Update #3225 (11/14/2019)
4 new signatures:
MEDIUM | MISC:MQTT-CLNT-BYPASS | MISC: Mosquitto MQTT Client ID ACL Bypass |
MEDIUM | APP:MISC:MQTT-OF-DOS | APP: Eclipse Mosquitto MQTT SUBSCRIBE Topic Stack Overflow |
MEDIUM | HTTP:CTS:HARBOR-PROJECT-PE | HTTP: Harbor Project Harbor user API Privilege Escalation |
CRITICAL | HTTP:MISC:HPE-IMC-OPETATOR-CE | HTTP: HPE IMC OperatorGroupTreeSelectBean Expression Language Injection |
6 updated signatures:
HIGH | HTTP:FTP-ACTIVEX-CE | HTTP: Attachmate Reflection FTP Client ActiveX CE |
MEDIUM | HTTP:SNS-SDC-MUL | HTTP: SeaWell Networks Spectrum SDC Multiple Vulerabilities |
HIGH | HTTP:SQL:CVE-2016-8027-SQLI | HTTP: McAfee ePolicy Orchestrator DataChannel GUID SQL Injection |
MEDIUM | HTTP:PULSE-PCS-CMD-INJ | HTTP: Pulse Secure Pulse Connect Secure Command Injection |
HIGH | DHCP:OPT:REDHAT-CLIENT-SCRIPT | DHCP: Red Hat Enterprise Linux Server CVE-2018-1111 Code Execution |
HIGH | HTTP:PHP:WORDPRESS-UPLOAD | HTTP: WordPress uploadImage Arbitrary File Upload |
Details of the signatures included within this bulletin:
HTTP:FTP-ACTIVEX-CE - HTTP: Attachmate Reflection FTP Client ActiveX CE
Severity: HIGH
Description:
This signature detects attempts to use unsafe ActiveX controls in FTP. An attacker can create a malicious Web site containing Web pages with dangerous ActiveX controls, which if accessed by a victim, allows the attacker to gain control of the victim's client browser.
Supported On:
idp-5.1.110161014, DI-Client, DI-Worm, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, isg-3.0.0, idp-5.1.110170603, vsrx-15.1
References:
HTTP:SNS-SDC-MUL - HTTP: SeaWell Networks Spectrum SDC Multiple Vulerabilities
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known vulnerability against SeaWell Networks Spectrum SDC. A successful attack can lead to Multiple vulnerabilities.
Supported On:
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, idp-5.1.110170603, vsrx-15.1
References:
Affected Products:
- Seawell_networks spectrum_sdc 02.05.00
HTTP:CTS:HARBOR-PROJECT-PE - HTTP: Harbor Project Harbor user API Privilege Escalation
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known vulnerability against Harbor. A successful attack can lead to elevation of privilege and arbitrary code execution.
Supported On:
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, idp-5.1.110170603, vsrx-15.1
References:
Affected Products:
- Goharbor harbor 1.7.5
- Goharbor harbor 1.8.0
- Goharbor harbor 1.7.0
- Goharbor harbor 1.7.4
- Goharbor harbor 1.8.1
- Goharbor harbor 1.7.3
- Goharbor harbor 1.7.2
- Goharbor harbor 1.8.2
- Goharbor harbor 1.9.0
- Goharbor harbor 1.7.1
HTTP:SQL:CVE-2016-8027-SQLI - HTTP: McAfee ePolicy Orchestrator DataChannel GUID SQL Injection
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against McAfee ePolicy Orchestrator, application. A successful attack can lead to command injection and arbitrary code execution.
Supported On:
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, idp-5.1.110170603, vsrx-15.1
References:
Affected Products:
- Mcafee epolicy_orchestrator 5.1.2
- Mcafee epolicy_orchestrator 5.3.0
- Mcafee epolicy_orchestrator 5.1.1
- Mcafee epolicy_orchestrator 5.1.0
- Mcafee epolicy_orchestrator 5.3.1
- Mcafee epolicy_orchestrator 5.1.3
- Mcafee epolicy_orchestrator 5.3.2
HTTP:PULSE-PCS-CMD-INJ - HTTP: Pulse Secure Pulse Connect Secure Command Injection
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known vulnerability against Pulse Secure Pulse Connect Secure. A successful attack can lead to Command Injection.
