ET EXPLOIT Zimbra postjournal RCE Attempt Inbound (CVE-2024-45519)Source: et/open
alert smtp any any -> [$HOME_NET,$SMTP_SERVERS] any (msg: "ET EXPLOIT Zimbra postjournal RCE Attempt Inbound (CVE-2024-45519)"; flow: established,to_server; content: "|0d 0a|RCPT|20|TO|3a 20|"; fast_pattern; content: "|24 28|"; within: 200; pcre: "/^RCPT\x20TO\x3a\x20.*?\x24\x28/mi"; reference: cve,2024-45519; classtype: attempted-admin; sid: 2056356; rev: 2; metadata: created_at 2024_09_30, cve CVE_2024_45519, confidence High, signature_severity Major, updated_at 2024_11_26, mitre_tactic_id TA0001, mitre_tactic_name Initial_Access, mitre_technique_id T1190, mitre_technique_name Exploit_Public_Facing_Application; target: dest_ip;)
References | |
---|---|
cve | 2024-45519 |
Metadata | |
---|---|
created_at | 2024_09_30 |
cve | CVE_2024_45519 |
confidence | High |
signature_severity | Major |
updated_at | 2024_11_26 |
mitre_tactic_id | TA0001 |
mitre_tactic_name | Initial_Access |
mitre_technique_id | T1190 |
mitre_technique_name | Exploit_Public_Facing_Application |
Views: 25