SERVER-WEBAPP -- Snort has detected traffic exploiting vulnerabilities in web based applications on servers.
SERVER-WEBAPP Zend and laminas-http frameworks streamName PHP object injection attempt
This rule looks for PHP object injection attacks in Zend.Http.Response.Stream requests to Zend and laminas-http frameworks that can lead to arbitrary code execution.
This rule looks for attempts to exploit a deserialization vulnerability in the Zend and laminas-http frameworks.
No public information
No known false positives
Cisco Talos Intelligence Group
No rule groups
Command Injection
Command Injection attacks target applications that allow unsafe user-supplied input. Attackers transmit this input via forms, cookies, HTTP headers, etc. and exploit the applications permissions to execute system commands without injecting code.
CVE-2021-3007 |
Loading description
|
Tactic: Initial Access
Technique: Exploit Public-Facing Application
For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org