""ET EXPLOIT Local File Inclusion with Shell Execution via proc/self/environ""
SID: 2036730
Revision: 1
Class Type: web-application-attack
Metadata: attack_target Web_Server, created_at 2022_05_31, deployment Perimeter, deployment SSLDecrypt, signature_severity Major, updated_at 2022_05_31
Reference:
Protocol: tcp
Source Network: any
Source Port: any
Destination Network: [$HOME_NET,$HTTP_SERVERS]
Destination Port: any
Flow: established,to_server
Contents:
-
Value: "?"
-
Value: "="
-
Value: "/proc/self/environ"
Within:
PCRE: "/(?:\x2e|%2e)(?:\x2e|%2e)(?:\x2f|%2f)/Ii"
Special Options:
-
http_uri
-
http_uri
-
http_uri
-
nocase
-
fast_pattern