Skip to content

Commit 576c889

Browse files
authored
chore: promote older rules status from experimental to test
1 parent 191ec93 commit 576c889

94 files changed

Lines changed: 94 additions & 94 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

rules-emerging-threats/2021/Exploits/CVE-2021-40444/file_event_win_exploit_cve_2021_40444.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
title: Suspicious Word Cab File Write CVE-2021-40444
22
id: 60c0a111-787a-4e8a-9262-ee485f3ef9d5
3-
status: experimental
3+
status: test
44
description: Detects file creation patterns noticeable during the exploitation of CVE-2021-40444
55
references:
66
- https://twitter.com/RonnyTNL/status/1436334640617373699?s=20

rules-emerging-threats/2023/Exploits/CVE-2023-2283/lnx_sshd_exploit_cve_2023_2283_libssh_authentication_bypass.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
title: Potential CVE-2023-2283 Exploitation
22
id: 8b244735-5833-4517-a45b-28d8c63924c0
3-
status: experimental
3+
status: test
44
description: Detects potential exploitation attempt of CVE-2023-2283 an authentication bypass in libSSH. The exploitation method causes an error message stating that keys for curve25519 could not be generated. It is an error message that is a sign of an exploitation attempt. It is not a sign of a successful exploitation.
55
references:
66
- https://twitter.com/kevin_backhouse/status/1666459308941357056?s=20

rules-emerging-threats/2023/Exploits/CVE-2023-25157/web_cve_2023_25157_geoserver_sql_injection.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
title: Potential CVE-2023-25157 Exploitation Attempt
22
id: c0341543-5ed0-4475-aabc-7eea8c52aa66
3-
status: experimental
3+
status: test
44
description: Detects a potential exploitation attempt of CVE-2023-25157 a SQL injection in GeoServer
55
references:
66
- https://github.com/win3zz/CVE-2023-25157

rules-emerging-threats/2023/Exploits/CVE-2023-27997/web_cve_2023_27997_pre_authentication_rce.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
title: Potential CVE-2023-27997 Exploitation Indicators
22
id: 31e4e649-7394-4fd2-9ae7-dbc61eebb550
3-
status: experimental
3+
status: test
44
description: |
55
Detects indicators of potential exploitation of CVE-2023-27997 in Frotigate weblogs.
66
To avoid false positives it is best to look for successive requests to the endpoints mentioned as well as weird values of the "enc" parameter

rules-emerging-threats/2023/Exploits/CVE-2023-34362-MOVEit-Transfer-Exploit/web_cve_2023_34362_known_payload_request.yml.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
title: MOVEit CVE-2023-34362 Exploitation Attempt - Potential Web Shell Request
22
id: 435e41f2-48eb-4c95-8a2b-ed24b50ec30b
3-
status: experimental
3+
status: test
44
description: Detects get requests to specific files used during the exploitation of MOVEit CVE-2023-34362
55
references:
66
- https://community.progress.com/s/article/MOVEit-Transfer-Critical-Vulnerability-31May2023

rules-emerging-threats/2023/Exploits/CVE-2023-36884/file_event_win_exploit_cve_2023_36884_office_windows_html_rce_file_patterns.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
title: Potential CVE-2023-36884 Exploitation Dropped File
22
id: 8023d3a2-dcdc-44da-8fa9-5c7906e55b38
3-
status: experimental
3+
status: test
44
description: Detects a specific file being created in the recent folder of Office. These files have been seen being dropped during potential exploitations of CVE-2023-36884
55
references:
66
- https://blogs.blackberry.com/en/2023/07/romcom-targets-ukraine-nato-membership-talks-at-nato-summit

rules-emerging-threats/2023/Exploits/CVE-2023-36884/proxy_exploit_cve_2023_36884_office_windows_html_rce.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
title: Potential CVE-2023-36884 Exploitation Pattern
22
id: 0066d244-c277-4c3e-88ec-9e7b777cc8bc
3-
status: experimental
3+
status: test
44
description: Detects a unique pattern seen being used by RomCom potentially exploiting CVE-2023-36884
55
references:
66
- https://blogs.blackberry.com/en/2023/07/romcom-targets-ukraine-nato-membership-talks-at-nato-summit

rules-emerging-threats/2023/Exploits/CVE-2023-36884/proxy_exploit_cve_2023_36884_office_windows_html_rce_extenstion_ip_pattern_traffic.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
title: Potential CVE-2303-36884 URL Request Pattern Traffic
22
id: d9365e39-febd-4a4b-8441-3ca91bb9d333
3-
status: experimental
3+
status: test
44
description: Detects a specific URL pattern containing a specific extension and parameters pointing to an IP address. This pattern was seen being used by RomCOM potentially exploiting CVE-2023-36884
55
references:
66
- https://blogs.blackberry.com/en/2023/07/romcom-targets-ukraine-nato-membership-talks-at-nato-summit

rules-emerging-threats/2023/Exploits/CVE-2023-36884/proxy_exploit_cve_2023_36884_office_windows_html_rce_traffic.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
title: Potential CVE-2023-36884 Exploitation - File Downloads
22
id: 6af1617f-c179-47e3-bd66-b28034a1052d
3-
status: experimental
3+
status: test
44
description: Detects files seen being requested by RomCom while potentially exploiting CVE-2023-36884
55
references:
66
- https://blogs.blackberry.com/en/2023/07/romcom-targets-ukraine-nato-membership-talks-at-nato-summit

rules-emerging-threats/2023/Exploits/CVE-2023-36884/proxy_exploit_cve_2023_36884_office_windows_html_rce_url_marker_traffic.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
title: Potential CVE-2023-36884 Exploitation - URL Marker
22
id: e59f71ff-c042-4f7a-8a82-8f53beea817e
3-
status: experimental
3+
status: test
44
description: Detects a unique URL marker seen being used by RomCom potentially exploiting CVE-2023-36884
55
references:
66
- https://blogs.blackberry.com/en/2023/07/romcom-targets-ukraine-nato-membership-talks-at-nato-summit

0 commit comments

Comments
 (0)