<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: XML-RPC PHP Command Execution in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/xml-rpc-php-command-execution/m-p/498364#M100053</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Darin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This signature is indeed firing because the following part is included into the XML file being posted:&lt;/P&gt;&lt;P&gt; &lt;NAME&gt;','')); echo ..'______BEGIN______'; &lt;/NAME&gt;&lt;/P&gt;&lt;P&gt;I'm not too sure if this is legitimate or not in your case, but that definitely looks like a code injection! &lt;/P&gt;&lt;P&gt;It is indeed pretty similar to the exploits related to this vulnerability:&lt;/P&gt;&lt;P&gt;  &lt;A class="jive-link-custom" href="http://www.securityfocus.com/bid/14088/exploit" target="_blank"&gt;http://www.securityfocus.com/bid/14088/exploit&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;JF&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 23 Aug 2005 15:15:25 GMT</pubDate>
    <dc:creator>jdal</dc:creator>
    <dc:date>2005-08-23T15:15:25Z</dc:date>
    <item>
      <title>XML-RPC PHP Command Execution</title>
      <link>https://community.cisco.com/t5/network-security/xml-rpc-php-command-execution/m-p/498362#M100051</link>
      <description>&lt;P&gt;The follow captured packet is said to have caused the signature called &amp;#147;XML-RPC PHP Command Execution&amp;#148; (SIGID: 3254 SubSig: 0) to trigger&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;..~...........E..$..@.=....C....'O....QxE..+.UP....j....&amp;lt;?xml version="1.0"?&amp;gt;..&amp;lt;methodCall&amp;gt;..&amp;lt;methodName&amp;gt;test.method..&amp;lt;/methodName&amp;gt;..&amp;lt;params&amp;gt;..&amp;lt;param&amp;gt;..&amp;lt;value&amp;gt;&amp;lt;name&amp;gt;','')); echo ..'______BEGIN______'; ..passthru('id'); ..echo ..'_____FIM_____';..exit;/*&amp;lt;/name&amp;gt;&amp;lt;/value&amp;gt;..&amp;lt;/param&amp;gt;..&amp;lt;/params&amp;gt;..&amp;lt;/methodCall&amp;gt;....{.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The signature looks for 2 criteria before sending the alert to the console. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HeaderRegex: &lt;/P&gt;&lt;P&gt;[Cc][Oo][Nn][Tt][Ee][Nn][Tt][-][Tt][Yy][Pp][Ee][:]\x20?([Aa][Pp][Pp][Ll][Ii][Cc][Aa][Tt][Ii][Oo][Nn]|[Tt][Ee][Xx][Tt])[/\\][Xx][Mm][Ll]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;RequestRegex: &lt;/P&gt;&lt;P&gt;[^\x5c]['][);\x0a\x0d\x20]+([Ee][Cc][Hh][Oo]|[Ss][Yy][Ss][Tt][Ee][Mm])&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am looking for the part in the triggered packet that has caused the event to trigger. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could someone from the list please point out which part in the trigged packet caused the event?&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 09:35:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/xml-rpc-php-command-execution/m-p/498362#M100051</guid>
      <dc:creator>darin.marais</dc:creator>
      <dc:date>2019-03-10T09:35:31Z</dc:date>
    </item>
    <item>
      <title>Re: XML-RPC PHP Command Execution</title>
      <link>https://community.cisco.com/t5/network-security/xml-rpc-php-command-execution/m-p/498363#M100052</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;this signature triggers often when the header contains the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"tent-Type: application/xml..Content-Length: 250..Via: 1.1 annaka"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but the regular expression looks for more behond the word application. can you confirm that there are no false postives from this signature..??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks in advance&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Aug 2005 12:39:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/xml-rpc-php-command-execution/m-p/498363#M100052</guid>
      <dc:creator>darin.marais</dc:creator>
      <dc:date>2005-08-23T12:39:39Z</dc:date>
    </item>
    <item>
      <title>Re: XML-RPC PHP Command Execution</title>
      <link>https://community.cisco.com/t5/network-security/xml-rpc-php-command-execution/m-p/498364#M100053</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Darin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This signature is indeed firing because the following part is included into the XML file being posted:&lt;/P&gt;&lt;P&gt; &lt;NAME&gt;','')); echo ..'______BEGIN______'; &lt;/NAME&gt;&lt;/P&gt;&lt;P&gt;I'm not too sure if this is legitimate or not in your case, but that definitely looks like a code injection! &lt;/P&gt;&lt;P&gt;It is indeed pretty similar to the exploits related to this vulnerability:&lt;/P&gt;&lt;P&gt;  &lt;A class="jive-link-custom" href="http://www.securityfocus.com/bid/14088/exploit" target="_blank"&gt;http://www.securityfocus.com/bid/14088/exploit&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;JF&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Aug 2005 15:15:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/xml-rpc-php-command-execution/m-p/498364#M100053</guid>
      <dc:creator>jdal</dc:creator>
      <dc:date>2005-08-23T15:15:25Z</dc:date>
    </item>
  </channel>
</rss>

