[Snort-sigs] CVE-2018-10173

Y M snort at outlook.com
Fri Apr 27 10:50:58 EDT 2018


Hi,

Sorry for the noise. Almost done.

# Title: Digital Guardian Managment Console - Arbitrary File Upload Leading To Remote Code Execution (RCE) Vulnerability
# Reference: https://packetstormsecurity.com/files/147244/Digital-Guardian-Management-Console-7.1.2.0015-Shell-Upload.html
# CVEs: CVE-2018-10173

alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Digital Gaurdian arbitrary file upload attempt"; flow:to_server,established; content:"POST"; http_method; content:"/DigitalGuardian/Management/ServerSettingsPDFTemplates.aspx"; fast_pattern:only; http_uri; content:"Content-Disposition|3B| form-data|3B| name=|22|"; http_client_body; content:"|22 3B| filename=|22|"; distance:0;  http_client_body; metadata:ruleset community, service http; reference:cve,2018-10173; reference:url,packetstormsecurity.com/files/147244/Digital-Guardian-Management-Console-7.1.2.0015-Shell-Upload.html; classtype:attempted-admin; sid:8000012; rev:1;)
alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Digital Gaurdian arbitrary file upload attempt"; flow:to_server,established; content:"POST"; http_method; content:"/DigitalGuardian/Policies/PromptSkin.aspx?"; fast_pattern:only; http_uri; content:"ConfigType=2"; http_uri; content:"&skinId="; http_uri; content:"Content-Disposition|3B| form-data|3B| name=|22|"; http_client_body; content:"|22 3B| filename=|22|"; distance:0; http_client_body; metadata:ruleset community, service http; reference:cve,2018-10173; reference:url,packetstormsecurity.com/files/147244/Digital-Guardian-Management-Console-7.1.2.0015-Shell-Upload.html; classtype:attempted-admin; sid:8000013; rev:1;)

Thank.
YM
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.snort.org/pipermail/snort-sigs/attachments/20180427/62a406ad/attachment.html>


More information about the Snort-sigs mailing list