SigmaHQ/rules/web/web_cve_2021_2109_weblogic_rce_exploit.yml
2021-08-24 09:35:04 +02:00

30 lines
807 B
YAML

title: Oracle WebLogic Exploit CVE-2021-2109
id: 687f6504-7f44-4549-91fc-f07bab065821
status: experimental
description: Detects the exploitation of the WebLogic server vulnerability described in CVE-2021-2109
author: Bhabesh Raj
date: 2021/01/20
references:
- https://twitter.com/pyn3rd/status/1351696768065409026
- https://mp.weixin.qq.com/s/wX9TMXl1KVWwB_k6EZOklw
- https://nvd.nist.gov/vuln/detail/cve-2021-2109
logsource:
category: webserver
detection:
selection:
cs-method: 'GET'
c-uri|contains|all:
- 'com.bea.console.handles.JndiBindingHandle'
- 'ldap://'
- 'AdminServer'
condition: selection
fields:
- c-ip
- c-dns
falsepositives:
- Unknown
level: critical
tags:
- attack.t1190
- attack.initial_access