""ET EXPLOIT [FIREEYE] Suspicious Pulse Secure HTTP Request (CVE-2021-22893) M1""

SID: 2032904

Revision: 1

Class Type: attempted-admin

Metadata: affected_product Pulse_Secure, attack_target Server, created_at 2021_05_05, cve CVE_2021_22893, deployment Perimeter, deployment SSLDecrypt, performance_impact Low, signature_severity Major, updated_at 2021_05_05

Reference:

  • cve

  • 2021-22893

Protocol: tcp

Source Network: any

Source Port: any

Destination Network: [$HOME_NET,$HTTP_SERVERS]

Destination Port: any

Flow: established,to_server

Contents:

  • Value: "/dana" Depth: 7

  • Value: !"welcome.cgi"

Within:

PCRE: "/\/dana\S{0,7}\/(?:meeting|fb\/smb|namedusers|metric)/Ui"

Special Options:

  • fast_pattern

  • http_uri

  • http_uri

source