Rule Category

SERVER-WEBAPP -- Snort has detected traffic exploiting vulnerabilities in web based applications on servers.

Alert Message

SERVER-WEBAPP smartsearch.cgi access

Rule Explanation

This event is generated when a remote user attempts to access smartsearch.cgi on a web server. This may indicate an attempt to exploit an arbitrary code execution vulnerability in Smart Search, a "pay-per-click" search engine. Impact: Arbitrary code execution. Details: Smart Search "pay-per-click" search engine software contains a vulnerability that allows code execution using a specially-crafted URL. Using the "keywords" parameter accepted by smartsearch.cgi, an attacker can pass arbitrary Perl code to the web server, which will then attempt to execute it. Ease of Attack: Simple. An exploit exists.

What To Look For

No information provided

Known Usage

No public information

False Positives

Known false positives, with the described conditions

If a legitimate remote user accesses smartsearch.cgi, this rule may generate an event.

Contributors

Cisco Talos Brian Caswell Jen Harvey

Rule Groups

No rule groups

CVE

None

Rule Vulnerability

No information provided

CVE Additional Information

This product uses data from the NVD API but is not endorsed or certified by the NVD.

None