www.tenable.com/security/research/tra-2018-08; classtype:attempted-admin; sid:8000010; rev:1;)
alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Belkin unauthenticated telnet enablement attempt"; flow:to_server,established; content:"/set.cgi?"; fast_pattern:only; http_uri; content:"n=TELENT_EN"; http_uri; content:"&v=1"; distance:0; http_uri; metadata:ruleset community, service http; reference:cve,2018-1146; reference:url,www.tenable.com/security/research/tra-2018-08; classtype:attempted-admin; sid:8000011; rev:1;)

Thanks.
YM
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.snort.org/pipermail/snort-sigs/attachments/20180427/40ce8a9f/attachment-0001.html>


More information about the Snort-sigs mailing list