""ET EXPLOIT Possible Apache Text4shell RCE Attempt URL Prefix (CVE-2022-42889) (Outbound)""

SID: 2039469

Revision: 2

Class Type: attempted-admin

Metadata: affected_product Apache_HTTP_server, attack_target Client_Endpoint, created_at 2022_10_19, cve CVE_2022_42889, deployment Perimeter, deployment SSLDecrypt, confidence Medium, signature_severity Major, updated_at 2022_10_24

Reference:

Protocol: tcp

Source Network: $HOME_NET

Source Port: any

Destination Network: any

Destination Port: any

Flow: established,to_server

Contents:

  • Value: "|3d 24 7b|url|3a|UTF|2d|8|3a|http|3a 2f|"

  • Value: "|7d|"

Within:

PCRE:

Special Options:

  • http_uri

  • fast_pattern

  • http_uri

source