Skip to content

Commit 426e0d6

Browse files
committed
++
1 parent f48721b commit 426e0d6

File tree

2 files changed

+12
-6
lines changed

2 files changed

+12
-6
lines changed

rules/cross-platform/execution_sap_netweaver_jsp_webshell.toml

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,8 @@ language = "eql"
1515
license = "Elastic License v2"
1616
name = "Potential SAP NetWeaver WebShell Creation"
1717
references = [
18-
"https://reliaquest.com/blog/threat-spotlight-reliaquest-uncovers-vulnerability-behind-sap-netweaver-compromise/"
18+
"https://reliaquest.com/blog/threat-spotlight-reliaquest-uncovers-vulnerability-behind-sap-netweaver-compromise/",
19+
"https://onapsis.com/blog/active-exploitation-of-sap-vulnerability-cve-2025-31324/"
1920
]
2021
risk_score = 73
2122
rule_id = "f7d588ba-e4b0-442e-879d-7ec39fbd69c5"
@@ -34,7 +35,11 @@ type = "eql"
3435

3536
query = '''
3637
file where host.os.type in ("linux", "windows") and event.action == "creation" and
37-
file.extension : "jsp" and file.path : ("/*/sap.com/*/servlet_jsp/irj/root/*.jsp", "?:\\*\\sap.com\\*\\servlet_jsp\\irj\\root\\*.jsp")
38+
file.extension : ("jsp", "java", "class") and
39+
file.path : ("/*/sap.com/*/servlet_jsp/irj/root/*",
40+
"/*/sap.com/*/servlet_jsp/irj/work/*",
41+
"?:\\*\\sap.com\\*\\servlet_jsp\\irj\\root\\*",
42+
"?:\\*\\sap.com\\*\\servlet_jsp\\irj\\work\\*")
3843
'''
3944
note = """## Triage and analysis
4045

rules/cross-platform/execution_sap_netweaver_webshell_exec.toml

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,8 @@ language = "eql"
1515
license = "Elastic License v2"
1616
name = "Potential SAP NetWeaver Exploitation"
1717
references = [
18-
"https://reliaquest.com/blog/threat-spotlight-reliaquest-uncovers-vulnerability-behind-sap-netweaver-compromise/"
18+
"https://reliaquest.com/blog/threat-spotlight-reliaquest-uncovers-vulnerability-behind-sap-netweaver-compromise/",
19+
"https://onapsis.com/blog/active-exploitation-of-sap-vulnerability-cve-2025-31324/"
1920
]
2021
risk_score = 73
2122
rule_id = "23c53c4c-aa8b-4b07-85c0-fe46a9c8acaf"
@@ -54,9 +55,9 @@ process where event.type == "start" and file where host.os.type in ("linux", "wi
5455
"curl.exe",
5556
"certutil.exe") and
5657
(
57-
process.working_directory : ("/*/sap.com/*/servlet_jsp/irj/root/*", "*\\sap.com\\*\\servlet_jsp\\irj\\root\\*") or
58-
process.command_line : ("*/sap.com/*/servlet_jsp/irj/root/*", "*\\sap.com\\*\\servlet_jsp\\irj\\root\\*") or
59-
process.parent.command_line : ("*/sap.com/*/servlet_jsp/irj/root/*", "*\\sap.com\\*\\servlet_jsp\\irj\\root\\*")
58+
process.working_directory : ("/*/sap.com/*/servlet_jsp/irj/*", "*\\sap.com\\*\\servlet_jsp\\irj\\*") or
59+
process.command_line : ("*/sap.com/*/servlet_jsp/irj/*", "*\\sap.com\\*\\servlet_jsp\\irj\\*") or
60+
process.parent.command_line : ("*/sap.com/*/servlet_jsp/irj/*", "*\\sap.com\\*\\servlet_jsp\\irj\\*")
6061
)
6162
'''
6263
note = """## Triage and analysis

0 commit comments

Comments
 (0)