""ET EXPLOIT Possible RoundCube Webmail Persistent XSS Attempt (CVE-2023-43770)""

SID: 2051827

Revision: 1

Class Type: attempted-user

Metadata: attack_target Networking_Equipment, created_at 2024_03_28, cve CVE_2023_43770, deployment Perimeter, deployment Internal, signature_severity Major, updated_at 2024_03_28

Reference:

  • cve

  • 2023-43770

Protocol: tcp

Source Network: any

Source Port: any

Destination Network: [$SMTP_SERVERS,$HOME_NET]

Destination Port: [25,587]

Flow: established,to_server

Contents:

  • Value: "|0d 0a 0d 0a|"

  • Value: "[]"

Within:

PCRE:

Special Options:

  • fast_pattern

source