
Summary
The JexBoss Command Sequence detection rule targets suspicious command sequences associated with the JexBoss web application vulnerability exploitation. Specifically, it captures instances where command injection attempts are executed through a shell. The rule operates on Linux systems and identifies two key selections: firstly, the execution of 'bash -c /bin/bash', which signifies the use of a bash command shell to execute additional commands, and secondly, the presence of '&/dev/tcp/', which is indicative of attempts to establish a reverse shell through TCP connections to listening services. The rule enforces both conditions, meaning that it will trigger alerts only when both patterns of behavior are detected simultaneously. Since JexBoss is designed for testing server vulnerabilities, this rule is critical in environments that may be subject to malicious exploitation attempts, particularly where server-side command execution vulnerabilities exist. It is advisable to review references such as the US-CERT analysis report for further context into the implications and background of such exploits.
Categories
- Linux
- Endpoint
- Cloud
Data Sources
- Process
- Network Traffic
- Logon Session
Created: 2017-08-24