#!/bin/bash #Copyright 2003 William Stearns #Released under the GPL. #ZZZZ Check Me and MyVersion Me='snort-web-cgi' MyVersion='20031125' #DefaultActions='' [ -r /etc/firebricks/firebricks.conf ] && . /etc/firebricks/firebricks.conf [ -r /etc/firebricks/$Me.conf ] && . /etc/firebricks/$Me.conf [ -r ${FBLibDir:-'/usr/lib/firebricks/'}/firebrickslib ] && . ${FBLibDir:-'/usr/lib/firebricks/'}/firebrickslib if [ -z "$FBLibVer" ]; then echo 'It looks like firebrickslib was not loaded, why? Exiting' >&2 exit 1 fi for OneTask in $Tasks ; do case "$OneTask" in link) $IptablesBin -N $Me >/dev/null 2>&1 #ZZZZ try to restrict the following three to only send down what the chain needs to inspect. $IptablesBin $AppIn INPUT -i \! lo -j $Me $IptablesBin $AppIn FORWARD -j $Me $IptablesBin $AppIn OUTPUT -j $Me ;; unlink) #ZZZZ Make the same changes as above (such as "-p tcp"), but if you cut and paste, note "$AppIn" is now "-D" $IptablesBin -D INPUT -i \! lo -j $Me $IptablesBin -D FORWARD -j $Me $IptablesBin -D OUTPUT -j $Me $IptablesBin -X $Me >/dev/null 2>&1 ;; create) echo "Starting $Me" >&2 FlushOrNewChain $Me LogAs="SID803" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/hsx.cgi"' --string '"../../"' --string '"%00"' $Tail # '"WEB-CGI HyperSeek hsx.cgi directory traversal attempt"' bugtraq,2314 cve,CAN-2001-0253 classtype:web-application-attack sid:803 LogAs="SID1607" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/hsx.cgi"' $Tail # '"WEB-CGI HyperSeek hsx.cgi access"' bugtraq,2314 cve,CAN-2001-0253 classtype:web-application-activity sid:1607 LogAs="SID804" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/s.cgi"' --string '"tmpl="' $Tail # '"WEB-CGI SWSoft ASPSeek Overflow attempt"' nocase-ignored cve,CAN-2001-0476 bugtraq,2492 classtype:web-application-attack sid:804 LogAs="SID805" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/wsisa.dll/WService="' --string '"WSMadmin"' $Tail # '"WEB-CGI webspeed access"' nocase-ignored nocase-ignored arachnids,467 cve,CVE-2000-0127 nessus,10304 classtype:attempted-user sid:805 LogAs="SID806" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/YaBB"' --string '"../"' $Tail # '"WEB-CGI yabb directory traversal attempt"' nocase-ignored cve,CVE-2000-0853 arachnids,462 bugtraq,1668 classtype:attempted-recon sid:806 LogAs="SID1637" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/YaBB"' $Tail # '"WEB-CGI yabb access"' nocase-ignored cve,CVE-2000-0853 arachnids,462 bugtraq,1668 classtype:attempted-recon sid:1637 LogAs="SID807" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/wwwboard/passwd.txt"' $Tail # '"WEB-CGI /wwwboard/passwd.txt access"' nocase-ignored arachnids,463 cve,CVE-1999-0953 nessus,10321 bugtraq,649 classtype:attempted-recon sid:807 LogAs="SID808" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/webdriver"' $Tail # '"WEB-CGI webdriver access"' nocase-ignored arachnids,473 bugtraq,2166 nessus,10592 classtype:attempted-recon sid:808 LogAs="SID809" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/whois_raw.cgi?"' --string '""' $Tail # '"WEB-CGI whois_raw.cgi arbitrary command execution attempt"' cve,CAN-1999-1063 arachnids,466 nessus,10306 classtype:web-application-attack sid:809 LogAs="SID810" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/whois_raw.cgi"' $Tail # '"WEB-CGI whois_raw.cgi access"' cve,CAN-1999-1063 arachnids,466 nessus,10306 classtype:attempted-recon sid:810 LogAs="SID811" $Ipt -A $Me -p tcp --dport 80 -m string --string '" /HTTP/1."' $Tail # '"WEB-CGI websitepro path access"' nocase-ignored cve,CAN-2000-0066 arachnids,468 classtype:attempted-recon sid:811 LogAs="SID812" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/webplus?about"' $Tail # '"WEB-CGI webplus version access"' nocase-ignored cve,CVE-2000-0282 arachnids,470 classtype:attempted-recon sid:812 LogAs="SID813" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/webplus?script"' --string '"../"' $Tail # '"WEB-CGI webplus directory traversal"' nocase-ignored cve,CVE-2000-0282 arachnids,471 classtype:web-application-attack sid:813 LogAs="SID815" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/websendmail"' $Tail # '"WEB-CGI websendmail access"' nocase-ignored cve,CVE-1999-0196 arachnids,469 bugtraq,2077 nessus,10301 classtype:attempted-recon sid:815 LogAs="SID1571" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/dcforum.cgi"' --string '"forum=../.."' $Tail # '"WEB-CGI dcforum.cgi directory traversal attempt"' cve,CAN-2001-0436 classtype:web-application-attack sid:1571 LogAs="SID818" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/dcforum.cgi"' $Tail # '"WEB-CGI dcforum.cgi access"' bugtraq,2728 classtype:attempted-recon sid:818 LogAs="SID817" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/dcboard.cgi"' --string '"command=register"' --string '"%7cadmin"' $Tail # '"WEB-CGI dcboard.cgi invalid user addition attempt"' bugtraq,2728 classtype:web-application-attack sid:817 LogAs="SID1410" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/dcboard.cgi"' $Tail # '"WEB-CGI dcboard.cgi access"' bugtraq,2728 classtype:attempted-recon sid:1410 LogAs="SID819" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/mmstdod.cgi"' $Tail # '"WEB-CGI mmstdod.cgi access"' nocase-ignored cve,CVE-2001-0021 classtype:attempted-recon sid:819 LogAs="SID820" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/apexec.pl"' --string '"template=../"' $Tail # '"WEB-CGI anaconda directory transversal attempt"' nocase-ignored cve,CVE-2000-0975 bugtraq,2388 classtype:web-application-attack sid:820 LogAs="SID821" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/imagemap.exe?"' $Tail # '"WEB-CGI imagemap.exe overflow attempt"' nocase-ignored arachnids,412 cve,CVE-1999-0951 classtype:web-application-attack sid:821 LogAs="SID1700" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/imagemap.exe"' $Tail # '"WEB-CGI imagemap.exe access"' nocase-ignored cve,CVE-1999-0951 arachnids,412 classtype:web-application-activity sid:1700 LogAs="SID823" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/cvsweb.cgi"' $Tail # '"WEB-CGI cvsweb.cgi access"' nocase-ignored cve,CVE-2000-0670 bugtraq,1469 classtype:attempted-recon sid:823 LogAs="SID824" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/php.cgi"' $Tail # '"WEB-CGI php.cgi access"' nocase-ignored cve,CAN-1999-0238 bugtraq,2250 arachnids,232 classtype:attempted-recon sid:824 LogAs="SID825" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/glimpse"' $Tail # '"WEB-CGI glimpse access"' nocase-ignored bugtraq,2026 classtype:attempted-recon sid:825 LogAs="SID1608" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/htmlscript?../.."' $Tail # '"WEB-CGI htmlscript attempt"' nocase-ignored bugtraq,2001 cve,CVE-1999-0264 classtype:web-application-attack sid:1608 LogAs="SID826" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/htmlscript"' $Tail # '"WEB-CGI htmlscript access"' nocase-ignored bugtraq,2001 cve,CVE-1999-0264 classtype:attempted-recon sid:826 LogAs="SID827" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/info2www"' $Tail # '"WEB-CGI info2www access"' nocase-ignored bugtraq,1995 cve,CVE-1999-0266 classtype:attempted-recon sid:827 LogAs="SID828" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/maillist.pl"' $Tail # '"WEB-CGI maillist.pl access"' nocase-ignored classtype:attempted-recon sid:828 LogAs="SID829" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/nph-test-cgi"' $Tail # '"WEB-CGI nph-test-cgi access"' nocase-ignored nessus,10165 arachnids,224 cve,CVE-1999-0045 bugtraq,686 classtype:attempted-recon sid:829 LogAs="SID1451" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/nph-maillist.pl"' $Tail # '"WEB-CGI NPH-publish access"' nocase-ignored cve,CAN-2001-0400 classtype:attempted-recon sid:1451 