""ET EXPLOIT Suspected SAP EEM SOLMAN RCE (CVE-2020-6207)""

SID: 2031546

Revision: 2

Class Type: attempted-admin

Metadata: created_at 2021_01_25, cve CVE_2020_6207, updated_at 2021_01_25

Reference:

Protocol: tcp

Source Network: any

Source Port: any

Destination Network: any

Destination Port: $HTTP_PORTS

Flow: established,to_server

Contents:

  • Value: "/EemAdminService/EemAdmin" Depth: 25

  • Value: "getruntime|28 29 2e|exec"

  • Value: "processbuilder|28|"

Within:

PCRE:

Special Options:

  • fast_pattern

  • http_uri

  • nocase

  • http_client_body

  • nocase

  • http_client_body

source