CVE-2010-2545 PUBLISHED

## Snort IDS/IPS Mitigation Rule **Emerging Threats Rule SID 2011423 (rev 2)** ```snort alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET WEB_SPECIFIC_APPS Cacti cacti/utilities.php Cross Site Scripting Attempt"; flow:established,to_server; content:"/cacti/utilities.php"; http_uri; nocase; content:"tail_lines="; http_uri; nocase; content:"message_type="; http_uri; nocase; content:"filter="; http_uri; nocase; pcre:"/filter\x3D.+(script|alert|onmouse[a-z]+|onkey[a-z]+|onload|onunload|ondragdrop|onblur|onfocus|onclick|ondblclick|onsubmit|onreset|onselect|onchange)/Ui"; reference:bid,42575; reference:cve,2010-2544; reference:cve,2010-2545; classtype:web-application-attack; sid:2011423; rev:2; metadata:affected_product Web_Server_Applications, attack_target Web_Server, created_at 2010_09_28, cve CVE_2010_2544, deployment Datacenter, signature_severity Major, tag XSS, tag Cross_Site_Scripting, updated_at 2019_08_22;) ``` ### Implementation Steps 1. Deploy this rule to your Snort/Suricata IDS/IPS sensors 2. Ensure the rule is enabled in your sensor configuration 3. Monitor for alerts matching SID 2011423 4. For IPS mode, consider changing action from `alert` to `drop` **Classification:** web-application-attack **Severity:** Major

EPSS 1.80% · 82.7th percentile

Risk Scores

EPSS Score
1.80%
82.7th percentile

Timeline

References

Open in Interactive Console →