SERVER-WEBAPP -- Snort has detected traffic exploiting vulnerabilities in web based applications on servers.
SERVER-WEBAPP Apache Tomcat FileStore directory traversal attempt
Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.5.0 to 8.5.54 and 7.0.0 to 7.0.103 are vulnerable to a deserialization vulnerability. If an attacker is able to upload a malicious serialized payload they can trigger the deserialization vulnerability via a directory traversal attack using the JSESSIONID cookie.
This rule alerts when an attempt to trigger a deserialization vulnerability using a directory traversal attack on an Apache Tomcat server is attempted.
Public information/Proof of Concept available
No known false positives
Cisco Talos Intelligence Group
No rule groups
CVE-2020-9484 |
Loading description
|
Tactic: Execution
Technique: Execution through Module Load
For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org