""ET EXPLOIT Possible Apache Text4shell RCE Attempt Script Prefix (CVE-2022-42889) (Outbound)""

SID: 2039465

Revision: 2

Class Type: attempted-admin

Metadata: affected_product Apache_HTTP_server, attack_target Web_Server, created_at 2022_10_19, cve CVE_2022_42889, deployment Perimeter, deployment SSLDecrypt, confidence Medium, signature_severity Major, updated_at 2022_10_24

Reference:

Protocol: tcp

Source Network: $HOME_NET

Source Port: any

Destination Network: any

Destination Port: $HTTP_PORTS

Flow: established,to_server

Contents:

  • Value: "|3d 24 7b|script|3a|javascript|3a|java|2e|lang|2e|Runtime|2e|getRuntime|28 29 2e|exec|28|"

  • Value: "|7d|"

Within:

PCRE:

Special Options:

  • http_uri

  • fast_pattern

  • http_uri

source