LogAs="SID830" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/nph-publish"' $Tail # '"WEB-CGI NPH-publish access"' nocase-ignored cve,CAN-1999-1177 classtype:attempted-recon sid:830 LogAs="SID833" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/rguest.exe"' $Tail # '"WEB-CGI rguest.exe access"' nocase-ignored cve,CAN-1999-0467 bugtraq,2024 classtype:attempted-recon sid:833 LogAs="SID834" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/rwwwshell.pl"' $Tail # '"WEB-CGI rwwwshell.pl access"' nocase-ignored url,www.itsecurity.com/papers/p37.htm classtype:attempted-recon sid:834 LogAs="SID1644" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/test-cgi/*?*"' $Tail # '"WEB-CGI test-cgi attempt"' nocase-ignored nessus,10282 cve,CVE-1999-0070 arachnids,218 classtype:web-application-attack sid:1644 LogAs="SID835" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/test-cgi"' $Tail # '"WEB-CGI test-cgi access"' nocase-ignored nessus,10282 cve,CVE-1999-0070 arachnids,218 classtype:attempted-recon sid:835 LogAs="SID1645" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/testcgi"' $Tail # '"WEB-CGI testcgi access"' nocase-ignored nessus,11610 bugtraq,7214 classtype:web-application-activity sid:1645 LogAs="SID1646" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/test.cgi"' $Tail # '"WEB-CGI test.cgi access"' nocase-ignored classtype:web-application-activity sid:1646 LogAs="SID836" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/textcounter.pl"' $Tail # '"WEB-CGI textcounter.pl access"' nocase-ignored cve,CAN-1999-1479 classtype:attempted-recon sid:836 LogAs="SID837" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/uploader.exe"' $Tail # '"WEB-CGI uploader.exe access"' nocase-ignored cve,CVE-1999-0177 nessus,10291 classtype:attempted-recon sid:837 LogAs="SID838" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/webgais"' $Tail # '"WEB-CGI webgais access"' nocase-ignored arachnids,472 bugtraq,2058 cve,CVE-1999-0176 nessus,10300 classtype:attempted-recon sid:838 LogAs="SID839" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/finger"' $Tail # '"WEB-CGI finger access"' nocase-ignored arachnids,221 cve,CVE-1999-0612 nessus,10071 classtype:attempted-recon sid:839 LogAs="SID840" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/perlshop.cgi"' $Tail # '"WEB-CGI perlshop.cgi access"' nocase-ignored cve,CAN-1999-1374 classtype:attempted-recon sid:840 LogAs="SID841" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/pfdisplay.cgi"' $Tail # '"WEB-CGI pfdisplay.cgi access"' nocase-ignored bugtraq,64 cve,CVE-1999-0270 classtype:attempted-recon sid:841 LogAs="SID842" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/aglimpse"' $Tail # '"WEB-CGI aglimpse access"' nocase-ignored nessus,10095 cve,CVE-1999-0147 bugtraq,2026 classtype:attempted-recon sid:842 LogAs="SID843" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/AnForm2"' $Tail # '"WEB-CGI anform2 access"' nocase-ignored cve,CVE-1999-0066 arachnids,225 classtype:attempted-recon sid:843 LogAs="SID844" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/args.bat"' $Tail # '"WEB-CGI args.bat access"' nocase-ignored cve,CAN-1999-1374 classtype:attempted-recon sid:844 LogAs="SID1452" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/args.cmd"' $Tail # '"WEB-CGI args.cmd access"' nocase-ignored cve,CAN-1999-1374 classtype:attempted-recon sid:1452 LogAs="SID845" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/AT-admin.cgi"' $Tail # '"WEB-CGI AT-admin.cgi access"' nocase-ignored cve,CAN-1999-1072 classtype:attempted-recon sid:845 LogAs="SID1453" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/AT-generated.cgi"' $Tail # '"WEB-CGI AT-generated.cgi access"' nocase-ignored cve,CAN-1999-1072 classtype:attempted-recon sid:1453 LogAs="SID846" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/bnbform.cgi"' $Tail # '"WEB-CGI bnbform.cgi access"' nocase-ignored cve,CVE-1999-0937 