Atlassian Confluence CVE-2022-26134
Detects spawning of suspicious child processes by Atlassian Confluence server which may indicate successful exploitation of CVE-2022-26134
Sigma rule (View on GitHub)
1title: Atlassian Confluence CVE-2022-26134
2id: 7fb14105-530e-4e2e-8cfb-99f7d8700b66
3related:
4 - id: 245f92e3-c4da-45f1-9070-bc552e06db11
5 type: derived
6status: test
7description: Detects spawning of suspicious child processes by Atlassian Confluence server which may indicate successful exploitation of CVE-2022-26134
8references:
9 - https://www.volexity.com/blog/2022/06/02/zero-day-exploitation-of-atlassian-confluence/
10author: Nasreddine Bencherchali (Nextron Systems)
11date: 2022-06-03
12tags:
13 - attack.initial-access
14 - attack.execution
15 - attack.t1190
16 - attack.t1059
17 - cve.2022-26134
18logsource:
19 category: process_creation
20 product: linux
21detection:
22 selection:
23 # Monitor suspicious child processes spawned by Confluence
24 ParentImage|startswith: '/opt/atlassian/confluence/'
25 ParentImage|endswith: '/java'
26 CommandLine|contains:
27 - '/bin/sh'
28 - 'bash'
29 - 'dash'
30 - 'ksh'
31 - 'zsh'
32 - 'csh'
33 - 'fish'
34 - 'curl'
35 - 'wget'
36 - 'python'
37 condition: selection
38falsepositives:
39 - Unknown
40level: high
References
Related rules
- Potential Atlassian Confluence CVE-2021-26084 Exploitation Attempt
- DNS RCE CVE-2020-1350
- Exploited CVE-2020-10189 Zoho ManageEngine
- Java Payload Strings
- OMIGOD HTTP No Authentication RCE