""ET EXPLOIT Possible Oracle WebLogic CVE-2020-2551 Scanning""

SID: 2030128

Revision: 2

Class Type: attempted-admin

Metadata: attack_target Server, created_at 2020_05_08, cve CVE_2020_2551, deployment Perimeter, performance_impact Low, signature_severity Major, updated_at 2020_05_08

Reference:

Protocol: tcp

Source Network: $EXTERNAL_NET

Source Port: any

Destination Network: $HTTP_SERVERS

Destination Port: any

Flow: established,to_server

Contents:

  • Value: "|47 49 4f 50 01 02 00 03 00 00 00 17 00 00 00 02 00 00 00 00 00 00 00 0b 4e 61 6d 65 53 65 72 76 69 63 65|" Depth: 35

Within:

PCRE:

Special Options:

  • fast_pattern

source