Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add blocking of traffic caused by snort rule 58741 #373

Merged
merged 1 commit into from
Aug 23, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
3 changes: 3 additions & 0 deletions logsearch-jobs.yml
Original file line number Diff line number Diff line change
Expand Up @@ -41,6 +41,9 @@ instance_groups:
- 'suppress gen_id 1, sig_id 57907, track by_src, ip 127.0.0.1'
- 'suppress gen_id 1, sig_id 26275, track by_src, ip 127.0.0.1'
- 'suppress gen_id 1, sig_id 41495, track by_src, ip 127.0.0.1'
- 'suppress gen_id 1, sig_id 58741'
- 'drop tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-OTHER Apache Log4j logging remote code execution attempt"; flow:to_server,established; content:"${"; fast_pattern:only; http_client_body; pcre:"/\x24\x7b.{0,200}(%(25)?24|\x24)(%(25)?7b|\x7b).{0,200}(%(25)?3a|\x3a)(%(25)?(27|2d|5c|22)|[\x27\x2d\x5c\x22])*([jndi\x7d\x3a\x2d]|(%(25)?(7d|3a|2d))|(%(25)?5c|\x5c)u00[a-f0-9]{2}){1,4}(%(25)?(22|27)|[\x22\x27])?(%(25)?(3a|7d)|[\x3a\x7djndi])/Pi"; metadata:policy balanced-ips drop, policy connectivity-ips drop, policy max-detect-ips drop, policy security-ips drop, ruleset community, service http; reference:cve,2021-44228; reference:cve,2021-44832; reference:cve,2021-45046; reference:cve,2021-45105; classtype:attempted-user; sid:58741000; rev:6;)'

persistent_disk_type: logsearch_es_master
stemcell: default
azs: [z1]
Expand Down
3 changes: 3 additions & 0 deletions logsearch-platform-jobs.yml
Original file line number Diff line number Diff line change
Expand Up @@ -39,6 +39,9 @@ instance_groups:
- 'suppress gen_id 1, sig_id 57907, track by_src, ip 127.0.0.1'
- 'suppress gen_id 1, sig_id 26275, track by_src, ip 127.0.0.1'
- 'suppress gen_id 1, sig_id 41495, track by_src, ip 127.0.0.1'
- 'suppress gen_id 1, sig_id 58741'
- 'drop tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"SERVER-OTHER Apache Log4j logging remote code execution attempt"; flow:to_server,established; content:"${"; fast_pattern:only; http_client_body; pcre:"/\x24\x7b.{0,200}(%(25)?24|\x24)(%(25)?7b|\x7b).{0,200}(%(25)?3a|\x3a)(%(25)?(27|2d|5c|22)|[\x27\x2d\x5c\x22])*([jndi\x7d\x3a\x2d]|(%(25)?(7d|3a|2d))|(%(25)?5c|\x5c)u00[a-f0-9]{2}){1,4}(%(25)?(22|27)|[\x22\x27])?(%(25)?(3a|7d)|[\x3a\x7djndi])/Pi"; metadata:policy balanced-ips drop, policy connectivity-ips drop, policy max-detect-ips drop, policy security-ips drop, ruleset community, service http; reference:cve,2021-44228; reference:cve,2021-44832; reference:cve,2021-45046; reference:cve,2021-45105; classtype:attempted-user; sid:58741000; rev:6;)'

vm_type: logsearch_es_master
persistent_disk_type: logsearch_es_master
stemcell: default
Expand Down