
Summary
The rule named "Potential Shell via Wildcard Injection Detected" is designed to monitor the execution of specific Linux binaries that are known to be potentially vulnerable to wildcard injection attacks. Wildcard injection is a security vulnerability that allows attackers to manipulate command-line utilities by using wildcard characters (such as *, ?, []) to execute arbitrary commands or access sensitive data unintentionally. The rule specifically looks for occurrences where binaries like `tar`, `rsync`, and `zip` are called with suspicious command line flags indicative of wildcard injection, followed by the spawning of shell processes.
This rule utilizes a sequence query that tracks the execution of processes over a short time interval, ensuring that if a vulnerable binary is executed, it is followed by an attempt to spawn a shell. The setup requirements include data from Elastic Defend, which needs to be configured via Fleet. The risk score assigned to this rule is 47, indicating a moderate likelihood of privilege escalation or malicious execution attempts. Moreover, the rule aligns with the MITRE ATT&CK framework under the tactics of Privilege Escalation and Execution, referencing techniques that exploit vulnerabilities for unauthorized access and scripting manipulation.
Categories
- Linux
- Endpoint
Data Sources
- Process
- File
ATT&CK Techniques
- T1068
- T1059
Created: 2023-07-28