""ET EXPLOIT [FIREEYE] Suspicious Pulse Secure HTTP Request (CVE-2021-22893) M2""

SID: 2032905

Revision: 2

Class Type: attempted-admin

Metadata: affected_product Pulse_Secure, attack_target Networking_Equipment, created_at 2021_05_05, cve CVE_2021_22893, deployment Perimeter, deployment SSLDecrypt, performance_impact Low, signature_severity Major, updated_at 2021_05_05

Reference:

  • cve

  • 2021-22893

Protocol: tcp

Source Network: any

Source Port: any

Destination Network: [$HOME_NET,$HTTP_SERVERS]

Destination Port: any

Flow: established,to_server

Contents:

  • Value: "/home/webserver/htdocs/dana-na/"

  • Value: "/dana-na/" Depth: 11

  • Value: "cat%20/home/webserver/htdocs/dana-na/"

  • Value: !"welcome.cgi"

Within: 100

PCRE:

Special Options:

  • http_uri

  • http_raw_uri

  • nocase

  • http_raw_uri

source