Atlassian Confluence CVE-2022-26134

Detects spawning of suspicious child processes by Atlassian Confluence server which may indicate successful exploitation of CVE-2022-26134

Sigma rule (View on GitHub)

 1title: Atlassian Confluence CVE-2022-26134
 2id: 7fb14105-530e-4e2e-8cfb-99f7d8700b66
 3related:
 4    - id: 245f92e3-c4da-45f1-9070-bc552e06db11
 5      type: derived
 6status: test
 7description: Detects spawning of suspicious child processes by Atlassian Confluence server which may indicate successful exploitation of CVE-2022-26134
 8references:
 9    - https://www.volexity.com/blog/2022/06/02/zero-day-exploitation-of-atlassian-confluence/
10author: Nasreddine Bencherchali (Nextron Systems)
11date: 2022/06/03
12tags:
13    - attack.initial_access
14    - attack.execution
15    - attack.t1190
16    - attack.t1059
17    - cve.2022.26134
18logsource:
19    category: process_creation
20    product: linux
21detection:
22    selection:
23        # Monitor suspicious child processes spawned by Confluence
24        ParentImage|startswith: '/opt/atlassian/confluence/'
25        ParentImage|endswith: '/java'
26        CommandLine|contains:
27            - '/bin/sh'
28            - 'bash'
29            - 'dash'
30            - 'ksh'
31            - 'zsh'
32            - 'csh'
33            - 'fish'
34            - 'curl'
35            - 'wget'
36            - 'python'
37    condition: selection
38falsepositives:
39    - Unknown
40level: high

References

Related rules

to-top