""ET WEB_SERVER Possible Barracuda IM Firewall smtp_test.cgi Cross-Site Scripting Attempt""

SID: 2010462

Revision: 3

Class Type: web-application-attack

Metadata: created_at 2010_07_30, updated_at 2010_09_08

Reference:

Protocol: tcp

Source Network: $EXTERNAL_NET

Source Port: any

Destination Network: $HOME_NET

Destination Port: $HTTP_PORTS

Flow: established,to_server

Contents:

  • Value: "|2F|cgi|2D|mod|2F|smtp|5F|test|2E|cgi"

  • Value: "email|3D|"

  • Value: "hostname|3D|"

  • Value: "default|5F|domain|3D|"

Within:

PCRE: "/(script|img|src|alert|onmouse|onkey|onload|ondragdrop|onblur|onfocus|onclick)/Ui"

Special Options:

  • nocase

  • http_uri

  • nocase

  • http_uri

  • nocase

  • http_uri

  • nocase

  • http_uri

source