
Summary
This rule is designed to detect potential exploitation attempts of curl CVE-2023-38545 by monitoring for specific command line arguments and unusual command line lengths used by the curl process on Linux systems. The vulnerability allows for a heap-based buffer overflow during the SOCKS5 proxy handshake for vulnerable curl versions (<= 8.3), which can lead to arbitrary code execution. The threat detection rule leverages Elastic's EQL to filter events where the curl process is invoked with specific proxy arguments or environment variables indicating the use of SOCKS5. The detection logic emphasizes identifying command lines that exceed 255 characters, suggesting potential exploitation attempts. It also cross-references known benign parent processes to reduce false positives. The rule prompts users to upgrade curl to version 8.4 or later to mitigate the identified vulnerability and includes guidance on how to capture relevant environment variables for deeper insights.
Categories
- Endpoint
- Linux
Data Sources
- Process
- Command
ATT&CK Techniques
- T1203
Created: 2023-10-11