alert http any any -> $HOME_NET any (msg:"ET EXPLOIT Tomcat File Upload Payload Request (CVE-2017-12615)"; flow:to_server,established; content:"GET"; http_method; content:".jsp?wiew="; http_uri; fast_pattern; content:"&os="; http_uri; distance:0; content:"&address="; http_uri; distance:0; metadata: former_category EXPLOIT; reference:cve,2017-12615; reference:url,forums.juniper.net/t5/Threat-Research/Anatomy-of-the-Bulehero-Cryptomining-Botnet/ba-p/458787; classtype:attempted-user; sid:2027517; rev:1; metadata:deployment Perimeter, signature_severity Major, created_at 2019_06_26, performance_impact Moderate, updated_at 2019_06_26;)

Added 2019-06-26 19:54:25 UTC


Topic revision: r1 - 2019-06-26 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats