Zimbra Collaboration Suite Email Server Unauthenticated RCE
Detects an attempt to leverage the vulnerable servlet "mboximport" for an unauthenticated remote command injection
Sigma rule (View on GitHub)
1title: Zimbra Collaboration Suite Email Server Unauthenticated RCE
2id: dd218fb6-4d02-42dc-85f0-a0a376072efd
3status: test
4description: Detects an attempt to leverage the vulnerable servlet "mboximport" for an unauthenticated remote command injection
5references:
6 - https://www.volexity.com/blog/2022/08/10/mass-exploitation-of-unauthenticated-zimbra-rce-cve-2022-27925/
7 - https://www.yang99.top/index.php/archives/82/
8 - https://github.com/vnhacker1337/CVE-2022-27925-PoC
9author: '@gott_cyber'
10date: 2022-08-17
11modified: 2023-01-02
12tags:
13 - attack.initial-access
14 - attack.t1190
15 - cve.2022-27925
16 - detection.emerging-threats
17logsource:
18 category: webserver
19detection:
20 selection_servlet:
21 cs-method: 'POST'
22 cs-uri-query|contains: '/service/extension/backup/mboximport\?'
23 cs-uri-query|contains|all:
24 - 'account-name'
25 - 'ow'
26 - 'no-switch'
27 - 'append'
28 sc-status:
29 - 401
30 - 200
31 selection_shell:
32 cs-uri-query|contains: '/zimbraAdmin/'
33 cs-uri-query|endswith: '.jsp'
34 sc-status|contains: '200'
35 condition: 1 of selection_*
36falsepositives:
37 - Unknown
38level: medium
References
Related rules
- ADSelfService Exploitation
- Apache Spark Shell Command Injection - Weblogs
- Arcadyan Router Exploitations
- Atlassian Bitbucket Command Injection Via Archive API
- CVE-2010-5278 Exploitation Attempt