alert http $EXTERNAL_NET any -> $HTTP_SERVERS any (msg:"ET WEB_SPECIFIC_APPS Jenkins Pre-auth User Information Leakage"; flow:established,to_server; content:"GET"; http_method; depth:3; isdataat:!1,relative; content:"/securityRealm/user/"; http_uri; depth:20; fast_pattern; content:"/search/index?q="; http_uri; distance:0; isdataat:1,relative; http_content_type; content:"application/x-www-form-urlencoded"; http_header_names; content:!"Referer"; metadata: former_category WEB_SPECIFIC_APPS; reference:url,blog.orange.tw/2019/01/hacking-jenkins-part-1-play-with-dynamic-routing.html; reference:url,github.com/rapid7/metasploit-framework/pull/11466; classtype:web-application-attack; sid:2027348; rev:2; metadata:attack_target Server, deployment Perimeter, signature_severity Minor, created_at 2019_05_10, performance_impact Low, updated_at 2019_05_10;)

Added 2019-05-10 18:15:58 UTC


Topic revision: r1 - 2019-05-10 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats