Confluence Exploit Activity on Webserver Logs
Detection for Confluence server activity found on webserver logs
Sigma rule (View on GitHub)
1title: Confluence Exploit Activity on Webserver Logs
2id: 646df676-e77e-4021-9127-2156137919ef
3description: Detection for Confluence server activity found on webserver logs
4date: 16/06/2022
5status: experimental
6references:
7 - 'https://www.volexity.com/blog/2022/06/02/zero-day-exploitation-of-atlassian-confluence/'
8 - 'https://www.rapid7.com/blog/post/2022/06/02/active-exploitation-of-confluence-cve-2022-26134/'
9tags:
10 - attack.t1190
11author: System-41
12logsource:
13 category: webserver
14detection:
15 mal_request:
16 cs-method: 'GET'
17 c-uri|contains:
18 - '/%24%7B%40java.lang.Runtime%40getRuntime%28%29.exec%28%22'
19 - '${@java.lang.Runtime().exec('
20 - '${@java'
21 - '${'
22 condition : mal_request
23falsepositives: unknown
24level: high