Rule:

--
Sid:
3827

--
Summary:
This event is generated when an attempt is made to exploit a vulnerability
associated with the PHP XML-RPC module.

--
Impact:
Serious. Execution of arbitrary commands may be possible.

--
Detailed Information:

A vulnerability exists in the PHP XML-RPC module that may allow
unauthorized users to execute arbitrary commands.  No user
authentication is required to execute the commands.

--
Affected Systems:
See the bugtraq advisory for the many vulnerable software packages.

--
Attack Scenarios:
An attacker can send an HTTP POST request for xmlrpc.php and supply
arbitrary commands to be executed.

--
Ease of Attack:
Simple.

--
False Positives:
None known.

--
False Negatives:
None known.

--
Corrective Action:
Upgrade to the most current nonaffected version of the software.

--
Contributors:
Sourcefire Vulnerability Research Team
Judy Novak <judy.novak@sourcefire.com>

--
Additional References:

--
