SERVER-WEBAPP -- Snort has detected traffic exploiting vulnerabilities in web based applications on servers.
SERVER-WEBAPP Trend Micro InterScan Web Security Virtual Appliance command injection attempt
This rule looks for a malicious HTTP request sent to Trend Micro InterScan Web Security Virtual Appliance that contains a command injection metacharacter present in either of the following parameters: select_interval.
What To Look For
This rule fires on HTTP requests intended to exploit a command injection vulnerability in Trend Micro InterScan Web Security Virtual Appliance.
No public information
No known false positives
MITRE ATT&CK Framework
Tactic: Initial Access
Technique: Exploit Public-Facing Application
For reference, see the MITRE ATT&CK vulnerability types here:
Command Injection attacks target applications that allow unsafe user-supplied input. Attackers transmit this input via forms, cookies, HTTP headers, etc. and exploit the applications permissions to execute system commands without injecting code.
CVE Additional Information