SERVER-WEBAPP -- Snort has detected traffic exploiting vulnerabilities in web based applications on servers.
SERVER-WEBAPP Zeroshell Linux Router command injection attempt
This rule will look for any injected characters that represent a new line or "\n"or "%0A" along with linux commands in order to be executed as root and to take control of the device.
This rule will trigger when there's an attempt to perform a remote code execution via injected commands to the vulnerable parameter "type" to the URI "/cgi-bin/kerbynet" of the Zeroshell Linux Router
No public information
No known false positives
Cisco Talos Intelligence Group
No rule groups
Command Injection
Command Injection attacks target applications that allow unsafe user-supplied input. Attackers transmit this input via forms, cookies, HTTP headers, etc. and exploit the applications permissions to execute system commands without injecting code.
CVE-2019-12725 |
Loading description
|
Tactic: Execution
Technique: Scripting
For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org