[Snort-sigs] Fw: CVE-2017-6316 Signature

Tyler Montier tmontier at sourcefire.com
Mon Jul 31 09:27:35 EDT 2017


Yaser,

Thanks for your submission. We will review the rule and get back to you
when it's finished.

Thanks,

Tyler Montier
Cisco Talos

On Mon, Jul 31, 2017 at 8:29 AM, Y M via Snort-sigs <
snort-sigs at lists.snort.org> wrote:

> Sent these to the old list address.
>
>
> Hello.
>
>
> Below signature is derived from the references available within the
> signature. May be split the signature into two, one for CloudBridge and the
> other for the SDN version? No pcap is available, sorry.
>
>
> alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-OTHER
> Citrix NetScaler CloudBridge/SD-WN session cookie privilege escalation
> attempt"; flow:to_server; content:"POST"; http_method;
> content:"/global_data/"; fast_pattern:only; http_uri; pcre:"/Cookie\x3a\x20(
> CGISESSID|CAKEPHP)\x3d[a-f0-9]{32}\x60/H"; reference:cve,2017-6316;
> reference:url,support.citrix.com/article/CTX225990; reference:url,
> vuldb.com/?id.104319; reference:url,www.exploit-db.com/exploits/42345/;
> metadata:ruleset community, service http; classtype:attempted-admin;
> sid:110001; rev:1;)
>
>
> Thanks.
>
> YM
>
> _______________________________________________
> Snort-sigs mailing list
> Snort-sigs at lists.snort.org
> https://lists.snort.org/mailman/listinfo/snort-sigs
>
> http://www.snort.org
>
> Please visit http://blog.snort.org for the latest news about Snort!
>
> Visit the Snort.org to subscribe to the official Snort ruleset, make sure
> to stay up to date to catch the most <a href="
> https://snort.org/downloads/#rule-downloads">emerging threats</a>!
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.snort.org/pipermail/snort-sigs/attachments/20170731/90cbc5fc/attachment.html>


More information about the Snort-sigs mailing list