bugtraq,1469 classtype:attempted-recon sid:846 LogAs="SID847" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/campas"' $Tail # '"WEB-CGI campas access"' nocase-ignored cve,CVE-1999-0146 bugtraq,1975 classtype:attempted-recon sid:847 LogAs="SID848" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/view-source"' --string '"../"' $Tail # '"WEB-CGI view-source directory traversal"' nocase-ignored nocase-ignored cve,CVE-1999-0174 classtype:web-application-attack sid:848 LogAs="SID849" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/view-source"' $Tail # '"WEB-CGI view-source access"' nocase-ignored cve,CVE-1999-0174 classtype:attempted-recon sid:849 LogAs="SID850" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/wais.pl"' $Tail # '"WEB-CGI wais.pl access"' nocase-ignored classtype:attempted-recon sid:850 LogAs="SID1454" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/wwwwais"' $Tail # '"WEB-CGI wwwwais access"' nocase-ignored nessus,10597 cve,CAN-2001-0223 classtype:attempted-recon sid:1454 LogAs="SID851" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/files.pl"' $Tail # '"WEB-CGI files.pl access"' nocase-ignored cve,CAN-1999-1081 classtype:attempted-recon sid:851 LogAs="SID852" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/wguest.exe"' $Tail # '"WEB-CGI wguest.exe access"' nocase-ignored cve,CAN-1999-0467 bugtraq,2024 classtype:attempted-recon sid:852 LogAs="SID853" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/wrap"' $Tail # '"WEB-CGI wrap access"' nessus,10317 bugtraq,373 arachnids,234 cve,CVE-1999-0149 classtype:attempted-recon sid:853 LogAs="SID854" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/classifieds.cgi"' $Tail # '"WEB-CGI classifieds.cgi access"' nocase-ignored bugtraq,2020 cve,CVE-1999-0934 classtype:attempted-recon sid:854 LogAs="SID856" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/environ.cgi"' $Tail # '"WEB-CGI environ.cgi access"' nocase-ignored classtype:attempted-recon sid:856 LogAs="SID1647" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/faxsurvey?/"' $Tail # '"WEB-CGI faxsurvey attempt (full path)"' nocase-ignored cve,CVE-1999-0262 bugtraq,2056 nessus,10067 classtype:web-application-attack sid:1647 LogAs="SID1609" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/faxsurvey?cat%20"' $Tail # '"WEB-CGI faxsurvey arbitrary file read attempt"' nocase-ignored nessus,10067 cve,CVE-1999-0262 bugtraq,2056 classtype:web-application-attack sid:1609 LogAs="SID857" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/faxsurvey"' $Tail # '"WEB-CGI faxsurvey access"' nocase-ignored cve,CVE-1999-0262 bugtraq,2056 nessus,10067 classtype:web-application-activity sid:857 LogAs="SID858" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/filemail.pl"' $Tail # '"WEB-CGI filemail access"' nocase-ignored cve,CAN-1999-1154 classtype:attempted-recon sid:858 LogAs="SID859" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/man.sh"' $Tail # '"WEB-CGI man.sh access"' nocase-ignored cve,CAN-1999-1179 classtype:attempted-recon sid:859 LogAs="SID860" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/snork.bat"' $Tail # '"WEB-CGI snork.bat access"' nocase-ignored bugtraq,1053 cve,CVE-2000-0169 arachnids,220 classtype:attempted-recon sid:860 LogAs="SID861" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/w3-msql/"' $Tail # '"WEB-CGI w3-msql access"' nocase-ignored bugtraq,591 cve,CVE-1999-0276 arachnids,210 nessus,10296 cve,CVE-2000-0012 classtype:attempted-recon sid:861 LogAs="SID863" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/day5datacopier.cgi"' $Tail # '"WEB-CGI day5datacopier.cgi access"' nocase-ignored cve,CAN-1999-1232 classtype:attempted-recon sid:863 LogAs="SID864" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/day5datanotifier.cgi"' $Tail # '"WEB-CGI day5datanotifier.cgi access"' nocase-ignored cve,CAN-1999-1232 classtype:attempted-recon sid:864 