""ET EXPLOIT Possible CVE-2017-12629 RCE Exploit Attempt (HTTP POST)""

SID: 2024884

Revision: 1

Class Type: web-application-attack

Metadata: affected_product Apache_Solr, attack_target Web_Server, created_at 2017_10_20, cve CVE_2017_12629, deployment Datacenter, signature_severity Major, updated_at 2017_10_20

Reference:

Protocol: tcp

Source Network: any

Source Port: any

Destination Network: $HTTP_SERVERS

Destination Port: any

Flow: to_server,established

Contents:

  • Value: "POST" Depth: 4

  • Value: "newcollection/config"

  • Value: "Content-Type|3a 20|application/json"

  • Value: "|0d 0a 0d 0a|"

  • Value: "|22|add-listener|22|"

  • Value: "|22|event|22||3a||22|postCommit|22|"

  • Value: "|22|class|22|"

  • Value: "RunExecutableListener|22||2c|"

  • Value: "|22|exe|22|"

  • Value: "|22|dir|22|"

  • Value: "|22|args|22|"

Within:

PCRE:

Special Options:

  • fast_pattern

source