""ET WEB_SPECIFIC_APPS Jenkins Chained Exploits CVE-2018-1000861 and CVE-2019-1003000 M1""

SID: 2027349

Revision: 3

Class Type: web-application-attack

Metadata: attack_target Server, created_at 2019_05_10, cve CVE_2018_100086, deployment Perimeter, performance_impact Low, signature_severity Major, updated_at 2019_08_19

Reference:

Protocol: tcp

Source Network: $EXTERNAL_NET

Source Port: any

Destination Network: $HTTP_SERVERS

Destination Port: $HTTP_PORTS

Flow: established,to_server

Contents:

  • Value: "GET" Depth: 3

  • Value: "/securityRealm/user/" Depth: 20

  • Value: "descriptorByName/"

  • Value: "checkScriptCompile"

  • Value: "value=|40|GrabConfig"

  • Value: "|40|GrabResolver|28|"

  • Value: "|27|http"

  • Value: "|27 29 0a 40|Grab|28|"

  • Value: !"Referer|3a 20|"

Within: 60

PCRE:

Special Options:

  • http_method

  • http_uri

  • fast_pattern

  • http_uri

  • http_uri

  • http_uri

  • http_uri

  • http_uri

  • http_uri

  • http_header

source