""ET EXPLOIT CVE-2024-25600 Bricks Exploitation Attempt""

SID: 2051020

Revision: 2

Class Type: misc-attack

Metadata: affected_product Wordpress_Plugins, attack_target Client_Endpoint, tls_state TLSEncrypt, created_at 2024_02_21, cve CVE_2024_25600, deployment Perimeter, deployment SSLDecrypt, confidence Medium, tag Wordpress, updated_at 2024_02_22, reviewed_at 2024_06_28

Reference:

  • cve

  • 2024-25600

Protocol: tcp

Source Network: $EXTERNAL_NET

Source Port: $HTTP_PORTS

Destination Network: $HOME_NET

Destination Port: any

Flow: established,to_server

Contents:

  • Value: "postId"

  • Value: "nonce"

  • Value: "useQueryEditor"

  • Value: "queryEditor"

  • Value: "POST|20 2f|wp|2d|json|2f|bricks|2f|v1|2f|render|5f|element|20|"

Within:

PCRE:

Special Options:

  • http_client_body

  • http_client_body

  • http_client_body

  • http_client_body

  • fast_pattern

source