SERVER-WEBAPP -- Snort has detected traffic exploiting vulnerabilities in web based applications on servers.
SERVER-WEBAPP Apache Spark command injection attempt
This rule detects an attempted command injection attack against vulnerable versions of Apache Spark by looking for special characters being sent via the vulnerable parameter that are used to trigger the command injection.
This rule detects an attempted command injection attack against vulnerable versions of Apache Spark.
No public information
No known false positives
Cisco Talos Intelligence Group
No rule groups
Command Injection
Command Injection attacks target applications that allow unsafe user-supplied input. Attackers transmit this input via forms, cookies, HTTP headers, etc. and exploit the applications permissions to execute system commands without injecting code.
CVE-2022-33891 |
Loading description ![]() |
Tactic: Execution
Technique: Command-Line Interface
For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org