[Silicon Defense logo]

SnortSnarf alert page


SnortSnarf v021111.1

Signature section (940)Top 20 source IPsTop 20 dest IPs

3 such alerts found using input module SnortFileInput, with sources:
Earliest: 21:21:42.927962 on 11/13/2020
Latest: 21:29:21.368319 on 11/13/2020

3 different signatures are present for as a source

There are 1 distinct destination IPs in the alerts of the type on this page. Whois lookup at: ARIN RIPE APNIC Geektools
DNS lookup at: Amenesi TRIUMF Princeton
More lookup links: Dshield Sam Spade

[**] [1:51620:2] SERVER-WEBAPP vBulletin pre-authenticated command injection attempt [**]
[Classification: Web Application Attack] [Priority: 1]
11/13-21:21:42.927962 ->
TCP TTL:114 TOS:0x0 ID:6590 IpLen:20 DgmLen:16307 DF
***AP*** Seq: 0x7F3A6211 Ack: 0x0 Win: 0x0 TcpLen: 20
[Xref => http://seclists.org/fulldisclosure/2019/Sep/31][Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-16759]
[**] [1:46316:4] SERVER-WEBAPP Drupal 8 remote code execution attempt [**]
[Classification: Attempted Administrator Privilege Gain] [Priority: 1]
11/13-21:29:17.118948 ->
TCP TTL:114 TOS:0x0 ID:8513 IpLen:20 DgmLen:1555 DF
1**AP*** Seq: 0x3EC2120A Ack: 0x0 Win: 0x0 TcpLen: 20
[Xref => http://www.drupal.org/sa-core-2018-002][Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-7600]
[**] [1:37078:4] SERVER-WEBAPP Joomla JDatabaseDriverMysqli unserialize code execution attempt [**]
[Classification: Attempted User Privilege Gain] [Priority: 1]
11/13-21:29:21.368319 ->
TCP TTL:114 TOS:0x0 ID:8675 IpLen:20 DgmLen:16340 DF
***AP*** Seq: 0x3EC217F5 Ack: 0x0 Win: 0x0 TcpLen: 20
[Xref => http://developer.joomla.org/security-centre/630-20151214-core-remote-code-execution-vulnerability.html][Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-8562]

SnortSnarf brought to you courtesy of Silicon Defense
Authors: Jim Hoagland and Stuart Staniford
See also the Snort Page by Marty Roesch
Page generated at Sun Oct 17 05:01:21 2021