Gents:
I believe I have a signature worked out for the nasty PHP-CGI bug. (CVE-2012-1823)
The vulnerability is executed by using arguments in the URL of PHP scripts. (Example: http://www.facebook.com/?-s would show you the source code if it was vulnerable. Facebook has since fixed it and planted a nice easter egg.)
Cisco has not released an official signature for this yet. This is a custom signature of my own device and I make no claims or waranty of it's fitness.
Start by creating a custom sig:
Signature Type = Vulnerability
Engine Type = Service HTTP
Specify Request Regex = Yes
Request Regex = [\?][\-][acndefhilmrBRFEHTsvwz]
Service Ports = 80 (*note that https urls are encrypted and you wont get any hits by enabling 443)
Set Severity to high and tell it to produce an alert.
Next create and event action filter to remove the produce alert action for threats triggered leaving your network. (we only care about our php installations, not everyone esle's.) Watch it for a few days, if you have no false positives, set it up to drop packets.
Good Luck. Let me know if anyone see's a flaw in this signature design.
Thanks,
Tom T.