SigmaHQ/rules/web/web_cve_2021_33766_msexchange_proxytoken.yml
Florian Roth af9392ba0f
refactor: add 500 status code in selection2
to avoid FPs with exploitation attempts
2021-08-30 16:12:42 +02:00

33 lines
942 B
YAML

title: CVE-2021-33766 Exchange ProxyToken Exploitation
id: 56973b50-3382-4b56-bdf5-f51a3183797a
status: experimental
description: Detects the exploitation of Microsoft Exchange ProxyToken vulnerability as described in CVE-2021-33766
author: Florian Roth, Max Altgelt, Christian Burkard
date: 2021/08/30
references:
- https://www.zerodayinitiative.com/blog/2021/8/30/proxytoken-an-authentication-bypass-in-microsoft-exchange-server
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection1:
cs-method: 'POST'
c-uri|contains|all:
- '/ecp/'
- '/RulesEditor/InboxRules.svc/NewObject'
sc-status: 500
selection2:
c-uri|contains|all:
- 'SecurityToken='
- '/ecp/'
sc-status: 500
condition: selection1 or selection2
fields:
- c-ip
- c-dns
falsepositives:
- Unknown
level: critical