Rule Category

SERVER-OTHER -- Snort has detected traffic exploiting vulnerabilities in a server in the network.

Alert Message

SERVER-OTHER Apache OFBiz XMLRPC deserialization attempt

Rule Explanation

Apache OfBiz prior to 17.12.04 suffers from an insecure deserialization vulnerability via it's XML-RPC interface. The interface does not perform authentication on requests sent to the server before parsing the requests. An attacker is then able to bypass verification and upload a malicious serialized object that could allow for remote code execution.

What To Look For

This rule alerts when an attempt is made to trigger a deserialization vulnerability in Apache OfBiz.

Known Usage

Public information/Proof of Concept available

False Positives

No known false positives

Contributors

Cisco Talos Intelligence Group

MITRE ATT&CK Framework

Tactic: Execution

Technique: Execution through API

For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org

Additional Links

Rule Vulnerability

Insecure Deserialization

Insecure Deserialization relates to web application security. Applications turn an object into data through serialization; the reverse of that process, deserialization, can be vulnerable to attacks when the application trusts the data that is being deserialized. Serialized data is machine readable and not encrypted; serialized user-supplied data should not be trusted. Deserialization attacks can lead to remote code execution.

CVE Additional Information