Potential RCE Exploitation Attempt In NodeJS

Detects process execution related errors in NodeJS. If the exceptions are caused due to user input then they may suggest an RCE vulnerability.

Sigma rule (View on GitHub)

 1title: Potential RCE Exploitation Attempt In NodeJS
 2id: 97661d9d-2beb-4630-b423-68985291a8af
 3status: test
 4description: Detects process execution related errors in NodeJS. If the exceptions are caused due to user input then they may suggest an RCE vulnerability.
 5references:
 6    - https://www.wix.engineering/post/threat-and-vulnerability-hunting-with-application-server-error-logs
 7author: Moti Harmats
 8date: 2023-02-11
 9tags:
10    - attack.initial-access
11    - attack.t1190
12logsource:
13    category: application
14    product: nodejs
15    definition: 'Requirements: application error logs must be collected (with LOG_LEVEL=ERROR and above)'
16detection:
17    keywords:
18        - 'node:child_process'
19    condition: keywords
20falsepositives:
21    - Puppeteer invocation exceptions often contain child_process related errors, that doesn't necessarily mean that the app is vulnerable.
22level: high

References

Related rules

to-top