Rejetto HTTP File Server RCE
Detects attempts to exploit a Rejetto HTTP File Server (HFS) via CVE-2014-6287
Sigma rule (View on GitHub)
1title: Rejetto HTTP File Server RCE
2id: a133193c-2daa-4a29-8022-018695fcf0ae
3status: test
4description: Detects attempts to exploit a Rejetto HTTP File Server (HFS) via CVE-2014-6287
5references:
6 - https://vk9-sec.com/hfs-code-execution-cve-2014-6287/
7 - https://www.exploit-db.com/exploits/39161
8 - https://github.com/Twigonometry/Cybersecurity-Notes/blob/c875b0f52df7d2c7a870e75e1f0c2679d417931d/Writeups/Hack%20the%20Box/Boxes/Optimum/10%20-%20Website.md
9author: Nasreddine Bencherchali (Nextron Systems)
10date: 2022-07-19
11modified: 2023-01-02
12tags:
13 - attack.persistence
14 - attack.initial-access
15 - attack.t1190
16 - attack.t1505.003
17 - cve.2014-6287
18 - detection.emerging-threats
19logsource:
20 category: webserver
21detection:
22 selection_search:
23 cs-uri-query|contains: '?search=%00{.'
24 selection_payload:
25 cs-uri-query|contains:
26 - 'save|' # Indication of saving a file which shouldn't be tested by vuln scanners
27 - 'powershell'
28 - 'cmd.exe'
29 - 'cmd /c'
30 - 'cmd /r'
31 - 'cmd /k'
32 - 'cscript'
33 - 'wscript'
34 - 'python'
35 - 'C:\Users\Public\'
36 - '%comspec%'
37 condition: all of selection_*
38falsepositives:
39 - Unknown
40level: high
References
Related rules
- Potential SAP NetViewer Webshell Command Execution
- CVE-2021-40539 Zoho ManageEngine ADSelfService Plus Exploit
- Oracle WebLogic Exploit
- Potential SAP NetWeaver Webshell Creation
- Potential SAP NetWeaver Webshell Creation - Linux