Talos has added and modified multiple rules in the deleted, malware-backdoor and server-webapp rule sets to provide coverage for emerging threats from these technologies.
For information about Snort Subscriber Rulesets available for purchase, please visit the Snort product page.
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2092000.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:63995 <-> DISABLED <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt (server-webapp.rules) * 1:63996 <-> DISABLED <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt (server-webapp.rules) * 1:63997 <-> ENABLED <-> MALWARE-BACKDOOR Unix.Backdoor.Agent variant download attempt (malware-backdoor.rules) * 1:63998 <-> DISABLED <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt (server-webapp.rules) * 1:63999 <-> DISABLED <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt (server-webapp.rules) * 1:64000 <-> DISABLED <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt (server-webapp.rules) * 1:64001 <-> DISABLED <-> POLICY-OTHER SSH inbound connection from non-standard port (policy-other.rules) * 1:64002 <-> DISABLED <-> DELETED MALWARE-BACKDOOR MultiOS.Backdoor.Agent variant inbound connection (deleted.rules) * 1:64003 <-> DISABLED <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt (server-webapp.rules) * 1:64004 <-> DISABLED <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt (server-webapp.rules) * 3:64005 <-> ENABLED <-> SERVER-WEBAPP Cisco Network Services Orchestrator privilege escalation attempt (server-webapp.rules)
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091900.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:64002 <-> DISABLED <-> DELETED MALWARE-BACKDOOR MultiOS.Backdoor.Agent variant inbound connection (deleted.rules) * 1:64001 <-> DISABLED <-> POLICY-OTHER SSH inbound connection from non-standard port (policy-other.rules) * 1:64003 <-> DISABLED <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt (server-webapp.rules) * 1:63998 <-> DISABLED <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt (server-webapp.rules) * 1:63997 <-> ENABLED <-> MALWARE-BACKDOOR Unix.Backdoor.Agent variant download attempt (malware-backdoor.rules) * 1:63999 <-> DISABLED <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt (server-webapp.rules) * 1:64000 <-> DISABLED <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt (server-webapp.rules) * 1:63996 <-> DISABLED <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt (server-webapp.rules) * 1:64004 <-> DISABLED <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt (server-webapp.rules) * 1:63995 <-> DISABLED <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt (server-webapp.rules) * 3:64005 <-> ENABLED <-> SERVER-WEBAPP Cisco Network Services Orchestrator privilege escalation attempt (server-webapp.rules)
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091801.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:64004 <-> DISABLED <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt (server-webapp.rules) * 1:64003 <-> DISABLED <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt (server-webapp.rules) * 1:63995 <-> DISABLED <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt (server-webapp.rules) * 1:63996 <-> DISABLED <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt (server-webapp.rules) * 1:64000 <-> DISABLED <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt (server-webapp.rules) * 1:64001 <-> DISABLED <-> POLICY-OTHER SSH inbound connection from non-standard port (policy-other.rules) * 1:63999 <-> DISABLED <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt (server-webapp.rules) * 1:64002 <-> DISABLED <-> DELETED MALWARE-BACKDOOR MultiOS.Backdoor.Agent variant inbound connection (deleted.rules) * 1:63997 <-> ENABLED <-> MALWARE-BACKDOOR Unix.Backdoor.Agent variant download attempt (malware-backdoor.rules) * 1:63998 <-> DISABLED <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt (server-webapp.rules) * 3:64005 <-> ENABLED <-> SERVER-WEBAPP Cisco Network Services Orchestrator privilege escalation attempt (server-webapp.rules)
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091701.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:63995 <-> DISABLED <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt (server-webapp.rules) * 1:64004 <-> DISABLED <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt (server-webapp.rules) * 1:64003 <-> DISABLED <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt (server-webapp.rules) * 1:63996 <-> DISABLED <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt (server-webapp.rules) * 1:63998 <-> DISABLED <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt (server-webapp.rules) * 1:63997 <-> ENABLED <-> MALWARE-BACKDOOR Unix.Backdoor.Agent variant download attempt (malware-backdoor.rules) * 1:63999 <-> DISABLED <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt (server-webapp.rules) * 1:64002 <-> DISABLED <-> DELETED MALWARE-BACKDOOR MultiOS.Backdoor.Agent variant inbound connection (deleted.rules) * 1:64000 <-> DISABLED <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt (server-webapp.rules) * 1:64001 <-> DISABLED <-> POLICY-OTHER SSH inbound connection from non-standard port (policy-other.rules) * 3:64005 <-> ENABLED <-> SERVER-WEBAPP Cisco Network Services Orchestrator privilege escalation attempt (server-webapp.rules)
