[Snort-sigs] CVE-2018-2894

Y M snort at outlook.com
Mon Jul 23 13:45:07 EDT 2018


This a follow up rule for today's submitted rules (multiple signatures 005). Pcap is available.

# --------------------
# Date: 2018-07-23
# Title: CVE-2018-2894
# Reference: https://github.com/LandGrey/CVE-2018-2894
# Tests: pcap
# Notes: The output from PoC indicates non-wroking state
#        but the PoC file was created.

alert tcp $EXTERNAL_NET any -> $HOME_NET 7001 (msg:"SERVER-WEAPP Oracle WebLogic Server unauthenticated compromise attempt"; flow:to_server,established; content:"/ws_utc/css/config/keystore/"; fast_pattern:only; http_uri; content:".jsp"; http_uri; content:"X-Requested-With: XMLHttpRequest"; http_header; content:"Content-Type: application/x-www-form-urlencoded"; http_header; reference:cve,2018-2894; reference:url,www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html; metadata:ruleset community, service http; classtype:attempted-admin; sid:8000201; rev:1;)

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.snort.org/pipermail/snort-sigs/attachments/20180723/8676fa83/attachment.html>

More information about the Snort-sigs mailing list