SERVER-WEBAPP -- Snort has detected traffic exploiting vulnerabilities in web based applications on servers.
SERVER-WEBAPP spider-flow saveFunction Java expression language injection attempt
This rule looks for Java expression language injection patterns present in the following parameters in HTTP requests sent to the /function/save endpoint on spider-flow web applications: script.
This rule looks for attempts to exploit a Java expression language vulnerability in spider-flow web applications.
Public information/Proof of Concept available
No known false positives
Cisco Talos Intelligence Group
Rule Categories::Server::Web Applications
MITRE::ATT&CK Framework::Enterprise::Initial Access::Exploit Public-Facing Application
Command Injection
Command Injection attacks target applications that allow unsafe user-supplied input. Attackers transmit this input via forms, cookies, HTTP headers, etc. and exploit the applications permissions to execute system commands without injecting code.
CVE-2024-0195 |
Loading description
|