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091700.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:64001 <-> DISABLED <-> POLICY-OTHER SSH inbound connection from non-standard port (policy-other.rules) * 1:64002 <-> DISABLED <-> DELETED MALWARE-BACKDOOR MultiOS.Backdoor.Agent variant inbound connection (deleted.rules) * 1:63998 <-> DISABLED <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt (server-webapp.rules) * 1:63997 <-> ENABLED <-> MALWARE-BACKDOOR Unix.Backdoor.Agent variant download attempt (malware-backdoor.rules) * 1:64003 <-> DISABLED <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt (server-webapp.rules) * 1:64004 <-> DISABLED <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt (server-webapp.rules) * 1:63995 <-> DISABLED <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt (server-webapp.rules) * 1:63996 <-> DISABLED <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt (server-webapp.rules) * 1:64000 <-> DISABLED <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt (server-webapp.rules) * 1:63999 <-> DISABLED <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt (server-webapp.rules) * 3:64005 <-> ENABLED <-> SERVER-WEBAPP Cisco Network Services Orchestrator privilege escalation attempt (server-webapp.rules)
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091601.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:64002 <-> DISABLED <-> DELETED MALWARE-BACKDOOR MultiOS.Backdoor.Agent variant inbound connection (deleted.rules) * 1:63995 <-> DISABLED <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt (server-webapp.rules) * 1:63998 <-> DISABLED <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt (server-webapp.rules) * 1:64004 <-> DISABLED <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt (server-webapp.rules) * 1:63996 <-> DISABLED <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt (server-webapp.rules) * 1:63997 <-> ENABLED <-> MALWARE-BACKDOOR Unix.Backdoor.Agent variant download attempt (malware-backdoor.rules) * 1:63999 <-> DISABLED <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt (server-webapp.rules) * 1:64003 <-> DISABLED <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt (server-webapp.rules) * 1:64000 <-> DISABLED <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt (server-webapp.rules) * 1:64001 <-> DISABLED <-> POLICY-OTHER SSH inbound connection from non-standard port (policy-other.rules) * 3:64005 <-> ENABLED <-> SERVER-WEBAPP Cisco Network Services Orchestrator privilege escalation attempt (server-webapp.rules)
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091600.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:64004 <-> DISABLED <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt (server-webapp.rules) * 1:63999 <-> DISABLED <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt (server-webapp.rules) * 1:64001 <-> DISABLED <-> POLICY-OTHER SSH inbound connection from non-standard port (policy-other.rules) * 1:63997 <-> ENABLED <-> MALWARE-BACKDOOR Unix.Backdoor.Agent variant download attempt (malware-backdoor.rules) * 1:63995 <-> DISABLED <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt (server-webapp.rules) * 1:64002 <-> DISABLED <-> DELETED MALWARE-BACKDOOR MultiOS.Backdoor.Agent variant inbound connection (deleted.rules) * 1:64003 <-> DISABLED <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt (server-webapp.rules) * 1:64000 <-> DISABLED <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt (server-webapp.rules) * 1:63998 <-> DISABLED <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt (server-webapp.rules) * 1:63996 <-> DISABLED <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt (server-webapp.rules) * 3:64005 <-> ENABLED <-> SERVER-WEBAPP Cisco Network Services Orchestrator privilege escalation attempt (server-webapp.rules)
