""ET EXPLOIT Websense Content Gateway submit_net_debug.cgi cmd_param Param Buffer Overflow Attempt""

SID: 2021644

Revision: 1

Class Type: web-application-attack

Metadata: created_at 2015_08_18, cve CVE_2015_5718, confidence High, updated_at 2015_08_18

Reference:

Protocol: tcp

Source Network: any

Source Port: any

Destination Network: any

Destination Port: 8081

Flow: to_server,established

Contents:

  • Value: "POST"

  • Value: "/submit_net_debug.cgi"

  • Value: "cmd_param="

  • Value: !"|0A|"

Within: 500

PCRE: "/[\?\&]cmd_param=[^\&\r\n]{500}/si"

Special Options:

  • nocase

  • nocase

  • nocase

source