""ET EXPLOIT Possible RoundCube Webmail Persistent XSS Attempt (CVE-2023-43770)""
SID: 2051827
Revision: 1
Class Type: attempted-user
Metadata: attack_target Networking_Equipment, created_at 2024_03_28, cve CVE_2023_43770, deployment Perimeter, deployment Internal, signature_severity Major, updated_at 2024_03_28
Reference:
-
cve
-
2023-43770
Protocol: tcp
Source Network: any
Source Port: any
Destination Network: [$SMTP_SERVERS,$HOME_NET]
Destination Port: [25,587]
Flow: established,to_server
Contents:
-
Value: "|0d 0a 0d 0a|"
-
Value: "[]"
Within:
PCRE:
Special Options:
- fast_pattern