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091501.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:64004 <-> DISABLED <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt (server-webapp.rules) * 1:63996 <-> DISABLED <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt (server-webapp.rules) * 1:64003 <-> DISABLED <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt (server-webapp.rules) * 1:63998 <-> DISABLED <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt (server-webapp.rules) * 1:64000 <-> DISABLED <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt (server-webapp.rules) * 1:64001 <-> DISABLED <-> POLICY-OTHER SSH inbound connection from non-standard port (policy-other.rules) * 1:63995 <-> DISABLED <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt (server-webapp.rules) * 1:64002 <-> DISABLED <-> DELETED MALWARE-BACKDOOR MultiOS.Backdoor.Agent variant inbound connection (deleted.rules) * 1:63999 <-> DISABLED <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt (server-webapp.rules) * 1:63997 <-> ENABLED <-> MALWARE-BACKDOOR Unix.Backdoor.Agent variant download attempt (malware-backdoor.rules) * 3:64005 <-> ENABLED <-> SERVER-WEBAPP Cisco Network Services Orchestrator privilege escalation attempt (server-webapp.rules)
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091401.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:63995 <-> DISABLED <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt (server-webapp.rules) * 1:63996 <-> DISABLED <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt (server-webapp.rules) * 1:64002 <-> DISABLED <-> DELETED MALWARE-BACKDOOR MultiOS.Backdoor.Agent variant inbound connection (deleted.rules) * 1:63998 <-> DISABLED <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt (server-webapp.rules) * 1:64001 <-> DISABLED <-> POLICY-OTHER SSH inbound connection from non-standard port (policy-other.rules) * 1:63999 <-> DISABLED <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt (server-webapp.rules) * 1:63997 <-> ENABLED <-> MALWARE-BACKDOOR Unix.Backdoor.Agent variant download attempt (malware-backdoor.rules) * 1:64000 <-> DISABLED <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt (server-webapp.rules) * 1:64004 <-> DISABLED <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt (server-webapp.rules) * 1:64003 <-> DISABLED <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt (server-webapp.rules) * 3:64005 <-> ENABLED <-> SERVER-WEBAPP Cisco Network Services Orchestrator privilege escalation attempt (server-webapp.rules)
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091300.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:64002 <-> DISABLED <-> DELETED MALWARE-BACKDOOR MultiOS.Backdoor.Agent variant inbound connection (deleted.rules) * 1:63996 <-> DISABLED <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt (server-webapp.rules) * 1:64001 <-> DISABLED <-> POLICY-OTHER SSH inbound connection from non-standard port (policy-other.rules) * 1:63997 <-> ENABLED <-> MALWARE-BACKDOOR Unix.Backdoor.Agent variant download attempt (malware-backdoor.rules) * 1:64004 <-> DISABLED <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt (server-webapp.rules) * 1:64000 <-> DISABLED <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt (server-webapp.rules) * 1:64003 <-> DISABLED <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt (server-webapp.rules) * 1:63995 <-> DISABLED <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt (server-webapp.rules) * 1:63998 <-> DISABLED <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt (server-webapp.rules) * 1:63999 <-> DISABLED <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt (server-webapp.rules) * 3:64005 <-> ENABLED <-> SERVER-WEBAPP Cisco Network Services Orchestrator privilege escalation attempt (server-webapp.rules)
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091101.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:64003 <-> DISABLED <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt (server-webapp.rules) * 1:63997 <-> ENABLED <-> MALWARE-BACKDOOR Unix.Backdoor.Agent variant download attempt (malware-backdoor.rules) * 1:63998 <-> DISABLED <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt (server-webapp.rules) * 1:64000 <-> DISABLED <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt (server-webapp.rules) * 1:64004 <-> DISABLED <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt (server-webapp.rules) * 1:63995 <-> DISABLED <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt (server-webapp.rules) * 1:63996 <-> DISABLED <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt (server-webapp.rules) * 1:64001 <-> DISABLED <-> POLICY-OTHER SSH inbound connection from non-standard port (policy-other.rules) * 1:64002 <-> DISABLED <-> DELETED MALWARE-BACKDOOR MultiOS.Backdoor.Agent variant inbound connection (deleted.rules) * 1:63999 <-> DISABLED <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt (server-webapp.rules) * 3:64005 <-> ENABLED <-> SERVER-WEBAPP Cisco Network Services Orchestrator privilege escalation attempt (server-webapp.rules)
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.0.0.0.
