""ET EXPLOIT OpenMRS Deserialization Vulnerability CVE-2018-19276 M2""

SID: 2031259

Revision: 3

Class Type: attempted-admin

Metadata: affected_product Web_Server_Applications, attack_target Server, created_at 2020_12_04, cve CVE_2018_19276, deployment Perimeter, signature_severity Major, updated_at 2022_05_03, reviewed_at 2024_05_06

Reference:

  • cve

  • 2018-19276

Protocol: tcp

Source Network: $EXTERNAL_NET

Source Port: $HTTP_PORTS

Destination Network: $HOME_NET

Destination Port: any

Flow: established,to_server

Contents:

  • Value: "POST"

  • Value: ""

  • Value: ""

  • Value: ""

  • Value: ""

  • Value: "com.sun.xml.internal.bind.v2.runtime.unmarshaller.Base64Data"

Within:

PCRE:

Special Options:

  • http_method

  • http_client_body

  • http_client_body

  • http_client_body

  • http_client_body

  • http_client_body

  • fast_pattern

source