SERVER-WEBAPP -- Snort has detected traffic exploiting vulnerabilities in web based applications on servers.
SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center operationSelect Java expression language injection attempt
This rule looks for a malicious HTTP request sent to Hewlett Packard Enterprise Intelligent Management Center operationSelect that contains Java expression language injection metacharacters present in either of the following parameters: beanName.
This rule fires on HTTP requests intended to exploit a Java expression language injection vulnerability in Hewlett Packard Enterprise Intelligent Management Center operationSelect.
No public information.
No known false positives
Cisco Talos
No rule groups
Command Injection
Command Injection attacks target applications that allow unsafe user-supplied input. Attackers transmit this input via forms, cookies, HTTP headers, etc. and exploit the applications permissions to execute system commands without injecting code.
CVE-2017-12518 |
Loading description
|
Tactic: Initial Access
Technique: Exploit Public-Facing Application
For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org