heroui logo

Potential exploitation of MOVEit CVE-2023-34362

Anvilogic Forge

View Source
Summary
This detection rule focuses on identifying potential exploitation attempts of CVE-2023-34362, a vulnerability within MOVEit Transfer, which allows an attacker to exploit legitimate components of the application by making requests involving 'moveitisapi/moveitisapi.dll' and 'guestaccess.aspx'. The exploitation can lead to unauthorized access or data manipulation via the web application. The Splunk logic utilizes the 'get_web_data' and 'get_web_data_waf' commands to search logs for these specific URIs, captures various attributes such as time, host information, source IP, and HTTP methods, and employs statistical functions to analyze incidents based on their geographical origin. The rule emphasizes the need to trigger alerts when matches for both the guest access page and the API DLL exist within a 30-second window, suggesting a potential malicious interaction that requires further investigation.
Categories
  • Web
  • Cloud
  • Application
Data Sources
  • Web Credential
  • Application Log
  • Network Traffic
ATT&CK Techniques
  • T1190
Created: 2024-02-09