Sophie

Sophie

distrib > Mandriva > 2006.0 > x86_64 > by-pkgid > 56c5837d9d111437878acba01e4df73e > files > 1225

snort-2.3.3-2.3.20060mdk.x86_64.rpm

Rule:

--
Sid:
2060

--
Summary:
This event is generated when an attempt is made to exploit a known 
vulnerability in DB4Web.

--
Impact:
Information disclosure

--
Detailed Information:
DB4Web is an application server used to access various sources of data 
via a web interface.

DB4Web does not handle the characters ":" and "\" correctly when they 
are URL encoded. An attacker can use this flaw to gain access to 
sensitive system information.

Also the application does not correctly handle the use of extra "/" in a
URI.

It is also possible for the attacker to open arbitrary TCP connections 
using DB4Web and may be able to use it for portscanning other hosts.

--
Affected Systems:

--
Attack Scenarios:
The attacker merely needs to make a normal HTTP request with the 
characters ":" or "\" encoded (%3A%5C) followed by the commands the 
attacker wishes to run.

The attacker can also make a request like 
http://www.foo.com/cgi-bin/db4web_c/dbdirname//etc/passwd to view the 
contents of the password file.

--
Ease of Attack:
Simple

--
False Positives:
None Known

--
False Negatives:
None Known

--
Corrective Action:
Disable access to DB4Web from external sources.

Apply the appropriate vendor patches.

Run the webserver in a chroot environment to mitigate the risks of 
disclosure.

--
Contributors:
Sourcefire Research Team
Brian Caswell <bmc@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>

--
Additional References:

DB4Web
http://www.db4web.de/DB4Web/home/DB4Web/hotfix_e.html

--