The format of the file is:
gid:sid <-> Message
* 1:301014 <-> MALWARE-OTHER Js.Downloader.Fenix variant download attempt * 1:301015 <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt * 1:63995 <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt * 1:63996 <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt * 1:63997 <-> MALWARE-BACKDOOR Unix.Backdoor.Agent variant download attempt * 1:64000 <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt * 1:64001 <-> POLICY-OTHER SSH inbound connection from non-standard port * 1:64003 <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt * 1:64004 <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt * 3:64005 <-> SERVER-WEBAPP Cisco Network Services Orchestrator privilege escalation attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.0.3.1.
The format of the file is:
gid:sid <-> Message
* 1:301014 <-> MALWARE-OTHER Js.Downloader.Fenix variant download attempt * 1:301015 <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt * 1:63995 <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt * 1:63996 <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt * 1:63997 <-> MALWARE-BACKDOOR Unix.Backdoor.Agent variant download attempt * 1:64000 <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt * 1:64001 <-> POLICY-OTHER SSH inbound connection from non-standard port * 1:64003 <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt * 1:64004 <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt * 3:64005 <-> SERVER-WEBAPP Cisco Network Services Orchestrator privilege escalation attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.0.3.4.
The format of the file is:
gid:sid <-> Message
* 1:301014 <-> MALWARE-OTHER Js.Downloader.Fenix variant download attempt * 1:301015 <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt * 1:63995 <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt * 1:63996 <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt * 1:63997 <-> MALWARE-BACKDOOR Unix.Backdoor.Agent variant download attempt * 1:64000 <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt * 1:64001 <-> POLICY-OTHER SSH inbound connection from non-standard port * 1:64003 <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt * 1:64004 <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt * 3:64005 <-> SERVER-WEBAPP Cisco Network Services Orchestrator privilege escalation attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.0.0.
The format of the file is:
gid:sid <-> Message
* 1:301014 <-> MALWARE-OTHER Js.Downloader.Fenix variant download attempt * 1:301015 <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt * 1:63995 <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt * 1:63996 <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt * 1:63997 <-> MALWARE-BACKDOOR Unix.Backdoor.Agent variant download attempt * 1:64000 <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt * 1:64001 <-> POLICY-OTHER SSH inbound connection from non-standard port * 1:64003 <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt * 1:64004 <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt * 3:64005 <-> SERVER-WEBAPP Cisco Network Services Orchestrator privilege escalation attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.0.1.
The format of the file is:
gid:sid <-> Message
* 1:301014 <-> MALWARE-OTHER Js.Downloader.Fenix variant download attempt * 1:301015 <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt * 1:63995 <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt * 1:63996 <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt * 1:63997 <-> MALWARE-BACKDOOR Unix.Backdoor.Agent variant download attempt * 1:64000 <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt * 1:64001 <-> POLICY-OTHER SSH inbound connection from non-standard port * 1:64003 <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt * 1:64004 <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt * 3:64005 <-> SERVER-WEBAPP Cisco Network Services Orchestrator privilege escalation attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.1.0.
The format of the file is:
gid:sid <-> Message
* 1:301014 <-> MALWARE-OTHER Js.Downloader.Fenix variant download attempt * 1:301015 <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt * 1:63995 <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt * 1:63996 <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt * 1:63997 <-> MALWARE-BACKDOOR Unix.Backdoor.Agent variant download attempt * 1:64000 <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt * 1:64001 <-> POLICY-OTHER SSH inbound connection from non-standard port * 1:64003 <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt * 1:64004 <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt * 3:64005 <-> SERVER-WEBAPP Cisco Network Services Orchestrator privilege escalation attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.3.0.
The format of the file is:
gid:sid <-> Message
* 1:301014 <-> MALWARE-OTHER Js.Downloader.Fenix variant download attempt * 1:301015 <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt * 1:63995 <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt * 1:63996 <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt * 1:63997 <-> MALWARE-BACKDOOR Unix.Backdoor.Agent variant download attempt * 1:64000 <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt * 1:64001 <-> POLICY-OTHER SSH inbound connection from non-standard port * 1:64003 <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt * 1:64004 <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt * 3:64005 <-> SERVER-WEBAPP Cisco Network Services Orchestrator privilege escalation attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.4.0.
