SERVER-WEBAPP -- Snort has detected traffic exploiting vulnerabilities in web based applications on servers.
SERVER-WEBAPP Zoho ManageEngine Applications Manager FaultTemplateOptions.jsp resourceid SQL injection attempt
This rule looks for SQL injection metacharacters present in the following parameters in HTTP requests sent to the /FaultTemplateOptions.jsp endpoint on Zoho ManageEngine Applications Manager web applications: resourceid.
This rule looks for attempts to exploit an SQL injection vulnerability in Zoho ManageEngine Applications Manager web applications.
Public information/Proof of Concept available
No known false positives
Cisco Talos Intelligence Group
Rule Categories::Server::Web Applications
MITRE::ATT&CK Framework::Enterprise::Initial Access::Exploit Public-Facing Application
SQL Injection
SQL Injection attacks target PHP and ASP applications primarily and involve SQL queries or commands added to unverified user input. A successful attack can lead to data leaks (entirely exposed data), database modification (data deletion or tampering), administrative permissions misuse, and sometimes direct commands passed to the operating system.
CVE-2019-11469 |
Loading description
|