alert http $EXTERNAL_NET any -> $HOME_NET any (msg:"ET WEB_SPECIFIC_APPS Cisco Prime Infrastruture RCE - CVE-2019-1821"; content:"POST"; http_method; content:"/servlet/UploadServlet"; http_uri; depth:22; isdataat:!1,relative; fast_pattern; content:"Destination-Dir|3a 20|tftpRoot"; http_header; content:"Content-Type|3a 20|multipart/form-data|3b|"; http_header; content:"String(|22|/bin/"; http_client_body; content:"new Socket(|22|"; http_client_body; distance:0; content:"Runtime.getRuntime().exec("; http_client_body; distance:0; http_header_names; content:!"Referer"; metadata: former_category WEB_SPECIFIC_APPS; reference:url,srcincite.io/blog/2019/05/17/panic-at-the-cisco-unauthenticated-rce-in-prime-infrastructure.html; reference:url,https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-pi-rce; classtype:web-application-attack; sid:2027368; rev:2; metadata:attack_target Server, deployment Perimeter, deployment Datacenter, cve 2019_1821, signature_severity Major, created_at 2019_05_20, performance_impact Low, updated_at 2019_05_20;)

Added 2019-05-20 20:16:04 UTC


Topic revision: r1 - 2019-05-21 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats