""ET EXPLOIT Possible Apache log4j RCE Attempt - HTTP URI Obfuscation (CVE-2021-44228) (Inbound)""
SID: 2037046
Revision: 1
Class Type: attempted-admin
Metadata: affected_product HTTP_Server, attack_target Server, created_at 2022_06_21, cve CVE_2021_44228, deployment Perimeter, signature_severity Major, updated_at 2022_06_21
Reference:
-
cve
-
2021-44228
Protocol: tcp
Source Network: $EXTERNAL_NET
Source Port: any
Destination Network: [$HOME_NET,$HTTP_SERVERS]
Destination Port: any
Flow: established,to_server
Contents:
-
Value: "GET|20 2f|" Depth: 5
-
Value: "|28 27 24 7b 24 7b|env|3a|"
-
Value: "|3a 2d|j|7d|ndi|24 7b|env|3a|"
-
Value: "|2f|TomcatBypass|2f|Command|2f|Base64|2f|"
Within:
PCRE:
Special Options:
- fast_pattern