Potential CVE-2023-25717 Exploitation Attempt
Detects a potential exploitation attempt of CVE-2023-25717 a Remote Code Execution via an unauthenticated HTTP GET Request, in Ruckus Wireless Admin
Sigma rule (View on GitHub)
1title: Potential CVE-2023-25717 Exploitation Attempt
2id: 043c1609-0e32-4462-a6f2-5a0c2da3fafe
3status: test
4description: Detects a potential exploitation attempt of CVE-2023-25717 a Remote Code Execution via an unauthenticated HTTP GET Request, in Ruckus Wireless Admin
5references:
6 - https://cybir.com/2023/cve/proof-of-concept-ruckus-wireless-admin-10-4-unauthenticated-remote-code-execution-csrf-ssrf/
7author: Nasreddine Bencherchali (Nextron Systems)
8date: 2023-05-30
9tags:
10 - attack.initial-access
11 - attack.t1190
12 - cve.2023-25717
13 - detection.emerging-threats
14logsource:
15 category: webserver
16detection:
17 selection:
18 cs-method: 'GET'
19 cs-uri-query|contains|all:
20 - '/forms/doLogin'
21 - 'login_username'
22 - 'password'
23 cs-uri-query|contains:
24 - '$('
25 - '%24%28' # URL Encode version of "$("
26 condition: selection
27falsepositives:
28 - Vulnerability scanners
29 - Some rare false positives may occur if the password contains the characters "$(". Apply addition indicators such as executed commands to remove FP
30level: high
References
Related rules
- ADSelfService Exploitation
- Apache Spark Shell Command Injection - Weblogs
- Arcadyan Router Exploitations
- Atlassian Bitbucket Command Injection Via Archive API
- CVE-2010-5278 Exploitation Attempt