""ET EXPLOIT Possible CVE-2017-12629 XXE Exploit Attempt (URI)""
SID: 2024885
Revision: 1
Class Type: web-application-attack
Metadata: affected_product Apache_Solr, attack_target Web_Server, created_at 2017_10_20, cve CVE_2017_12629, deployment Datacenter, signature_severity Major, updated_at 2017_10_20
Reference:
Protocol: tcp
Source Network: any
Source Port: any
Destination Network: $HTTP_SERVERS
Destination Port: any
Flow: to_server,established
Contents:
-
Value: "GET" Depth: 3
-
Value: "?q=|7b 21|xmlparser"
-
Value: "|21|DOCTYPE"
Within:
PCRE: "/^(?:(?!\x0d\x0a).)+\x22(?:https?|file):\x2f\x2f/R"
Special Options:
-
nocase
-
fast_pattern