CVE-2024-1708 - ScreenConnect Path Traversal Exploitation
This detects file modifications to ASPX and ASHX files within the root of the App_Extensions directory, which is allowed by a ZipSlip vulnerability in versions prior to 23.9.8. This occurs during exploitation of CVE-2024-1708.
Sigma rule (View on GitHub)
1title: CVE-2024-1708 - ScreenConnect Path Traversal Exploitation
2id: 44d7af7e-88e6-4490-be11-55f7ff4d9fc1
3related:
4 - id: 4c198a60-7d05-4daf-8bf7-4136fb6f5c62
5 type: similar
6status: experimental
7description: |
8 This detects file modifications to ASPX and ASHX files within the root of the App_Extensions directory, which is allowed by a ZipSlip vulnerability in versions prior to 23.9.8. This occurs during exploitation of CVE-2024-1708.
9references:
10 - https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8
11 - https://www.cve.org/CVERecord?id=CVE-2024-1709
12 - https://www.huntress.com/blog/a-catastrophe-for-control-understanding-the-screenconnect-authentication-bypass
13author: Matt Anderson, Andrew Schwartz, Caleb Stewart, Huntress
14date: 2024-02-21
15tags:
16 - attack.persistence
17 - cve.2024-1708
18logsource:
19 product: windows
20 category: file_event
21detection:
22 selection:
23 Image|endswith: '\ScreenConnect.Service.exe'
24 TargetFilename|endswith:
25 - 'ScreenConnect\\App_Extensions\\*.ashx'
26 - 'ScreenConnect\\App_Extensions\\*.aspx'
27 filter_main_legit_extension:
28 TargetFilename|contains: 'ScreenConnect\App_Extensions\\*\\'
29 condition: selection and not 1 of filter_main_*
30falsepositives:
31 - This will occur legitimately as well and will result in some benign activity.
32level: medium
References
Related rules
- CVE-2024-1708 - ScreenConnect Path Traversal Exploitation - Security
- A Member Was Added to a Security-Enabled Global Group
- A Member Was Removed From a Security-Enabled Global Group
- A New Trust Was Created To A Domain
- A Security-Enabled Global Group Was Deleted