Project

General

Profile

Actions

Bug #211

closed

Fail to alert on sid 2002660

Added by Josh Smith over 14 years ago. Updated over 14 years ago.

Status:
Closed
Priority:
Normal
Assignee:
Target version:
Affected Versions:
Effort:
Difficulty:
Label:

Description

Suricata fails to alert on sid 2002660 with the attached pcap. Snort is able to pick it up.

alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET WEB_SERVER RSA Web Auth Exploit Attempt - Long URL"; flow:to_server,established; uricontent:"/WebID/IISWebAgentIF.dll"; uricontent:"?Redirect?"; nocase; pcre:"/url=.{8000}/i"; reference:url,secunia.com/advisories/17281; reference:url,www.metasploit.com/projects/Framework/modules/exploits/rsa_iiswebagent_redirect.pm; classtype:web-application-activity; reference:url,doc.emergingthreats.net/2002660; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SERVER/WEB_RSA; reference:url,doc.emergingthreats.net/2002660; sid:2002660; rev:8;)


Files

2002660.pcap (8.45 KB) 2002660.pcap Josh Smith, 07/15/2010 06:08 PM
Actions #1

Updated by Victor Julien over 14 years ago

Wouldn't it make more sense to do the pcre on the uri?

Anyway, the packet containing the GET data is considered out of window by the stream engine and I think it is right about it:

[6142] 20/7/2010 -- 13:30:08 - (stream-tcp.c:1510) <Debug> (HandleEstablishedPacketToServer) -- ssn 0x99f3d68: toserver => SEQ out of window, packet SEQ 2266354306, payload size 8241 (2266362547),ssn->client.last_ack 2266354306, ssn->client.next_win 2266362498(49) (ssn->client.ra_base_seq 2266354305)

This causes the stream engine to reject the packet so it won't be sent to the htp module which means the uricontent match will never work.

Actions #2

Updated by Will Metcalf over 14 years ago

  • Due date set to 07/20/2010
  • Status changed from New to Closed
  • Estimated time set to 2.50 h

Ok this is an r2a bug, data is indeed out-of-window. Sending it over to Josh for review. And you are correct based on the following the rule should use the /U modifier. I will send this over to ET.

http://www.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/isapi/rsa_webagent_redirect.rb

Actions

Also available in: Atom PDF