SERVER-WEBAPP -- Snort has detected traffic exploiting vulnerabilities in web based applications on servers.
SERVER-WEBAPP Microsoft Exchange DLP policy template code execution attempt
This rule looks for specially formatted SOAP request which exploit a vulnerability in Microsoft Exchange that could allow an attacker to execute arbitrary code with SYSTEM level privileges.
This rule alerts when Snort detects a command execution exploit targeting Microsoft Exchange
Attacks/Scans seen in the wild
No known false positives
Cisco Talos Intelligence Group
Rule Categories::Server::Web Applications
MITRE::ATT&CK Framework::Enterprise::Initial Access::Exploit Public-Facing Application
Vulnerability::Severity::Critical
Vulnerability::Severity::High
Vulnerability::Severity::Medium
Command Injection
Command Injection attacks target applications that allow unsafe user-supplied input. Attackers transmit this input via forms, cookies, HTTP headers, etc. and exploit the applications permissions to execute system commands without injecting code.
CVE-2021-26412 |
Loading description
|