Skip to content

Commit 0aea381

Browse files
committed
added papercut and bitbucket detections ebpf
Signed-off-by: research <[email protected]>
1 parent 0f4b775 commit 0aea381

File tree

3 files changed

+53
-0
lines changed

3 files changed

+53
-0
lines changed
Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,19 @@
1+
- list: shell_binaries
2+
items: [ash, bash, csh, ksh, sh, tcsh, zsh, dash]
3+
4+
- macro: bitbucket_environment_variables
5+
condition: (proc.env contains 'BITBUCKET_HOME' and proc.env contains 'BITBUCKET_INSTALL_DIR' and proc.env contains 'BITBUCKET_USER')
6+
7+
- rule: Bitbucket Unauthenticated Remote Code Execution CVE-2022-36804 Exploited
8+
desc: Detecs the execution of system commands using git. Possible exploitation of CVE-2022-36804.
9+
condition: >
10+
evt.dir=< and
11+
evt.type=execve and
12+
proc.name in (shell_binaries) and
13+
proc.pname=git and
14+
bitbucket_environment_variables and
15+
proc.args startswith "-c" and
16+
proc.args contains "/'"
17+
output: "CVE-2022-36804 exploit attempt detected (user.name=%user.name user.loginuid=%user.loginuid proc.exeline=%proc.exeline proc.name=%proc.name proc.cwd=%proc.cwd container.id=%container.id)"
18+
priority: CRITICAL
19+
tags: [host,container,exploit,CVE_2022_36804,bitbucket,Mitre_Initial_Access, T1190]
Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,21 @@
1+
- macro: java_system_command_getRuntime
2+
condition: (evt.arg.data contains 'Runtime' and evt.arg.data contains 'getRuntime' and evt.arg.data contains '.exec%28' )
3+
4+
- macro: java_system_command_processBuilder
5+
condition: (evt.arg.data contains 'ProcessBuilder' and evt.arg.data contains '.start%28')
6+
7+
- macro: papercut_scripting_form_data
8+
condition: (evt.arg.data contains 'service=' and evt.arg.data contains 'printerId=' and evt.arg.data contains 'enablePrintScript=' and evt.arg.data contains 'scriptBody=')
9+
10+
- rule: PaperCut Remote Code Execution CVE-2023-27350 Exploited
11+
desc: Detects the execution of system commands using Papercut App Server. Possible exploitation of CVE-2023-27350.
12+
condition: >
13+
evt.dir=< and
14+
evt.type=read and
15+
papercut_scripting_form_data and
16+
(evt.arg.data contains 'ProcessBuilder.Command%28' or
17+
java_system_command_getRuntime or
18+
java_system_command_processBuilder)
19+
output: "CVE-2023-27350 Remote Code Execution detected (event=%evt.type server_ip=%fd.sip server_port=%fd.sport proto=%fd.l4proto fd.cip=%fd.cip user.name=%user.name user.loginuid=%user.loginuid parent=%proc.pname process=%proc.name container_id=%container.id)"
20+
priority: CRITICAL
21+
tags: [host,container,exploit,CVE_2023_27350,Papercut,Mitre_Initial_Access, T1190]
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
- macro: papercut_http_request
2+
condition: (evt.arg.data contains '/app?service=' and evt.arg.data contains '/SetupCompleted')
3+
4+
- rule: PaperCut Authentication Bypass CVE-2023-27351 Exploitied
5+
desc: Detects the exploitation of CVE-2023-27351 inorder to bypass authentication in Papercut.
6+
condition: >
7+
evt.dir=< and
8+
evt.type=read and
9+
papercut_http_request and
10+
(fd.typechar=4 or fd.typechar=6)
11+
output: "Possible Authentication Bypass CVE-2023-27351 detected (event=%evt.type server_ip=%fd.sip server_port=%fd.sport proto=%fd.l4proto fd.cip=%fd.cip parent=%proc.pname process=%proc.name container_id=%container.id)"
12+
priority: WARNING
13+
tags: [host,container,CVE_2023_2735,PaperCut,auth_bypass]

0 commit comments

Comments
 (0)