Potential CVE-2022-46169 Exploitation Attempt
Detects potential exploitation attempts that target the Cacti Command Injection CVE-2022-46169
Sigma rule (View on GitHub)
1title: Potential CVE-2022-46169 Exploitation Attempt
2id: 738cb115-881f-4df3-82cc-56ab02fc5192
3status: test
4description: Detects potential exploitation attempts that target the Cacti Command Injection CVE-2022-46169
5references:
6 - https://github.com/0xf4n9x/CVE-2022-46169
7 - https://github.com/Cacti/cacti/security/advisories/GHSA-6p93-p743-35gf
8 - https://github.com/rapid7/metasploit-framework/pull/17407
9author: Nasreddine Bencherchali (Nextron Systems)
10date: 2022-12-27
11modified: 2023-01-02
12tags:
13 - attack.initial-access
14 - attack.t1190
15 - cve.2022-46169
16 - detection.emerging-threats
17logsource:
18 category: webserver
19detection:
20 selection:
21 # Check for the presence of the X-FORWARDED-FOR header pointing to the hostname of the server running Cacti (which indicate auth bypass)
22 # Check for previous requests indicating the bruteforce of the "local_data_ids" and "host_id"
23 cs-method: 'GET'
24 cs-uri-query|contains|all:
25 - '/remote_agent.php'
26 - 'action=polldata'
27 - 'poller_id='
28 cs-uri-query|contains:
29 # From https://github.com/rapid7/metasploit-framework/pull/17407/files#diff-972a47250ccd30b935a59e8871134956a15980df5b29f9d970414646704d5258R288
30 # Not tested could be shown in other format (update if you have more info)
31 - '| base64 -d | /bin/bash`'
32 - '%7C%20base64%20-d%20%7C%20%2Fbin%2Fbash%60' # URL encoded version
33 # Add more suspicious commands accordingly
34 - '`whoami'
35 - 'powershell'
36 - 'cmd'
37 - 'wget'
38 condition: selection
39falsepositives:
40 - Web vulnerability scanners
41level: high
References
Related rules
- ADSelfService Exploitation
- Apache Spark Shell Command Injection - Weblogs
- Arcadyan Router Exploitations
- Atlassian Bitbucket Command Injection Via Archive API
- CVE-2010-5278 Exploitation Attempt