[Snort-sigs] CVE-2018-10173

Phillip Lee phillile at sourcefire.com
Fri Apr 27 11:15:41 EDT 2018


Yaser,

Thanks for your submission. We will review the rules and get back to you when they're finished. 

Regards,
Phil Lee
Cisco Talos

> On Apr 27, 2018, at 10:50 AM, Y M via Snort-sigs <snort-sigs at lists.snort.org> wrote:
> 
> Hi,
> 
> Sorry for the noise. Almost done.
> 
> # Title: Digital Guardian Managment Console - Arbitrary File Upload Leading To Remote Code Execution (RCE) Vulnerability
> # Reference: https://packetstormsecurity.com/files/147244/Digital-Guardian-Management-Console-7.1.2.0015-Shell-Upload.html <https://packetstormsecurity.com/files/147244/Digital-Guardian-Management-Console-7.1.2.0015-Shell-Upload.html>
> # CVEs: CVE-2018-10173
> 
> alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Digital Gaurdian arbitrary file upload attempt"; flow:to_server,established; content:"POST"; http_method; content:"/DigitalGuardian/Management/ServerSettingsPDFTemplates.aspx"; fast_pattern:only; http_uri; content:"Content-Disposition|3B| form-data|3B| name=|22|"; http_client_body; content:"|22 3B| filename=|22|"; distance:0;  http_client_body; metadata:ruleset community, service http; reference:cve,2018-10173; reference:url,packetstormsecurity.com/files/147244/Digital-Guardian-Management-Console-7.1.2.0015-Shell-Upload.html <http://packetstormsecurity.com/files/147244/Digital-Guardian-Management-Console-7.1.2.0015-Shell-Upload.html>; classtype:attempted-admin; sid:8000012; rev:1;)
> alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Digital Gaurdian arbitrary file upload attempt"; flow:to_server,established; content:"POST"; http_method; content:"/DigitalGuardian/Policies/PromptSkin.aspx?"; fast_pattern:only; http_uri; content:"ConfigType=2"; http_uri; content:"&skinId="; http_uri; content:"Content-Disposition|3B| form-data|3B| name=|22|"; http_client_body; content:"|22 3B| filename=|22|"; distance:0; http_client_body; metadata:ruleset community, service http; reference:cve,2018-10173; reference:url,packetstormsecurity.com/files/147244/Digital-Guardian-Management-Console-7.1.2.0015-Shell-Upload.html <http://packetstormsecurity.com/files/147244/Digital-Guardian-Management-Console-7.1.2.0015-Shell-Upload.html>; classtype:attempted-admin; sid:8000013; rev:1;)
> 
> Thank.
> YM
> _______________________________________________
> Snort-sigs mailing list
> Snort-sigs at lists.snort.org <mailto:Snort-sigs at lists.snort.org>
> https://lists.snort.org/mailman/listinfo/snort-sigs <https://lists.snort.org/mailman/listinfo/snort-sigs>
> 
> Please visit http://blog.snort.org <http://blog.snort.org/> for the latest news about Snort!
> 
> Please follow these rules: https://snort.org/faq/what-is-the-mailing-list-etiquette <https://snort.org/faq/what-is-the-mailing-list-etiquette>
> 
> Visit the Snort.org <http://snort.org/> to subscribe to the official Snort ruleset, make sure to stay up to date to catch the most <a href=" https://snort.org/downloads/#rule-downloads <https://snort.org/downloads/#rule-downloads>">emerging threats</a>!

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.snort.org/pipermail/snort-sigs/attachments/20180427/33c07019/attachment-0001.html>


More information about the Snort-sigs mailing list