[Snort-sigs] CVE-2018-10173

Phillip Lee phillile at sourcefire.com
Thu May 17 12:20:14 EDT 2018


Dear Yaser,
This rule has been reviewed and added to the community ruleset (sid:46665 and sid:46666). A few edits were made, most specifically adding a PCRE to check for specific vulnerable parameters in the multipart post request.

Thank you for your contribution. 

Regards,
Phil Lee
Cisco Talos


> On Apr 27, 2018, at 11:02 AM, James Lay <jlay at slave-tothe-box.net> wrote:
> 
> Noise indeed 😛  Fine work my friend :)
> 
> James
> 
> On Fri, 2018-04-27 at 14:50 +0000, Y M via Snort-sigs wrote:
>> Hi,
>> 
>> Sorry for the noise. Almost done.
>> 
>> # Title: Digital Guardian Managment Console - Arbitrary File Upload Leading To Remote Code Execution (RCE) Vulnerability
>> # Reference: https://packetstormsecurity.com/files/147244/Digital-Guardian-Management-Console-7.1.2.0015-Shell-Upload.html
>> # CVEs: CVE-2018-10173
>> 
>> alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Digital Gaurdian arbitrary file upload attempt"; flow:to_server,established; content:"POST"; http_method; content:"/DigitalGuardian/Management/ServerSettingsPDFTemplates.aspx"; fast_pattern:only; http_uri; content:"Content-Disposition|3B| form-data|3B| name=|22|"; http_client_body; content:"|22 3B| filename=|22|"; distance:0;  http_client_body; metadata:ruleset community, service http; reference:cve,2018-10173; reference:url,packetstormsecurity.com/files/147244/Digital-Guardian-Management-Console-7.1.2.0015-Shell-Upload.html; classtype:attempted-admin; sid:8000012; rev:1;)
>> alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Digital Gaurdian arbitrary file upload attempt"; flow:to_server,established; content:"POST"; http_method; content:"/DigitalGuardian/Policies/PromptSkin.aspx?"; fast_pattern:only; http_uri; content:"ConfigType=2"; http_uri; content:"&skinId="; http_uri; content:"Content-Disposition|3B| form-data|3B| name=|22|"; http_client_body; content:"|22 3B| filename=|22|"; distance:0; http_client_body; metadata:ruleset community, service http; reference:cve,2018-10173; reference:url,packetstormsecurity.com/files/147244/Digital-Guardian-Management-Console-7.1.2.0015-Shell-Upload.html; classtype:attempted-admin; sid:8000013; rev:1;)
>> 
>> Thank.
>> YM
>> _______________________________________________
>> Snort-sigs mailing list
>> Snort-sigs at lists.snort.org <mailto:Snort-sigs at lists.snort.org>
>> https://lists.snort.org/mailman/listinfo/snort-sigs <https://lists.snort.org/mailman/listinfo/snort-sigs>
>> 
>> Please visit http://blog.snort.org <http://blog.snort.org/> for the latest news about Snort!
>> 
>> Please follow these rules: https://snort.org/faq/what-is-the-mailing-list-etiquette <https://snort.org/faq/what-is-the-mailing-list-etiquette>
>> 
>> Visit the Snort.org to subscribe to the official Snort ruleset, make sure to stay up to date to catch the most <a href=" https://snort.org/downloads/#rule-downloads <https://snort.org/downloads/#rule-downloads>">emerging threats</a>!
> _______________________________________________
> Snort-sigs mailing list
> Snort-sigs at lists.snort.org <mailto:Snort-sigs at lists.snort.org>
> https://lists.snort.org/mailman/listinfo/snort-sigs <https://lists.snort.org/mailman/listinfo/snort-sigs>
> 
> Please visit http://blog.snort.org <http://blog.snort.org/> for the latest news about Snort!
> 
> Please follow these rules: https://snort.org/faq/what-is-the-mailing-list-etiquette <https://snort.org/faq/what-is-the-mailing-list-etiquette>
> 
> Visit the Snort.org <http://snort.org/> to subscribe to the official Snort ruleset, make sure to stay up to date to catch the most <a href=" https://snort.org/downloads/#rule-downloads <https://snort.org/downloads/#rule-downloads>">emerging threats</a>!

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.snort.org/pipermail/snort-sigs/attachments/20180517/ab029bab/attachment-0001.html>


More information about the Snort-sigs mailing list