Then I try to access, using Mozilla 1.5 and IE6.0, the URL: http://server_name/admin/fileman/upload.php?dir=
the snort-inline log start showing lines like this:
[**] [1:2077:2] WEB-PHP Mambo upload.php access [**]
[Classification: access to a potentially vulnerable web application] [Priority: 2]
01/13-18:31:06.944124 200.43.81.205:1586 -> 10.2.0.10:80 TCP TTL:117 TOS:0x0 ID:3095 IpLen:20 DgmLen:578 DF
***AP*** Seq: 0x45A19C2C Ack: 0x425899A4 Win: 0xFFFF TcpLen: 20
[Xref => http://www.securityfocus.com/bid/6572]
but after 5 minutes of that, the webserver finally got the query and answed. That means that snort-inline let pass through the packet that should drop. Can anyone check that? I try several time and got the same result.
-- Federico Petronio fpetronio@petrus.agro.uba.ar Linux User #129974
--- There are only 10 types of people in the world: Those who understand binary and those who don't.