forked from SigmaHQ/sigma
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request SigmaHQ#2274 from SigmaHQ/rule-devel
rule: SiteCore PreAuth RCE, Winrar; fix: FPs
- Loading branch information
Showing
8 changed files
with
93 additions
and
11 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,23 @@ | ||
title: Sitecore Pre-Auth RCE CVE-2021-42237 | ||
id: 20c6ed1c-f7f0-4ea3-aa65-4f198e6acb0f | ||
status: experimental | ||
description: Detects exploitation attempts of Sitecore Experience Platform Pre-Auth RCE CVE-2021-42237 found in Report.ashx | ||
author: Florian Roth | ||
date: 2021/11/17 | ||
references: | ||
- https://blog.assetnote.io/2021/11/02/sitecore-rce/ | ||
- https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1000776 | ||
tags: | ||
- attack.initial_access | ||
- attack.t1190 | ||
logsource: | ||
category: webserver | ||
detection: | ||
selection: | ||
cs-method: 'POST' | ||
c-uri|contains: '/sitecore/shell/ClientBin/Reporting/Report.ashx' | ||
sc-status: 200 | ||
condition: selection | ||
falsepositives: | ||
- Vulnerability Scanning/Pentesting | ||
level: high |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,19 @@ | ||
title: Possible Exploitation of Exchange RCE CVE-2021-42321 | ||
id: c92f1896-d1d2-43c3-92d5-7a5b35c217bb | ||
status: experimental | ||
description: Detects log entries that appear in exploitation attempts against MS Exchange RCE CVE-2021-42321 | ||
references: | ||
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-42321 | ||
author: 'Florian Roth, @testanull' | ||
date: 2021/11/18 | ||
logsource: | ||
product: windows | ||
service: msexchange-management | ||
detection: | ||
EventID: 6 | ||
keywords: | ||
- 'Cmdlet failed. Cmdlet Get-App, ' | ||
condition: keywords | ||
falsepositives: | ||
- Unknown, please report false positives via https://github.com/SigmaHQ/sigma/issues | ||
level: critical |
28 changes: 28 additions & 0 deletions
28
rules/windows/process_creation/win_susp_winrar_execution.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,28 @@ | ||
title: Winrar Execution in Non-Standard Folder | ||
id: 4ede543c-e098-43d9-a28f-dd784a13132f | ||
status: experimental | ||
description: Detects a suspicious winrar execution in a folder which is not the default installation folder | ||
references: | ||
- https://twitter.com/cyb3rops/status/1460978167628406785 | ||
author: Florian Roth, Tigzy | ||
date: 2021/11/17 | ||
tags: | ||
- attack.collection | ||
- attack.t1560.001 | ||
- attack.exfiltration # an old one | ||
- attack.t1002 # an old one | ||
logsource: | ||
category: process_creation | ||
product: windows | ||
detection: | ||
selection: | ||
- Image|endswith: | ||
- '\rar.exe' | ||
- '\winrar.exe' | ||
- Description: 'Command line RAR' | ||
filter: | ||
Image|contains: '\WinRAR' | ||
condition: selection and not filter | ||
falsepositives: | ||
- Legitimate use of WinRAR in a folder of a software that bundles WinRAR | ||
level: high |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters