CVE-2010-2545
PUBLISHED
## Snort IDS/IPS Mitigation Rule
**Emerging Threats Rule SID 2011423 (rev 2)**
```snort
alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET WEB_SPECIFIC_APPS Cacti cacti/utilities.php Cross Site Scripting Attempt"; flow:established,to_server; content:"/cacti/utilities.php"; http_uri; nocase; content:"tail_lines="; http_uri; nocase; content:"message_type="; http_uri; nocase; content:"filter="; http_uri; nocase; pcre:"/filter\x3D.+(script|alert|onmouse[a-z]+|onkey[a-z]+|onload|onunload|ondragdrop|onblur|onfocus|onclick|ondblclick|onsubmit|onreset|onselect|onchange)/Ui"; reference:bid,42575; reference:cve,2010-2544; reference:cve,2010-2545; classtype:web-application-attack; sid:2011423; rev:2; metadata:affected_product Web_Server_Applications, attack_target Web_Server, created_at 2010_09_28, cve CVE_2010_2544, deployment Datacenter, signature_severity Major, tag XSS, tag Cross_Site_Scripting, updated_at 2019_08_22;)
```
### Implementation Steps
1. Deploy this rule to your Snort/Suricata IDS/IPS sensors
2. Ensure the rule is enabled in your sensor configuration
3. Monitor for alerts matching SID 2011423
4. For IPS mode, consider changing action from `alert` to `drop`
**Classification:** web-application-attack
**Severity:** Major
EPSS 1.80% · 82.7th percentile