Supported On:
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, idp-5.1.110170603, vsrx-15.1
References:
Affected Products:
- Pulsesecure pulse_policy_secure 5.3r5.0
- Pulsesecure pulse_policy_secure 9.0r2.1
- Pulsesecure pulse_policy_secure 5.3r2.0
- Pulsesecure pulse_policy_secure 5.4r6
- Pulsesecure pulse_policy_secure 5.3r8.1
- Pulsesecure pulse_connect_secure 8.2r1.0
- Pulsesecure pulse_policy_secure 5.3r5.2
- Pulsesecure pulse_connect_secure 9.0r2
- Pulsesecure pulse_policy_secure 5.1r1.1
- Pulsesecure pulse_connect_secure 8.2r9.0
- Pulsesecure pulse_connect_secure 8.1r9.2
- Pulsesecure pulse_connect_secure 8.3r5.2
- Pulsesecure pulse_policy_secure 5.2r3.0
- Pulsesecure pulse_policy_secure 5.2rx
- Pulsesecure pulse_policy_secure 5.1r10.0
- Pulsesecure pulse_policy_secure 5.2r7.0
- Pulsesecure pulse_connect_secure 9.0rx
- Pulsesecure pulse_policy_secure 9.0r2
- Pulsesecure pulse_connect_secure 8.1r3.2
- Pulsesecure pulse_policy_secure 5.3r1.1
- Pulsesecure pulse_policy_secure 5.2r9.0
- Pulsesecure pulse_policy_secure 5.1r2.1
- Pulsesecure pulse_connect_secure 8.2r2.0
- Pulsesecure pulse_policy_secure 5.1r12.0
- Pulsesecure pulse_policy_secure 5.1r1.0
- Pulsesecure pulse_connect_secure 8.1r12.0
- Pulsesecure pulse_policy_secure 5.1r9.0
- Pulsesecure pulse_policy_secure 5.3r9.0
- Pulsesecure pulse_connect_secure 8.1r11.0
- Pulsesecure pulse_policy_secure 5.1r2.0
- Pulsesecure pulse_connect_secure 9.0r2.1
- Pulsesecure pulse_policy_secure 5.3r3.0
- Pulsesecure pulse_connect_secure 8.2r5.0
- Pulsesecure pulse_policy_secure 5.2r8.0
- Pulsesecure pulse_policy_secure 5.2r3.2
- Pulsesecure pulse_policy_secure 5.1r7.0
- Pulsesecure pulse_policy_secure 5.2r6.0
- Pulsesecure pulse_policy_secure 5.3r3.1
- Pulsesecure pulse_connect_secure 8.2r7.1
- Pulsesecure pulse_policy_secure 5.1r11.1
- Pulsesecure pulse_connect_secure 8.3rx
- Pulsesecure pulse_connect_secure 8.1r2.0
- Pulsesecure pulse_policy_secure 5.3r11.0
- Pulsesecure pulse_connect_secure 8.3r6.1
- Pulsesecure pulse_policy_secure 5.2r2.0
- Pulsesecure pulse_connect_secure 8.3r2
- Pulsesecure pulse_policy_secure 5.3r4.1
- Pulsesecure pulse_policy_secure 5.4r7
- Pulsesecure pulse_policy_secure 5.1r5.0
- Pulsesecure pulse_connect_secure 8.3r4
- Pulsesecure pulse_connect_secure 8.1r3.0
- Pulsesecure pulse_connect_secure 8.2r8.1
- Pulsesecure pulse_connect_secure 8.3r6
- Pulsesecure pulse_connect_secure 8.1r1.1
- Pulsesecure pulse_policy_secure 5.2r9.1
- Pulsesecure pulse_connect_secure 9.0r3.2
- Pulsesecure pulse_policy_secure 5.2r5.0
- Pulsesecure pulse_connect_secure 8.2r3.0
- Pulsesecure pulse_policy_secure 5.4r2.1
- Pulsesecure pulse_connect_secure 8.1r9.0
- Pulsesecure pulse_policy_secure 5.4r4
- Pulsesecure pulse_policy_secure 5.2r10.0
- Pulsesecure pulse_policy_secure 5.2r4.0
- Pulsesecure pulse_policy_secure 5.3r7.0
- Pulsesecure pulse_policy_secure 5.1r11.0
- Pulsesecure pulse_connect_secure 8.1r4.0
- Pulsesecure pulse_connect_secure 8.1r5.0
- Pulsesecure pulse_connect_secure 8.1r9.1
- Pulsesecure pulse_policy_secure 5.2r7.1
- Pulsesecure pulse_policy_secure 5.1r14.0
