""ET WEB_SPECIFIC_APPS Jenkins Chained Exploits CVE-2018-1000861 and CVE-2019-1003000 M2""

SID: 2027350

Revision: 2

Class Type: web-application-attack

Metadata: attack_target Server, created_at 2019_05_10, cve CVE_2018_100086, deployment Perimeter, performance_impact Low, signature_severity Major, updated_at 2019_05_10

Reference:

Protocol: tcp

Source Network: $EXTERNAL_NET

Source Port: any

Destination Network: $HTTP_SERVERS

Destination Port: $HTTP_PORTS

Flow: established,to_server

Contents:

  • Value: "GET" Depth: 3

  • Value: "/securityRealm/user/" Depth: 20

  • Value: "descriptorByName/"

  • Value: "checkScript"

  • Value: "|40|ASTTest"

  • Value: "Runtime|2e|getRuntime|28 29 2e|exec|28 22|"

  • Value: "|22 29 7d 29 0a|"

  • Value: !"Referer|3a 20|"

Within:

PCRE:

Special Options:

  • http_method

  • http_uri

  • fast_pattern

  • http_uri

  • http_uri

  • http_uri

  • http_uri

  • http_uri

  • http_header

source