Snort mailing list archives
Re: CVE-2018-1143, CVE-2018-1144, CVE-2018-1146
From: Phillip Lee <phillile () sourcefire com>
Date: Fri, 27 Apr 2018 11:08:40 -0400
Yaser, Thanks for your submission. We will review the rules and get back to you when they're finished. Regards, Phil Lee Cisco Talos
On Apr 27, 2018, at 10:47 AM, Y M via Snort-sigs <snort-sigs () lists snort org> wrote: Hi, The below signatures attempt at detecting exploits against the listed CVEs. No pcaps available. # Title: Belkin N750 F9K1103 v1 Multiple Vulnerabilities # Reference: www.tenable.com/security/research/tra-2018-0 <http://www.tenable.com/security/research/tra-2018-08>9 # CVEs: CVE-2018-1143, CVE-2018-1144, CVE-2018-1146 alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Belkin twonky blind command injection attempt"; flow:to_server,established; content:"/twonky_cmd.cgi?"; fast_pattern:only; http_uri; content:"?path="; http_uri; content:"/%60"; http_uri; metadata:ruleset community, service http; reference:cve,2018-1143; reference:url,www.tenable.com/security/research/tra-2018-08 <http://www.tenable.com/security/research/tra-2018-08>; classtype:attempted-admin; sid:8000009; rev:1;) alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Belkin proxy.cgi command injection attempt"; flow:to_server,established; content:"/proxy.cgi?"; fast_pattern:only; http_uri; content:"url=|60|"; http_uri; metadata:ruleset community, service http; reference:cve,2018-1144; reference:url,www.tenable.com/security/research/tra-2018-08 <http://www.tenable.com/security/research/tra-2018-08>; classtype:attempted-admin; sid:8000010; rev:1;) alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-WEBAPP Belkin unauthenticated telnet enablement attempt"; flow:to_server,established; content:"/set.cgi?"; fast_pattern:only; http_uri; content:"n=TELENT_EN"; http_uri; content:"&v=1"; distance:0; http_uri; metadata:ruleset community, service http; reference:cve,2018-1146; reference:url,www.tenable.com/security/research/tra-2018-08 <http://www.tenable.com/security/research/tra-2018-08>; classtype:attempted-admin; sid:8000011; rev:1;) Thanks. YM _______________________________________________ Snort-sigs mailing list Snort-sigs () lists snort org <mailto:Snort-sigs () lists snort org> https://lists.snort.org/mailman/listinfo/snort-sigs <https://lists.snort.org/mailman/listinfo/snort-sigs> Please visit http://blog.snort.org <http://blog.snort.org/> for the latest news about Snort! Please follow these rules: https://snort.org/faq/what-is-the-mailing-list-etiquette <https://snort.org/faq/what-is-the-mailing-list-etiquette> Visit the Snort.org <http://snort.org/> to subscribe to the official Snort ruleset, make sure to stay up to date to catch the most <a href=" https://snort.org/downloads/#rule-downloads <https://snort.org/downloads/#rule-downloads>">emerging threats</a>!
_______________________________________________ Snort-sigs mailing list Snort-sigs () lists snort org https://lists.snort.org/mailman/listinfo/snort-sigs Please visit http://blog.snort.org for the latest news about Snort! Please follow these rules: https://snort.org/faq/what-is-the-mailing-list-etiquette Visit the Snort.org to subscribe to the official Snort ruleset, make sure to stay up to date to catch the most <a href=" https://snort.org/downloads/#rule-downloads">emerging threats</a>!
Current thread:
- CVE-2018-1143, CVE-2018-1144, CVE-2018-1146 Y M via Snort-sigs (Apr 27)
- Re: CVE-2018-1143, CVE-2018-1144, CVE-2018-1146 Phillip Lee (Apr 27)
- Re: CVE-2018-1143, CVE-2018-1144, CVE-2018-1146 David (Apr 27)
- Re: CVE-2018-1143, CVE-2018-1144, CVE-2018-1146 Y M via Snort-sigs (Apr 27)