- Pulsesecure pulse_connect_secure 8.2r4.1
- Pulsesecure pulse_connect_secure 8.2r1.1
- Pulsesecure pulse_connect_secure 8.2r12.0
- Pulsesecure pulse_policy_secure 5.3r5.1
- Pulsesecure pulse_connect_secure 9.0r3
- Pulsesecure pulse_policy_secure 5.3r6.0
- Pulsesecure pulse_policy_secure 5.3r8.0
- Pulsesecure pulse_connect_secure 8.2r11.0
- Pulsesecure pulse_connect_secure 9.0r1
- Pulsesecure pulse_connect_secure 8.2r6.0
- Pulsesecure pulse_policy_secure 5.3r8.2
- Pulsesecure pulse_connect_secure 8.1r13.0
- Pulsesecure pulse_connect_secure 8.1r3.1
- Pulsesecure pulse_policy_secure 5.3r1.0
- Pulsesecure pulse_policy_secure 5.1r4.0
- Pulsesecure pulse_policy_secure 9.0r3
- Pulsesecure pulse_policy_secure 5.1r12.1
- Pulsesecure pulse_policy_secure 9.0r1
- Pulsesecure pulse_connect_secure 8.1r12.1
- Pulsesecure pulse_policy_secure 5.3rx
- Pulsesecure pulse_connect_secure 8.1r14.0
- Pulsesecure pulse_policy_secure 5.4r2
- Pulsesecure pulse_connect_secure 8.2r5.1
- Pulsesecure pulse_connect_secure 8.1r11.1
- Pulsesecure pulse_policy_secure 5.3r10.
- Pulsesecure pulse_policy_secure 5.4rx
- Pulsesecure pulse_policy_secure 5.1r9.1
- Pulsesecure pulse_policy_secure 5.1r3.0
- Pulsesecure pulse_policy_secure 5.1r8.0
- Pulsesecure pulse_connect_secure 8.3r3
- Pulsesecure pulse_connect_secure 8.2r7.2
- Pulsesecure pulse_policy_secure 5.1r3.2
- Pulsesecure pulse_policy_secure 5.2r11.0
- Pulsesecure pulse_connect_secure 8.3r2.1
- Pulsesecure pulse_connect_secure 8.1r2.1
- Pulsesecure pulse_connect_secure 8.3r1
- Pulsesecure pulse_connect_secure 8.2r7.0
- Pulsesecure pulse_policy_secure 5.3r12.0
- Pulsesecure pulse_policy_secure 5.4r5.2
- Pulsesecure pulse_policy_secure 9.0r3.1
- Pulsesecure pulse_connect_secure 8.2rx
- Pulsesecure pulse_policy_secure 5.1r13.0
- Pulsesecure pulse_connect_secure 8.3r5
- Pulsesecure pulse_policy_secure 5.3r4.0
- Pulsesecure pulse_policy_secure 5.4r6.1
- Pulsesecure pulse_connect_secure 8.2r8.0
- Pulsesecure pulse_connect_secure 8.3r7
- Pulsesecure pulse_connect_secure 8.1r6.0
- Pulsesecure pulse_connect_secure 8.2r8.2
- Pulsesecure pulse_connect_secure 8.1r1.0
- Pulsesecure pulse_policy_secure 9.0rx
- Pulsesecure pulse_connect_secure 9.0r3.1
- Pulsesecure pulse_connect_secure 8.1r7.0
- Pulsesecure pulse_connect_secure 8.2r3.1
- Pulsesecure pulse_connect_secure 8.1r10.0
- Pulsesecure pulse_policy_secure 5.1r6.0
- Pulsesecure pulse_policy_secure 5.2r1.0
- Pulsesecure pulse_policy_secure 5.4r5
- Pulsesecure pulse_connect_secure 8.1r4.1
- Pulsesecure pulse_policy_secure 5.4r3
- Pulsesecure pulse_connect_secure 8.1r8.0
- Pulsesecure pulse_connect_secure 8.3r5.1
- Pulsesecure pulse_connect_secure 8.2r10.0
- Pulsesecure pulse_policy_secure 5.4r1
- Pulsesecure pulse_connect_secure 8.2r4.0
DHCP:OPT:REDHAT-CLIENT-SCRIPT - DHCP: Red Hat Enterprise Linux Server CVE-2018-1111 Code Execution
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Red Hat Enterprise Linux Server. A successful exploit could allow the attacker to inject and execute arbitrary script commands with root privileges on the system.
