""ET EXPLOIT [401TRG] DeDeCMS RFI Attempt""

SID: 2031527

Revision: 2

Class Type: attempted-admin

Metadata: created_at 2021_01_19, cve CVE_2010_1097, updated_at 2021_01_19

Reference:

Protocol: tcp

Source Network: any

Source Port: any

Destination Network: $HOME_NET

Destination Port: $HTTP_PORTS

Flow: established,to_server

Contents:

  • Value: "POST"

  • Value: "/select_soft_post.php"

  • Value: "cfg_basedir"

  • Value: "uploadfile"

  • Value: "upload"

  • Value: "multipart/form-data"

Within:

PCRE: "/^Content-Type\x3a\x20[^\r\n]+multipart\/form-data/Hmi"

Special Options:

  • http_method

  • nocase

  • http_uri

  • nocase

  • http_client_body

  • nocase

  • http_client_body

  • nocase

  • http_client_body

  • http_header

source