alert http $EXTERNAL_NET any -> $HTTP_SERVERS any (msg:"ET EXPLOIT Apache Struts Possible OGNL Java Exec In URI M2"; flow:to_server,established; content:"java.lang.Runtime|25|40getRuntime().exec("; http_uri; nocase; metadata: former_category EXPLOIT; classtype:attempted-user; sid:2026024; rev:1; metadata:affected_product Web_Server_Applications, attack_target Web_Server, deployment Perimeter, signature_severity Major, created_at 2018_08_23, updated_at 2018_08_23;)

Added 2018-09-13 19:55:07 UTC


Added 2018-09-13 18:02:25 UTC


alert http $EXTERNAL_NET any -> $HTTP_SERVERS any (msg:"ET EXPLOIT Apache Struts Possible OGNL Java Exec In URI M2"; flow:to_server,established; content:"java.lang.Runtime|25|40getRuntime().exec("; http_uri; nocase; metadata: former_category EXPLOIT; classtype:attempted-user; sid:2026024; rev:1; metadata:affected_product Web_Server_Applications, attack_target Web_Server, deployment Perimeter, signature_severity Major, created_at 2018_08_23, updated_at 2018_08_23;)

Added 2018-08-23 18:13:08 UTC


Topic revision: r1 - 2018-09-13 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats