""ET WEB_SPECIFIC_APPS Gitlab Account Takeover Attempt (CVE-2023-7028)""

SID: 2050097

Revision: 1

Class Type: attempted-admin

Metadata: affected_product Web_Server_Applications, attack_target Web_Server, created_at 2024_01_16, cve CVE_2023_7028, deployment Perimeter, deployment Internal, deployment SSLDecrypt, performance_impact Low, confidence High, signature_severity Major, updated_at 2024_01_16

Reference:

  • cve

  • 2023-7028

Protocol: tcp

Source Network: $EXTERNAL_NET

Source Port: any

Destination Network: $HOME_NET

Destination Port: $HTTP_PORTS

Flow: established,to_server

Contents:

  • Value: "POST"

  • Value: "/users/password"

  • Value: "authenticity_token|3d|" Depth: 19

  • Value: "&user%5Bemail%5D%5B%5D|3d|"

  • Value: "&user%5Bemail%5D%5B%5D|3d|"

Within: 100

PCRE: "/authenticity_token\x3d[A-Za-z0-9_]{86}/P"

Special Options:

  • http_method

  • http_uri

  • http_client_body

  • http_client_body

  • nocase

  • fast_pattern

  • http_client_body

source