The format of the file is:
gid:sid <-> Message
* 1:301014 <-> MALWARE-OTHER Js.Downloader.Fenix variant download attempt * 1:301015 <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt * 1:63995 <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt * 1:63996 <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt * 1:63997 <-> MALWARE-BACKDOOR Unix.Backdoor.Agent variant download attempt * 1:64000 <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt * 1:64001 <-> POLICY-OTHER SSH inbound connection from non-standard port * 1:64003 <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt * 1:64004 <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt * 3:64005 <-> SERVER-WEBAPP Cisco Network Services Orchestrator privilege escalation attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.5.0.
The format of the file is:
gid:sid <-> Message
* 1:301014 <-> MALWARE-OTHER Js.Downloader.Fenix variant download attempt * 1:301015 <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt * 1:63995 <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt * 1:63996 <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt * 1:63997 <-> MALWARE-BACKDOOR Unix.Backdoor.Agent variant download attempt * 1:64000 <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt * 1:64001 <-> POLICY-OTHER SSH inbound connection from non-standard port * 1:64003 <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt * 1:64004 <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt * 3:64005 <-> SERVER-WEBAPP Cisco Network Services Orchestrator privilege escalation attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.7.0.
The format of the file is:
gid:sid <-> Message
* 1:301014 <-> MALWARE-OTHER Js.Downloader.Fenix variant download attempt * 1:301015 <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt * 1:63995 <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt * 1:63996 <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt * 1:63997 <-> MALWARE-BACKDOOR Unix.Backdoor.Agent variant download attempt * 1:64000 <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt * 1:64001 <-> POLICY-OTHER SSH inbound connection from non-standard port * 1:64003 <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt * 1:64004 <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt * 3:64005 <-> SERVER-WEBAPP Cisco Network Services Orchestrator privilege escalation attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.9.0.
The format of the file is:
gid:sid <-> Message
* 1:301014 <-> MALWARE-OTHER Js.Downloader.Fenix variant download attempt * 1:301015 <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt * 1:63995 <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt * 1:63996 <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt * 1:63997 <-> MALWARE-BACKDOOR Unix.Backdoor.Agent variant download attempt * 1:64000 <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt * 1:64001 <-> POLICY-OTHER SSH inbound connection from non-standard port * 1:64003 <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt * 1:64004 <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt * 3:64005 <-> SERVER-WEBAPP Cisco Network Services Orchestrator privilege escalation attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.2.0.0.
The format of the file is:
gid:sid <-> Message
* 1:301014 <-> MALWARE-OTHER Js.Downloader.Fenix variant download attempt * 1:301015 <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt * 1:63995 <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt * 1:63996 <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt * 1:63997 <-> MALWARE-BACKDOOR Unix.Backdoor.Agent variant download attempt * 1:64000 <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt * 1:64001 <-> POLICY-OTHER SSH inbound connection from non-standard port * 1:64003 <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt * 1:64004 <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt * 3:64005 <-> SERVER-WEBAPP Cisco Network Services Orchestrator privilege escalation attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.11.0.
The format of the file is:
gid:sid <-> Message
* 1:301014 <-> MALWARE-OTHER Js.Downloader.Fenix variant download attempt * 1:301015 <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt * 1:63995 <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt * 1:63996 <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt * 1:63997 <-> MALWARE-BACKDOOR Unix.Backdoor.Agent variant download attempt * 1:64000 <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt * 1:64001 <-> POLICY-OTHER SSH inbound connection from non-standard port * 1:64003 <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt * 1:64004 <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt * 3:64005 <-> SERVER-WEBAPP Cisco Network Services Orchestrator privilege escalation attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.15.0.
