SERVER-WEBAPP -- Snort has detected traffic exploiting vulnerabilities in web based applications on servers.
SERVER-WEBAPP Webmin Package Updates update.cgi command injection attempt
This rule looks for a malicious HTTP request sent to Webmin Package Updates update.cgi that contains a command injection metacharacter present in either of the following parameters: u.
This rule fires on HTTP requests intended to exploit a command injection vulnerability in Webmin Package Updates update.cgi.
No public information.
No known false positives
Cisco Talos
No rule groups
Command Injection
Command Injection attacks target applications that allow unsafe user-supplied input. Attackers transmit this input via forms, cookies, HTTP headers, etc. and exploit the applications permissions to execute system commands without injecting code.
CVE-2020-35606 |
Loading description
|
Tactic: Initial Access
Technique: Exploit Public-Facing Application
For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org