LogAs="SID866" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/post-query"' $Tail # '"WEB-CGI post-query access"' nocase-ignored cve,CAN-2001-0291 classtype:attempted-recon sid:866 LogAs="SID867" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/visadmin.exe"' $Tail # '"WEB-CGI visadmin.exe access"' nocase-ignored bugtraq,1808 cve,CAN-1999-1970 nessus,10295 classtype:attempted-recon sid:867 LogAs="SID869" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/dumpenv.pl"' $Tail # '"WEB-CGI dumpenv.pl access"' nocase-ignored cve,CAN-1999-1178 classtype:attempted-recon sid:869 LogAs="SID1537" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/calendar_admin.pl"' $Tail # '"WEB-CGI calendar_admin.pl access"' classtype:web-application-activity cve,CVE-2000-0432 sid:1537 LogAs="SID1701" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/calendar-admin.pl"' $Tail # '"WEB-CGI calendar-admin.pl access"' nocase-ignored bugtraq,1215 classtype:web-application-activity sid:1701 LogAs="SID1455" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/calender.pl"' $Tail # '"WEB-CGI calender.pl access"' nocase-ignored cve,CVE-2000-0432 classtype:attempted-recon sid:1455 LogAs="SID882" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/calendar"' $Tail # '"WEB-CGI calendar access"' nocase-ignored classtype:attempted-recon sid:882 LogAs="SID1457" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/user_update_admin.pl"' $Tail # '"WEB-CGI user_update_admin.pl access"' nocase-ignored cve,CVE-2000-0627 classtype:attempted-recon sid:1457 LogAs="SID1458" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/user_update_passwd.pl"' $Tail # '"WEB-CGI user_update_passwd.pl access"' nocase-ignored cve,CVE-2000-0627 classtype:attempted-recon sid:1458 LogAs="SID870" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/snorkerz.cmd"' $Tail # '"WEB-CGI snorkerz.cmd access"' nocase-ignored classtype:attempted-recon sid:870 LogAs="SID871" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/survey.cgi"' $Tail # '"WEB-CGI survey.cgi access"' nocase-ignored bugtraq,1817 cve,CVE-1999-0936 classtype:attempted-recon sid:871 LogAs="SID873" $Ipt -A $Me -p tcp --dport 80 -m string --string '"///"' $Tail # '"WEB-CGI scriptalias access"' cve,CVE-1999-0236 bugtraq,2300 arachnids,227 classtype:attempted-recon sid:873 LogAs="SID875" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/win-c-sample.exe"' $Tail # '"WEB-CGI win-c-sample.exe access"' nocase-ignored bugtraq,2078 arachnids,231 cve,CVE-1999-0178 nessus,10008 classtype:attempted-recon sid:875 LogAs="SID878" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/w3tvars.pm"' $Tail # '"WEB-CGI w3tvars.pm access"' nocase-ignored classtype:attempted-recon sid:878 LogAs="SID879" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/admin.pl"' $Tail # '"WEB-CGI admin.pl access"' nocase-ignored url,online.securityfocus.com/archive/1/249355 bugtraq,3839 classtype:attempted-recon sid:879 LogAs="SID880" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/LWGate"' $Tail # '"WEB-CGI LWGate access"' nocase-ignored url,www.netspace.org/~dwb/lwgate/lwgate-history.html url,www.wiretrip.net/rfp/p/doc.asp/i2/d6.htm classtype:attempted-recon sid:880 LogAs="SID881" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/archie"' $Tail # '"WEB-CGI archie access"' nocase-ignored classtype:attempted-recon sid:881 LogAs="SID883" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/flexform"' $Tail # '"WEB-CGI flexform access"' nocase-ignored url,www.wiretrip.net/rfp/p/doc.asp/i2/d6.htm classtype:attempted-recon sid:883 LogAs="SID1610" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/formmail"' --string '"%0a"' $Tail # '"WEB-CGI formmail arbitrary command execution attempt"' nocase-ignored nocase-ignored nessus,10782 nessus,10076 bugtraq,1187 cve,CVE-1999-0172 arachnids,226 classtype:web-application-attack sid:1610 