HTTP: Pacer Edition CMS rm Parameter Arbitrary File Deletion1
This signature detects attempts to exploit a known vulnerability in Pacer Edition CMS. An unprivileged attacker can use a directory traversal attack against a vulnerable server to verify file existence, access file contents, and delete files, or launching further attacks.
References
BugTraq: 58570
URL: http://www.mozilla.org/security/announce/2013/mfsa2013-15.html https://bugzilla.mozilla.org/show_bug.cgi?id=813906 http://binvul.com/viewthread.php?tid=311 https://rh0dev.github.io/blog/2015/fun-with-info-leaks/ http://www.adobe.com/support/security/bulletins/apsb13-15.html http://www.fireeye.com/blog/technical/cyber-exploits/2013/11/ms-windows-local-privilege-escalation-zero-day-in-the-wild.html http://helpx.adobe.com/security/products/flash-player/apsb14-04.html http://blogs.technet.com/b/mmpc/archive/2014/02/17/a-journey-to-cve-2014-0497-exploit.aspx
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3