Short Name |
HTTP:STC:PAJAX-RCE |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
PAJAX Remote Command Execution |
Release Date |
2010/04/19 |
Update Number |
1660 |
Supported Platforms |
idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability against PAJAX. Attackers can gain unauthorized access to a vulnerable computer by executing arbitrary PHP code. This signature was developed based on the public PoC from the Metasploit Framework.
PAJAX is reported prone to multiple remote code-execution vulnerabilities. These issues may allow an attacker to gain unauthorized access to a vulnerable computer by executing arbitrary PHP code. PAJAX versions 0.5.1 is affected by this issue. Prior versions may be affected as well.