Supported On:
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, idp-5.0.0, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, isg-3.5.141818, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, isg-3.0.0, idp-5.1.110170603, vsrx-15.1
References:
Affected Products:
- Redhat enterprise_linux 6.0
- Redhat enterprise_linux 7.2
- Redhat enterprise_virtualization 4.2
- Redhat enterprise_virtualization 4.0
- Redhat enterprise_linux_workstation 7.0
- Redhat enterprise_linux 6.5
- Redhat enterprise_linux_workstation 6.0
- Redhat enterprise_linux 7.4
- Fedoraproject fedora 28
- Fedoraproject fedora 27
- Redhat enterprise_linux_desktop 6.0
- Redhat enterprise_linux 6.6
- Redhat enterprise_linux_server 6.0
- Fedoraproject fedora 26
- Redhat enterprise_linux 6.4
- Redhat enterprise_linux 7.3
- Redhat enterprise_linux 7.0
- Redhat enterprise_linux 7.5
- Redhat enterprise_linux_server 7.0
- Redhat enterprise_linux 6.7
- Redhat enterprise_linux_desktop 7.0
- Redhat enterprise_virtualization_host 4.0
MISC:MQTT-CLNT-BYPASS - MISC: Mosquitto MQTT Client ID ACL Bypass
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known vulnerability against Mosquitto MQTT. A successful attack can lead to security bypass.
Supported On:
srx-branch-19.2, vsrx3bsd-19.2, srx-17.3, vsrx-17.4, srx-branch-17.4, srx-17.4, vsrx-15.1, vsrx3bsd-18.2, srx-18.2, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, srx-branch-19.1, vsrx-19.2, srx-19.2
References:
Affected Products:
- Eclipse mosquitto 0.5.4
- Eclipse mosquitto 1.3.2
- Eclipse mosquitto 0.6.1
- Eclipse mosquitto 1.4
- Eclipse mosquitto 1.0.2
- Eclipse mosquitto 1.3.5
- Eclipse mosquitto 1.1
- Eclipse mosquitto 0.14.4
- Eclipse mosquitto 1.4.7
- Eclipse mosquitto 1.1.1
- Eclipse mosquitto 1.3.4
- Eclipse mosquitto 0.11.1
- Eclipse mosquitto 0.12
- Eclipse mosquitto 1.0.5
- Eclipse mosquitto 1.4.8
- Eclipse mosquitto 1.2.2
- Eclipse mosquitto 0.4.2
- Eclipse mosquitto 1.1.3
- Eclipse mosquitto 1.4.9
- Eclipse mosquitto 0.4.1
- Eclipse mosquitto 0.11.2
- Eclipse mosquitto 1.4.2
- Eclipse mosquitto 1.1.2
- Eclipse mosquitto 0.6
- Eclipse mosquitto 0.11.3
- Eclipse mosquitto 0.5.1
- Debian debian_linux 8.0
- Eclipse mosquitto 1.3.3
- Eclipse mosquitto 0.9
- Eclipse mosquitto 0.10.1
- Eclipse mosquitto 0.5.2
- Eclipse mosquitto 1.0.1
- Eclipse mosquitto 0.8.1
- Eclipse mosquitto 1.2.3
- Eclipse mosquitto 0.5.3
- Eclipse mosquitto 1.2
- Eclipse mosquitto 0.9.1
- Eclipse mosquitto 0.8
- Eclipse mosquitto 1.3
- Eclipse mosquitto 0.99.2
- Eclipse mosquitto 0.10.2
- Eclipse mosquitto 0.8.2
- Eclipse mosquitto 1.4.6
- Eclipse mosquitto 1.4.3
