Confluence Exploit Activity on Webserver Logs

Detection for Confluence server activity found on webserver logs

Sigma rule (View on GitHub)

 1title: Confluence Exploit Activity on Webserver Logs
 2id: 646df676-e77e-4021-9127-2156137919ef
 3description: Detection for Confluence server activity found on webserver logs
 4date: 16/06/2022
 5status: experimental
 6references:
 7  - 'https://www.volexity.com/blog/2022/06/02/zero-day-exploitation-of-atlassian-confluence/'
 8  - 'https://www.rapid7.com/blog/post/2022/06/02/active-exploitation-of-confluence-cve-2022-26134/'
 9tags:
10     - attack.t1190
11author: System-41
12logsource:
13  category: webserver
14detection: 
15    mal_request:
16       cs-method: 'GET'
17       c-uri|contains: 
18           - '/%24%7B%40java.lang.Runtime%40getRuntime%28%29.exec%28%22'
19           - '${@java.lang.Runtime().exec('
20           - '${@java'
21           - '${'
22    condition : mal_request
23falsepositives: unknown
24level: high

References

Related rules

to-top