""ET EXPLOIT Possible CVE-2017-12629 RCE Exploit Attempt (HTTP POST)""
SID: 2024884
Revision: 1
Class Type: web-application-attack
Metadata: affected_product Apache_Solr, attack_target Web_Server, created_at 2017_10_20, cve CVE_2017_12629, deployment Datacenter, signature_severity Major, updated_at 2017_10_20
Reference:
Protocol: tcp
Source Network: any
Source Port: any
Destination Network: $HTTP_SERVERS
Destination Port: any
Flow: to_server,established
Contents:
-
Value: "POST" Depth: 4
-
Value: "newcollection/config"
-
Value: "Content-Type|3a 20|application/json"
-
Value: "|0d 0a 0d 0a|"
-
Value: "|22|add-listener|22|"
-
Value: "|22|event|22||3a||22|postCommit|22|"
-
Value: "|22|class|22|"
-
Value: "RunExecutableListener|22||2c|"
-
Value: "|22|exe|22|"
-
Value: "|22|dir|22|"
-
Value: "|22|args|22|"
Within:
PCRE:
Special Options:
- fast_pattern