alert http $EXTERNAL_NET any -> [$HOME_NET,$HTTP_SERVERS] any (msg:"ET EXPLOIT WS_FTP .NET Deserialization Exploit Attempt (CVE-2023-40044)"; flow:established,to_server; http.method; content:"POST"; http.uri; content:"/AHT/AhtApiService.asmx/AuthUser"; fast_pattern; http.content_type; content:"multipart/form-data|3b|"; startswith; http.request_body; content:"Content-Disposition|3a 20|form-data|3b 20|name|3d|"; content:!"|3b 20|filename|3d|"; within:400; reference:cve,2023-40044; reference:url,www.assetnote.io/resources/research/rce-in-progress-ws-ftp-ad-hoc-via-iis-http-modules-cve-2023-40044; classtype:attempted-admin; sid:2048383; rev:1; metadata:affected_product WS_FTP, attack_target FTP_Server, created_at 2023_10_03, cve CVE_2023_40044, deployment Perimeter, deployment SSLDecrypt, former_category EXPLOIT, performance_impact Low, confidence High, signature_severity Major, updated_at 2023_10_03, reviewed_at 2023_10_03; target:dest_ip;)
Metadata | |
---|
affected_product | WS_FTP |
attack_target | FTP_Server |
created_at | 2023_10_03 |
cve | CVE_2023_40044 |
deployment | Perimeter |
deployment | SSLDecrypt |
former_category | EXPLOIT |
performance_impact | Low |
confidence | High |
signature_severity | Major |
updated_at | 2023_10_03 |
reviewed_at | 2023_10_03 |