""ET EXPLOIT Oracle Coherence Deserialization RCE (CVE-2020-2555)""

SID: 2034780

Revision: 1

Class Type: attempted-admin

Metadata: attack_target Server, created_at 2021_12_20, cve CVE_2020_2555, deployment Perimeter, signature_severity Major, updated_at 2021_12_20

Reference:

  • cve

  • 2020-2555

Protocol: tcp

Source Network: $EXTERNAL_NET

Source Port: any

Destination Network: $HOME_NET

Destination Port: any

Flow: established,to_server

Contents:

  • Value: "|74 33 20 31 32 2e 32 2e 31 0a 41 53 3a 32 35 35|"

  • Value: "javax.management.BadAttributeValueExpException"

  • Value: "weblogic.common.internal.PackageInfo"

Within:

PCRE:

Special Options:

  • nocase

  • fast_pattern

source