""ET WEB_SPECIFIC_APPS Wordpress wp-livephp plugin wp-live.php Cross-Site Scripting Attempt""

SID: 2014880

Revision: 4

Class Type: web-application-attack

Metadata: affected_product Wordpress, affected_product Wordpress_Plugins, attack_target Web_Server, created_at 2012_06_08, deployment Datacenter, signature_severity Major, tag Wordpress, updated_at 2012_06_08

Reference:

Protocol: tcp

Source Network: $EXTERNAL_NET

Source Port: any

Destination Network: $HTTP_SERVERS

Destination Port: $HTTP_PORTS

Flow: established,to_server

Contents:

  • Value: "/wp-content/plugins/wp-livephp/wp-live.php?"

  • Value: "s="

Within:

PCRE: "/s\x3d.+(s(cript|tyle\x3D)|on(mouse[a-z]|key[a-z]|load|unload|dragdrop|blur|focus|click|dblclick|submit|reset|select|change))/Ui"

Special Options:

  • nocase

  • http_uri

  • nocase

  • http_uri

source