Rule:

--
Sid:
3827

--
Summary:
This event is generated when an attempt is made to exploit a vulnerability associated with the PHP XML-RPC module.

--
Impact:
Serious. Execution of arbitrary commands may be possible.

--
Detailed Information:
A vulnerability exists in the PHP XML-RPC module that may allow unauthorized users to execute arbitrary commands.  No user authentication is required to execute the commands.

--
Affected Systems:
See the bugtraq advisory for the many vulnerable software packages.

--
Attack Scenarios:
An attacker can send an HTTP POST request for xmlrpc.php and supply arbitrary commands to be executed.

--
Ease of Attack:
Simple. The Lupper/Plupii worm is known to use this vulnerability as one of it's attack vectors.

--
False Positives:
None known.

--
False Negatives:
None known.

--
Corrective Action:
Upgrade to the most current non affected version of the software.

--
Contributors:
Sourcefire Vulnerability Research Team
Judy Novak <judy.novak@sourcefire.com>

--
Additional References:

--
