ET EXPLOIT WS_FTP .NET Deserialization Exploit Attempt (CVE-2023-40044)Source: et/open
alert http $EXTERNAL_NET any -> [$HOME_NET,$HTTP_SERVERS] any (msg:"ET EXPLOIT WS_FTP .NET Deserialization Exploit Attempt (CVE-2023-40044)"; flow:established,to_server; http.method; content:"POST"; http.uri; content:"/AHT/AhtApiService.asmx/AuthUser"; fast_pattern; http.content_type; content:"multipart/form-data|3b|"; startswith; http.request_body; content:"Content-Disposition|3a 20|form-data|3b 20|name|3d|"; content:!"|3b 20|filename|3d|"; within:400; reference:cve,2023-40044; reference:url,www.assetnote.io/resources/research/rce-in-progress-ws-ftp-ad-hoc-via-iis-http-modules-cve-2023-40044; classtype:attempted-admin; sid:2048383; rev:1; metadata:affected_product WS_FTP, attack_target FTP_Server, created_at 2023_10_03, cve CVE_2023_40044, deployment Perimeter, deployment SSLDecrypt, former_category EXPLOIT, performance_impact Low, confidence High, signature_severity Major, updated_at 2023_10_03, reviewed_at 2023_10_03; target:dest_ip;)
Reference
CVECVE-2023-40044
URLhttp://www.assetnote.io/resources/research/rce-in-progress-ws-ftp-ad-hoc-via-iis-http-modules-cve-2023-40044
Metadata
affected_productWS_FTP
attack_targetFTP_Server
created_at2023_10_03
cveCVE_2023_40044
deploymentPerimeter
deploymentSSLDecrypt
former_categoryEXPLOIT
performance_impactLow
confidenceHigh
signature_severityMajor
updated_at2023_10_03
reviewed_at2023_10_03