""ET EXPLOIT Websense Content Gateway submit_net_debug.cgi cmd_param Param Buffer Overflow Attempt""
SID: 2021644
Revision: 1
Class Type: web-application-attack
Metadata: created_at 2015_08_18, cve CVE_2015_5718, confidence High, updated_at 2015_08_18
Reference:
Protocol: tcp
Source Network: any
Source Port: any
Destination Network: any
Destination Port: 8081
Flow: to_server,established
Contents:
-
Value: "POST"
-
Value: "/submit_net_debug.cgi"
-
Value: "cmd_param="
-
Value: !"|0A|"
Within: 500
PCRE: "/[\?\&]cmd_param=[^\&\r\n]{500}/si"
Special Options:
-
nocase
-
nocase
-
nocase