You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: rules/network/execution_potential_rce_via_toolshell.toml
+13-6Lines changed: 13 additions & 6 deletions
Original file line number
Diff line number
Diff line change
@@ -7,24 +7,28 @@ updated_date = "2025/07/23"
7
7
[rule]
8
8
author = ["Elastic"]
9
9
description = """
10
-
Detects potential remote code execution (RCE) attempts targeting IIS web servers running SharePoint via malicious VIEWSTATE payloads in HTTP POST requests. Attackers may exploit insecure deserialization in the VIEWSTATE parameter to execute arbitrary code. This rule identifies suspicious requests containing VIEWSTATE data and other indicators of exploitation, specifically those associated with the Toolshell exploit chain. Toolshell leverages vulnerabilities (CVE-2025-53770 and CVE-2025-53771) for initial access, enabling adversaries to deploy a webshell, steal machine keys, sign VIEWSTATE payloads offline, and subsequently send signed payloads to the server to achieve code execution.
10
+
Detects potential remote code execution (RCE) attempts targeting IIS web servers running SharePoint via malicious
11
+
VIEWSTATE payloads in HTTP POST requests. Attackers may exploit insecure deserialization in the VIEWSTATE parameter to
12
+
execute arbitrary code. This rule identifies suspicious requests containing VIEWSTATE data and other indicators of
13
+
exploitation, specifically those associated with the Toolshell exploit chain. Toolshell leverages vulnerabilities
14
+
(CVE-2025-53770 and CVE-2025-53771) for initial access, enabling adversaries to deploy a webshell, steal machine keys,
15
+
sign VIEWSTATE payloads offline, and subsequently send signed payloads to the server to achieve code execution.
11
16
"""
12
17
from = "now-9m"
13
18
index = ["logs-network_traffic.http*"]
14
19
language = "kuery"
15
20
license = "Elastic License v2"
16
21
max_signals = 10
17
22
name = "Potential VIEWSTATE RCE Attempt on SharePoint/IIS"
This rule requires network traffic logs to be collected from HTTP endpoints, focusing on IIS web servers and SharePoint sites. Ensure logging captures HTTP request and response details, including headers and request bodies for POST requests. Monitoring VIEWSTATE content is critical for detecting deserialization attacks.
30
34
"""
@@ -38,6 +42,7 @@ tags = [
38
42
]
39
43
timestamp_override = "event.ingested"
40
44
type = "query"
45
+
41
46
query = '''
42
47
data_stream.dataset : "network_traffic.http" and
43
48
network.direction: "ingress" and
@@ -49,15 +54,17 @@ data_stream.dataset : "network_traffic.http" and
This rule requires network traffic logs to be collected from HTTP endpoints, specifically focusing on IIS web servers. Ensure that your network traffic logging is configured to capture HTTP request and response details, including request and response headers. Additionally, request bodies are necessary for content-type `application/x-www-form-urlencoded` to detect potential exploit attempts.
34
31
"""
@@ -42,6 +39,7 @@ tags = [
42
39
]
43
40
timestamp_override = "event.ingested"
44
41
type = "query"
42
+
45
43
query = '''
46
44
data_stream.dataset : "network_traffic.http" and
47
45
url.path: /_layouts*ToolPane.aspx and
@@ -53,15 +51,17 @@ data_stream.dataset : "network_traffic.http" and
0 commit comments