SigmaHQ/rules/web/web_cve_2020_0688_msexchange.yml

30 lines
783 B
YAML
Raw Normal View History

title: CVE-2020-0688 Exchange Exploitation via Web Log
id: fce2c2e2-0fb5-41ab-a14c-5391e1fd70a5
status: experimental
description: Detects the exploitation of Microsoft Exchange vulnerability as described in CVE-2020-0688
references:
- https://www.trustedsec.com/blog/detecting-cve-20200688-remote-code-execution-vulnerability-on-microsoft-exchange-server/
author: Florian Roth
date: 2020/02/29
logsource:
category: webserver
detection:
2020-02-29 14:51:00 +00:00
selection1:
cs-method: 'GET'
c-uri|contains:
- '/ecp/'
- '/owa/'
2020-02-29 14:51:00 +00:00
selection2:
c-uri|contains: '__VIEWSTATE='
2020-02-29 14:51:00 +00:00
condition: selection1 and selection2
fields:
- c-ip
- c-dns
falsepositives:
- Unknown
tags:
- attack.initial_access
- attack.t1190
level: critical