The format of the file is:
gid:sid <-> Message
* 1:301014 <-> MALWARE-OTHER Js.Downloader.Fenix variant download attempt * 1:301015 <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt * 1:63995 <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt * 1:63996 <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt * 1:63997 <-> MALWARE-BACKDOOR Unix.Backdoor.Agent variant download attempt * 1:64000 <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt * 1:64001 <-> POLICY-OTHER SSH inbound connection from non-standard port * 1:64003 <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt * 1:64004 <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt * 3:64005 <-> SERVER-WEBAPP Cisco Network Services Orchestrator privilege escalation attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.18.0.
The format of the file is:
gid:sid <-> Message
* 1:301014 <-> MALWARE-OTHER Js.Downloader.Fenix variant download attempt * 1:301015 <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt * 1:63995 <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt * 1:63996 <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt * 1:63997 <-> MALWARE-BACKDOOR Unix.Backdoor.Agent variant download attempt * 1:64000 <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt * 1:64001 <-> POLICY-OTHER SSH inbound connection from non-standard port * 1:64003 <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt * 1:64004 <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt * 3:64005 <-> SERVER-WEBAPP Cisco Network Services Orchestrator privilege escalation attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.20.0.
The format of the file is:
gid:sid <-> Message
* 1:301014 <-> MALWARE-OTHER Js.Downloader.Fenix variant download attempt * 1:301015 <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt * 1:63995 <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt * 1:63996 <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt * 1:63997 <-> MALWARE-BACKDOOR Unix.Backdoor.Agent variant download attempt * 1:64000 <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt * 1:64001 <-> POLICY-OTHER SSH inbound connection from non-standard port * 1:64003 <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt * 1:64004 <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt * 3:64005 <-> SERVER-WEBAPP Cisco Network Services Orchestrator privilege escalation attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.21.0.
The format of the file is:
gid:sid <-> Message
* 1:301014 <-> MALWARE-OTHER Js.Downloader.Fenix variant download attempt * 1:301015 <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt * 1:63995 <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt * 1:63996 <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt * 1:63997 <-> MALWARE-BACKDOOR Unix.Backdoor.Agent variant download attempt * 1:64000 <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt * 1:64001 <-> POLICY-OTHER SSH inbound connection from non-standard port * 1:64003 <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt * 1:64004 <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt * 3:64005 <-> SERVER-WEBAPP Cisco Network Services Orchestrator privilege escalation attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.35.0.
The format of the file is:
gid:sid <-> Message
* 1:301014 <-> MALWARE-OTHER Js.Downloader.Fenix variant download attempt * 1:301015 <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt * 1:63995 <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt * 1:63996 <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt * 1:63997 <-> MALWARE-BACKDOOR Unix.Backdoor.Agent variant download attempt * 1:64000 <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt * 1:64001 <-> POLICY-OTHER SSH inbound connection from non-standard port * 1:64003 <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt * 1:64004 <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt * 3:64005 <-> SERVER-WEBAPP Cisco Network Services Orchestrator privilege escalation attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.44.0.
The format of the file is:
gid:sid <-> Message
* 1:301014 <-> MALWARE-OTHER Js.Downloader.Fenix variant download attempt * 1:301015 <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt * 1:63995 <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt * 1:63996 <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt * 1:63997 <-> MALWARE-BACKDOOR Unix.Backdoor.Agent variant download attempt * 1:64000 <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt * 1:64001 <-> POLICY-OTHER SSH inbound connection from non-standard port * 1:64003 <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt * 1:64004 <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt * 3:64005 <-> SERVER-WEBAPP Cisco Network Services Orchestrator privilege escalation attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.47.0.
The format of the file is:
gid:sid <-> Message
* 1:301014 <-> MALWARE-OTHER Js.Downloader.Fenix variant download attempt * 1:301015 <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt * 1:63995 <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt * 1:63996 <-> SERVER-WEBAPP RudderStack rudder-server SQL injection attempt * 1:63997 <-> MALWARE-BACKDOOR Unix.Backdoor.Agent variant download attempt * 1:64000 <-> SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt * 1:64001 <-> POLICY-OTHER SSH inbound connection from non-standard port * 1:64003 <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt * 1:64004 <-> SERVER-WEBAPP Draytek VigorConnect directory traversal attempt * 3:64005 <-> SERVER-WEBAPP Cisco Network Services Orchestrator privilege escalation attempt