Rule Category

SERVER-WEBAPP -- Snort has detected traffic exploiting vulnerabilities in web based applications on servers.

Alert Message

SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center devSoftSel Java expression language injection attempt

Rule Explanation

This rule looks for a malicious HTTP request sent to Hewlett Packard Enterprise Intelligent Management Center devSoftSel that contains Java expression language injection metacharacters present in either of the following parameters: beanName.

What To Look For

This rule fires on HTTP requests intended to exploit a Java expression language injection vulnerability in Hewlett Packard Enterprise Intelligent Management Center devSoftSel.

Known Usage

No public information.

False Positives

No known false positives

Contributors

Cisco Talos

MITRE ATT&CK Framework

Tactic: Initial Access

Technique: Exploit Public-Facing Application

For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org

Rule Vulnerability

Command Injection

Command Injection attacks target applications that allow unsafe user-supplied input. Attackers transmit this input via forms, cookies, HTTP headers, etc. and exploit the applications permissions to execute system commands without injecting code.

CVE Additional Information