Rule: -- Sid: 2297 -- Summary: This event is generated when an attempt is made to exploit a known vulnerability in the PHP web application Proxy2.de Advanced Poll 2.0.2 running on a server. -- Impact: Information gathering and system integrity compromise. Possible unauthorized administrative access to the server or application. Possible execution of arbitrary code of the attackers choosing in some cases. -- Detailed Information: This event indicates that an attempt may have been made to exploit a known vulnerability in the PHP application Proxy2.de Advanced Poll 2.0.2. This application does not perform stringent checks when handling user input, this may lead to the attacker being able to execute PHP code, include php files and possibly retrieve sensitive files from the server running the application. -- Affected Systems: All systems running Proxy2.de Advanced Poll 2.0.2 -- Attack Scenarios: An attacker can access an authentication mechanism and supply his/her own credentials to gain access. Alternatively the attacker can exploit weaknesses to gain access as the administrator by supplying input of their choosing to the underlying PHP script. -- Ease of Attack: Simple. No exploit code is required. -- False Positives: None known. -- False Negatives: None known. -- Corrective Action: Ensure the system is using an up to date version of the software and has had all vendor supplied patches applied. -- Contributors: Sourcefire Research Team Brian Caswell <bmc@sourcefire.com> Nigel Houghton <nigel.houghton@sourcefire.com> -- Additional References: --