""ET WEB_SPECIFIC_APPS Nagios XI Network Monitor - OS Command Injection""
SID: 2016015
Revision: 2
Class Type: attempted-user
Metadata: created_at 2012_12_04, updated_at 2012_12_08, mitre_tactic_id TA0008, mitre_tactic_name Lateral_Movement, mitre_technique_id T1210, mitre_technique_name Exploitation_Of_Remote_Services
Reference:
Protocol: tcp
Source Network: $EXTERNAL_NET
Source Port: any
Destination Network: $HOME_NET
Destination Port: $HTTP_PORTS
Flow: to_server,established
Contents:
- Value: "/nagiosxi/includes/components/graphexplorer/visApi.php?"
Within:
PCRE: "/(\?|&)(host|service|opt|end|start)=[^&]+?\x60.+?\x60/Ui"
Special Options:
- http_uri