SERVER-WEBAPP -- Snort has detected traffic exploiting vulnerabilities in web based applications on servers.
SERVER-WEBAPP Java getRuntime remote code execution attempt
In certain situations an attacker can use an HTTP header containing malicious Java code intended to gain code execution on a vulnerable server. The rule looks for the commonly used getRuntime().exec command chain.
This rule triggers on an attempt to use the Java getRuntime module to gain remote code execution on a vulnerable web application.
Attacks/Scans seen in the wild
No known false positives
Cisco Talos Intelligence Group
No rule groups
Escalation of Privilege
An Escalation of Privilege (EOP) attack is any attack method that results in a user or application gaining permissions to access resources they normally would not have access to.
CVE-2022-22965 |
Loading description
|
Tactic: Execution
Technique: Execution through Module Load
For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org