Rule Category

FILE-OTHER -- Snort detected traffic targeting vulnerabilities in a file type that does not require enough rule coverage to have its own category.

Alert Message

FILE-OTHER Jackson databind deserialization remote code execution attempt

Rule Explanation

This event is generated when an attacker attempts to send force the Java deserialization of a malicious JSON object. Impact: Attempted User Privilege Gain Details: Looks for malicious Java classes to be deserialized Ease of Attack: Medium; information is publicly available, but it does require a) the right conditions and b) some exploit modification

What To Look For

No information provided

Known Usage

No public information

False Positives

No known false positives

Contributors

Cisco Talos Intelligence Group

Rule Groups

No rule groups

CVE

Additional Links

Rule Vulnerability

CVE Additional Information

This product uses data from the NVD API but is not endorsed or certified by the NVD.
CVE-2017-15095
Loading description