""ET EXPLOIT Apache2 Memory Corruption Inbound (CVE-2020-9490)""

SID: 2030830

Revision: 2

Class Type: attempted-admin

Metadata: created_at 2020_09_03, cve CVE_2020_9490, deployment Perimeter, deployment SSLDecrypt, confidence Medium, signature_severity Major, updated_at 2020_09_03

Reference:

  • cve

  • 2020-9490

Protocol: tcp

Source Network: any

Source Port: any

Destination Network: [$HTTP_SERVERS,$HOME_NET]

Destination Port: $HTTP_PORTS

Flow: established,to_server

Contents:

  • Value: "GET"

  • Value: "Cache-Digest|3a 20|EA"

Within:

PCRE: "/^(?:8=|9BQQ==)\r?\n?/R"

Special Options:

  • http_method

  • http_header

  • fast_pattern

source