""ET WEB_SERVER Possible Apache Struts OGNL in Dynamic Action""
SID: 2017277
Revision: 3
Class Type: attempted-user
Metadata: created_at 2013_08_06, cve CVE_2013_2135, updated_at 2013_08_07
Reference:
Protocol: tcp
Source Network: $EXTERNAL_NET
Source Port: any
Destination Network: $HTTP_SERVERS
Destination Port: $HTTP_PORTS
Flow: established,to_server
Contents:
- Value: "/${"
Within:
PCRE: "/\/\${[^}\x2c]+?=/U"
Special Options:
- http_uri