SERVER-WEBAPP -- Snort has detected traffic exploiting vulnerabilities in web based applications on servers.
SERVER-WEBAPP Jenkins Pipeline Groovy plugin Java expression language injection attempt
This rule looks for Java injection metacharacters sent to the Jenkins Groovy plugin shell in the request parameters
This rule fires on Java injection attempts for the Jenkinks Groovy plugin.
No public information
No known false positives
Cisco Talos Intelligence Group
No rule groups
Command Injection
Command Injection attacks target applications that allow unsafe user-supplied input. Attackers transmit this input via forms, cookies, HTTP headers, etc. and exploit the applications permissions to execute system commands without injecting code.
CVE-2019-1003029 |
Loading description
|
CVE-2019-1003030 |
Loading description
|
Tactic: Initial Access
Technique: Exploit Public-Facing Application
For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org