OWASSRF Exploitation Attempt Using Public POC - Proxy
Detects exploitation attempt of the OWASSRF variant targeting exchange servers using publicly available POC. It uses the OWA endpoint to access the powershell backend endpoint
Sigma rule (View on GitHub)
1title: OWASSRF Exploitation Attempt Using Public POC - Proxy
2id: fdd7e904-7304-4616-a46a-e32f917c4be4
3status: test
4description: Detects exploitation attempt of the OWASSRF variant targeting exchange servers using publicly available POC. It uses the OWA endpoint to access the powershell backend endpoint
5references:
6 - https://www.crowdstrike.com/blog/owassrf-exploit-analysis-and-recommendations/
7 - https://www.rapid7.com/blog/post/2022/12/21/cve-2022-41080-cve-2022-41082-rapid7-observed-exploitation-of-owassrf-in-exchange-for-rce/
8 - https://twitter.com/purp1ew0lf/status/1602989967776808961?s=12&t=OkZJl_ViICeiftVEsohRyw
9author: Nasreddine Bencherchali (Nextron Systems)
10date: 2022/12/22
11tags:
12 - attack.initial_access
13 - attack.t1190
14logsource:
15 category: proxy
16detection:
17 selection:
18 # Look for the header: X-OWA-ExplicitLogonUser: owa/mastermailbox@outlook.com
19 c-useragent: 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.5195.54 Safari/537.36'
20 cs-method: 'POST'
21 sc-status: 200
22 c-uri|contains|all:
23 - '/owa/mastermailbox'
24 - '/powershell'
25 condition: selection
26falsepositives:
27 - Unlikely
28level: critical
References
Related rules
- Apache Spark Shell Command Injection - Weblogs
- Atlassian Bitbucket Command Injection Via Archive API
- CVE-2021-41773 Exploitation Attempt
- CVE-2022-31656 VMware Workspace ONE Access Auth Bypass
- CVE-2022-31659 VMware Workspace ONE Access RCE