- Eclipse mosquitto 1.0.4
- Eclipse mosquitto 1.4.10
- Eclipse mosquitto 1.4.1
- Eclipse mosquitto 0.1
- Eclipse mosquitto 1.1.90
- Eclipse mosquitto 1.4.11
- Eclipse mosquitto 0.9.2
- Eclipse mosquitto 0.15
- Eclipse mosquitto 0.9.3
- Eclipse mosquitto 0.3
- Eclipse mosquitto 0.14
- Eclipse mosquitto 1.2.1
- Eclipse mosquitto 0.14.1
- Eclipse mosquitto 0.2
- Eclipse mosquitto 1.3.1
- Eclipse mosquitto 1.0
- Eclipse mosquitto 1.4.5
- Eclipse mosquitto 0.5
- Eclipse mosquitto 1.0.3
- Eclipse mosquitto 1.4.4
- Eclipse mosquitto 0.14.3
- Eclipse mosquitto 0.4
- Eclipse mosquitto 0.8.3
- Eclipse mosquitto 0.13
- Eclipse mosquitto 0.14.2
- Eclipse mosquitto 0.7
- Eclipse mosquitto 0.10
APP:MISC:MQTT-OF-DOS - APP: Eclipse Mosquitto MQTT SUBSCRIBE Topic Stack Overflow
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known vulnerability against Eclipse Mosquitto. A successful attack can result in a denial-of-service condition.
Supported On:
srx-branch-19.2, vsrx3bsd-19.2, srx-17.3, vsrx-17.4, srx-branch-17.4, srx-17.4, vsrx-15.1, vsrx3bsd-18.2, srx-18.2, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, srx-branch-19.1, vsrx-19.2, srx-19.2
References:
Affected Products:
- Eclipse mosquitto 1.5.7
- Eclipse mosquitto 1.6.3
- Eclipse mosquitto 1.5.2
- Eclipse mosquitto 1.6.4
- Eclipse mosquitto 1.5.6
- Eclipse mosquitto 1.6.5
- Eclipse mosquitto 1.5.8
- Eclipse mosquitto 1.5.1
- Eclipse mosquitto 1.6.1
- Eclipse mosquitto 1.5
- Eclipse mosquitto 1.5.5
- Eclipse mosquitto 1.6
- Eclipse mosquitto 1.5.4
- Eclipse mosquitto 1.6.2
- Eclipse mosquitto 1.5.3
HTTP:PHP:WORDPRESS-UPLOAD - HTTP: WordPress uploadImage Arbitrary File Upload
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against WordPress uploadImage php file. A successful attack can lead to arbitrary code execution.
Supported On:
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, idp-5.1.110170603, vsrx-15.1
References:
Affected Products:
- Wordpress recip.ly_plugin 1.1.7
HTTP:MISC:HPE-IMC-OPETATOR-CE - HTTP: HPE IMC OperatorGroupTreeSelectBean Expression Language Injection
Severity: CRITICAL
Description:
This signature detects attempts to exploit a known vulnerability against HPE IMC. A successful attack can lead to arbitrary code execution.
Supported On:
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, idp-5.1.110170603, vsrx-15.1
References:
Affected Products:
- Hp intelligent_management_center 5.2
- Hp intelligent_management_center 7.3
- Hp intelligent_management_center 5.0
- Hp intelligent_management_center 7.0
- Hp intelligent_management_center 5.1
- Hp intelligent_management_center 7.2