LogAs="SID884" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/formmail"' $Tail # '"WEB-CGI formmail access"' nocase-ignored nessus,10782 nessus,10076 bugtraq,1187 cve,CVE-1999-0172 arachnids,226 classtype:web-application-activity sid:884 LogAs="SID1762" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/phf"' --string '"QALIAS"' --string '"%0a/"' $Tail # '"WEB-CGI phf arbitrary command execution attempt"' nocase-ignored nocase-ignored bugtraq,629 arachnids,128 cve,CVE-1999-0067 classtype:web-application-attack sid:1762 LogAs="SID886" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/phf"' $Tail # '"WEB-CGI phf access"' nocase-ignored bugtraq,629 arachnids,128 cve,CVE-1999-0067 classtype:web-application-activity sid:886 LogAs="SID887" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/www-sql"' $Tail # '"WEB-CGI www-sql access"' nocase-ignored url,marc.theaimsgroup.com/?l=bugtraq&m=88704258804054&w=2 classtype:attempted-recon sid:887 LogAs="SID888" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/wwwadmin.pl"' $Tail # '"WEB-CGI wwwadmin.pl access"' nocase-ignored classtype:attempted-recon sid:888 LogAs="SID889" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/ppdscgi.exe"' $Tail # '"WEB-CGI ppdscgi.exe access"' nocase-ignored bugtraq,491 url,online.securityfocus.com/archive/1/16878 classtype:attempted-recon sid:889 LogAs="SID890" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/sendform.cgi"' $Tail # '"WEB-CGI sendform.cgi access"' nocase-ignored cve,CAN-2002-0710 bugtraq,5286 url,www.scn.org/help/sendform.txt classtype:attempted-recon sid:890 LogAs="SID891" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/upload.pl"' $Tail # '"WEB-CGI upload.pl access"' nocase-ignored classtype:attempted-recon sid:891 LogAs="SID892" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/AnyForm2"' $Tail # '"WEB-CGI AnyForm2 access"' nocase-ignored bugtraq,719 cve,CVE-1999-0066 classtype:attempted-recon sid:892 LogAs="SID893" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/MachineInfo"' $Tail # '"WEB-CGI MachineInfo access"' nocase-ignored cve,CAN-1999-1067 classtype:attempted-recon sid:893 LogAs="SID1531" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/bb-hist.sh?HISTFILE=../.."' $Tail # '"WEB-CGI bb-hist.sh attempt"' nocase-ignored nessus,10025 cve,CAN-1999-1462 bugtraq,142 classtype:web-application-attack sid:1531 LogAs="SID894" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/bb-hist.sh"' $Tail # '"WEB-CGI bb-hist.sh access"' nocase-ignored nessus,10025 cve,CAN-1999-1462 bugtraq,142 classtype:attempted-recon sid:894 LogAs="SID1459" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/bb-histlog.sh"' $Tail # '"WEB-CGI bb-histlog.sh access"' nocase-ignored bugtraq,142 cve,CAN-1999-1462 classtype:attempted-recon sid:1459 LogAs="SID1460" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/bb-histsvc.sh"' $Tail # '"WEB-CGI bb-histsvc.sh access"' nocase-ignored bugtraq,142 cve,CAN-1999-1462 classtype:attempted-recon sid:1460 LogAs="SID1532" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/bb-hostsvc.sh?HOSTSVC?../.."' $Tail # '"WEB-CGI bb-hostscv.sh attempt"' nocase-ignored nessus,10460 cve,CVE-2000-0638 classtype:web-application-attack sid:1532 LogAs="SID1533" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/bb-hostsvc.sh"' $Tail # '"WEB-CGI bb-hostscv.sh access"' nocase-ignored nessus,10460 cve,CVE-2000-0638 classtype:web-application-activity sid:1533 LogAs="SID1461" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/bb-rep.sh"' $Tail # '"WEB-CGI bb-rep.sh access"' nocase-ignored bugtraq,142 cve,CAN-1999-1462 classtype:attempted-recon sid:1461 LogAs="SID1462" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/bb-replog.sh"' $Tail # '"WEB-CGI bb-replog.sh access"' nocase-ignored bugtraq,142 cve,CAN-1999-1462 classtype:attempted-recon sid:1462 LogAs="SID895" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/redirect"' $Tail # '"WEB-CGI redirect access"' nocase-ignored bugtraq,1179 cve,CVE-2000-0382 classtype:attempted-recon sid:895 LogAs="SID1397" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/way-board/way-board.cgi"' --string '"db="' --string '"../.."' $Tail # '"WEB-CGI wayboard attempt"' nocase-ignored bugtraq,2370 cve,CAN-2001-0214 classtype:web-application-attack sid:1397 LogAs="SID896" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/way-board"' $Tail # '"WEB-CGI way-board access"' nocase-ignored bugtraq,2370 cve,CAN-2001-0214 nessus,10610 classtype:web-application-activity sid:896 LogAs="SID1222" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/pals-cgi"' --string '"documentName="' $Tail # '"WEB-CGI pals-cgi arbitrary file access attempt"' nocase-ignored classtype:web-application-attack cve,CAN-2001-0217 bugtraq,2372 nessus,10611 sid:1222 LogAs="SID897" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/pals-cgi"' $Tail # '"WEB-CGI pals-cgi access"' nocase-ignored cve,CAN-2001-0216 cve,CAN-2001-0217 bugtraq,2372 nessus,10611 classtype:attempted-recon sid:897 LogAs="SID1572" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/commerce.cgi"' --string '"page="' --string '"/../"' $Tail # '"WEB-CGI commerce.cgi arbitrary file access attempt"' nocase-ignored nessus,10612 bugtraq,2361 cve,CAN-2001-0210 classtype:attempted-recon sid:1572 LogAs="SID898" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/commerce.cgi"' $Tail # '"WEB-CGI commerce.cgi access"' nocase-ignored nessus,10612 bugtraq,2361 cve,CAN-2001-0210 classtype:attempted-recon sid:898 LogAs="SID899" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/sendtemp.pl"' --string '"templ="' $Tail # '"WEB-CGI Amaya templates sendtemp.pl directory traversal attempt"' nocase-ignored nocase-ignored bugtraq,2504 cve,CAN-2001-0272 classtype:web-application-attack sid:899 LogAs="SID1702" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/sendtemp.pl"' $Tail # '"WEB-CGI Amaya templates sendtemp.pl access"' nocase-ignored bugtraq,2504 cve,CAN-2001-0272 classtype:web-application-activity sid:1702 LogAs="SID900" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/webspirs.cgi"' --string '"../../"' $Tail # '"WEB-CGI webspirs.cgi directory traversal attempt"' nocase-ignored nocase-ignored cve,CAN-2001-0211 bugtraq,2362 nessus,10616 classtype:web-application-attack sid:900 LogAs="SID901" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/webspirs.cgi"' $Tail # '"WEB-CGI webspirs.cgi access"' nocase-ignored cve,CAN-2001-0211 bugtraq,2362 nessus,10616 classtype:attempted-recon sid:901 LogAs="SID902" $Ipt -A $Me -p tcp --dport 80 -m string --string '"tstisapi.dll"' $Tail # '"WEB-CGI tstisapi.dll access"' nocase-ignored cve,CAN-2001-0302 classtype:attempted-recon sid:902 LogAs="SID1308" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/sendmessage.cgi"' $Tail # '"WEB-CGI sendmessage.cgi access"' nocase-ignored classtype:attempted-recon sid:1308 LogAs="SID1392" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/lastlines.cgi"' $Tail # '"WEB-CGI lastlines.cgi access"' nocase-ignored bugtraq,3755 bugtraq,3754 classtype:attempted-recon sid:1392 LogAs="SID1395" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/zml.cgi"' --string '"file=../"' $Tail # '"WEB-CGI zml.cgi attempt"' cve,CAN-2001-1209 bugtraq,3759 classtype:web-application-activity sid:1395 LogAs="SID1396" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/zml.cgi"' $Tail # '"WEB-CGI zml.cgi access"' cve,CAN-2001-1209 bugtraq,3759 classtype:web-application-activity sid:1396 LogAs="SID1405" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/publisher/search.cgi"' --string '"template="' $Tail # '"WEB-CGI AHG search.cgi access"' nocase-ignored nocase-ignored bugtraq,3985 classtype:web-application-activity sid:1405 LogAs="SID1534" $Ipt -A $Me -p tcp --dport 80 -m string --string '"/store/agora.cgi?cart_id=