Files
blue-team-tools/rules/web/web_java_payload_in_access_logs.yml
T

32 lines
966 B
YAML
Raw Normal View History

2022-06-14 21:58:34 +01:00
title: Java Payload Strings
2022-06-04 08:46:14 +02:00
id: 583aa0a2-30b1-4d62-8bf3-ab73689efe6c
status: experimental
2022-06-14 21:58:34 +01:00
description: Detects possible Java payloads in web access logs
2022-06-04 08:46:14 +02:00
references:
- https://www.rapid7.com/blog/post/2022/06/02/active-exploitation-of-confluence-cve-2022-26134/
- https://www.rapid7.com/blog/post/2021/09/02/active-exploitation-of-confluence-server-cve-2021-26084/
2022-07-11 18:12:51 +01:00
- https://github.com/httpvoid/writeups/blob/62d3751945289d088ccfdf4d0ffbf61598a2cd7d/Confluence-RCE.md
2022-06-04 10:08:49 +02:00
- https://twitter.com/httpvoid0x2f/status/1532924261035384832
2022-10-25 10:08:58 +02:00
author: frack113
date: 2022/06/04
modified: 2022/06/14
tags:
- cve.2022.26134
- cve.2021.26084
2022-06-04 08:46:14 +02:00
logsource:
category: webserver
detection:
keywords:
2022-07-11 18:12:51 +01:00
- '%24%7B%28%23a%3D%40'
- '${(#a=@'
- '%24%7B%40java'
- '${@java'
- 'u0022java'
- '%2F%24%7B%23'
- '/${#'
- 'new+java.'
2022-06-04 08:46:14 +02:00
condition: keywords
falsepositives:
- Legitimate apps
level: high