alert http $EXTERNAL_NET any -> $HTTP_SERVERS any (msg:"ET WEB_SPECIFIC_APPS Jenkins Chained Exploits CVE-2018-1000861 and CVE-2019-1003000 M2"; flow:established,to_server; content:"GET"; http_method; depth:3; content:"/securityRealm/user/"; http_uri; depth:20; fast_pattern; content:"descriptorByName/"; http_uri; distance:0; content:"checkScript"; http_uri; distance:0; content:"|40|ASTTest"; http_uri; distance:0; content:"Runtime|2e|getRuntime|28 29 2e|exec|28 22|"; http_uri; distance:0; content:"|22 29 7d 29 0a|"; http_uri; distance:0; http_header_names; content:!"Referer"; metadata: former_category WEB_SPECIFIC_APPS; reference:cve,2018-1000861; reference:cve,2019-1003000; reference:url,blog.orange.tw/2019/02/abusing-meta-programming-for-unauthenticated-rce.html; reference:url,blog.orange.tw/2019/01/hacking-jenkins-part-1-play-with-dynamic-routing.html; classtype:web-application-attack; sid:2027350; rev:2; metadata:attack_target Server, deployment Perimeter, signature_severity Major, created_at 2019_05_10, performance_impact Low, updated_at 2019_05_10;)

Added 2019-05-10 18:15:58 UTC


Topic revision: r1 - 2019-05-10 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats