""ET WEB_SPECIFIC_APPS SonicWALL SonicOS searchStr XML Tag Script Insertion Attempt""

SID: 2016086

Revision: 1

Class Type: web-application-attack

Metadata: created_at 2012_12_21, updated_at 2012_12_21

Reference:

Protocol: tcp

Source Network: $EXTERNAL_NET

Source Port: any

Destination Network: $HTTP_SERVERS

Destination Port: $HTTP_PORTS

Flow: established,to_server

Contents:

  • Value: "POST"

  • Value: "dbInfo"

  • Value: "dbInfoRequest"

  • Value: "searchStr"

Within:

PCRE: "/(\x3c|\x253c)dbInfo(\x3e|\x253e)[\r\n\s]*?(\x3c|\x253c)dbInfoRequest(\x3e|\x253e).+?(\x3c|\x253c)searchStr(\x3e|\x253e)((?!(\x3c|\x253c)(\/|\x252f)searchStr(\x3e|\x253e)).)+?(?:on(?:(?:s(?:elec|ubmi)|rese)t|d(?:blclick|ragdrop)|(?:mouse|key)[a-z]|c(?:hange|lick)|(?:un)?load|focus|blur)|s(?:cript|tyle=)).+?(\x3c|\x253c)(\/|\x252f)searchStr(\x3e|\x253e)/Psi"

Special Options:

  • http_method

  • nocase

  • http_client_body

  • nocase

  • http_client_body

  • nocase

  • http_client_body

source