SERVER-WEBAPP -- Snort has detected traffic exploiting vulnerabilities in web based applications on servers.
SERVER-WEBAPP Apache Tomcat FileStore directory traversal attempt
Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.5.0 to 8.5.54 and 7.0.0 to 7.0.103 are vulnerable to a deserialization vulnerability. If an attacker is able to upload a malicious serialized payload they can trigger the deserialization vulnerability via a directory traversal attack using the JSESSIONID cookie.
This rule alerts when an attempt to trigger a deserialization vulnerability using a directory traversal attack on an Apache Tomcat server is attempted.
Public information/Proof of Concept available
No known false positives
Cisco Talos Intelligence Group
Rule Categories::Server::Web Applications
MITRE::ATT&CK Framework::Enterprise::Initial Access::Exploit Public-Facing Application
Insecure Deserialization
Insecure Deserialization relates to web application security. Applications turn an object into data through serialization; the reverse of that process, deserialization, can be vulnerable to attacks when the application trusts the data that is being deserialized. Serialized data is machine readable and not encrypted; serialized user-supplied data should not be trusted. Deserialization attacks can lead to remote code execution.
CVE-2020-9484 |
Loading description
|
Tactic: Execution
Technique: Shared Modules
For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org