-
Notifications
You must be signed in to change notification settings - Fork 375
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #2945 from splunk/gitlab_release_v4.20.0
Gitlab release v4.20.0
- Loading branch information
Showing
21 changed files
with
407 additions
and
25 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
55 changes: 55 additions & 0 deletions
55
detections/web/access_to_vulnerable_ivanti_connect_secure_bookmark_endpoint.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,55 @@ | ||
name: Access to Vulnerable Ivanti Connect Secure Bookmark Endpoint | ||
id: 15838756-f425-43fa-9d88-a7f88063e81a | ||
version: 1 | ||
date: '2024-01-16' | ||
author: Michael Haag, Splunk | ||
status: production | ||
type: TTP | ||
data_source: [] | ||
description: This analytic monitors access to the /api/v1/configuration/users/user-roles/user-role/rest-userrole1/web/web-bookmarks/bookmark endpoint, a key indicator for both CVE-2023-46805 and CVE-2024-21887 vulnerabilities. It detects potential vulnerabilities by looking for a 403 Forbidden response with an empty body on this endpoint. This detection method is used in both Nmap script and Project Discovery Nuclei, with the latter focusing on systems where XML mitigation for these vulnerabilities has not been applied. | ||
search: '| tstats count min(_time) as firstTime max(_time) as lastTime from datamodel=Web where Web.url="*/api/v1/configuration/users/user-roles/user-role/rest-userrole1/web/web-bookmarks/bookmark*" Web.http_method=GET Web.status=403 by Web.src, Web.dest, Web.http_user_agent, Web.status, Web.url source | ||
| `drop_dm_object_name("Web")` | ||
| `security_content_ctime(firstTime)` | ||
| `security_content_ctime(lastTime)` | `access_to_vulnerable_ivanti_connect_secure_bookmark_endpoint_filter`' | ||
how_to_implement: This detection requires the Web datamodel to be populated from a supported Technology Add-On like Suricata, Splunk for Apache, Splunk for Nginx, or Splunk for Palo Alto. | ||
known_false_positives: This analytic is limited to HTTP Status 403; adjust as necessary. False positives may occur if the URI path is IP-restricted or externally blocked. It's recommended to review the context of the alerts and adjust the analytic parameters to better fit the specific environment. | ||
references: | ||
- https://github.com/RootUp/PersonalStuff/blob/master/http-vuln-cve2023-46805_2024_21887.nse | ||
- https://github.com/projectdiscovery/nuclei-templates/blob/c6b351e71b0fb0e40e222e97038f1fe09ac58194/http/misconfiguration/ivanti/CVE-2023-46085-CVE-2024-21887-mitigation-not-applied.yaml | ||
- https://github.com/rapid7/metasploit-framework/pull/18708/files | ||
tags: | ||
cve: | ||
- CVE-2023-46805 | ||
- CVE-2024-21887 | ||
analytic_story: | ||
- Ivanti Connect Secure VPN Vulnerabilities | ||
asset_type: VPN Appliance | ||
atomic_guid: [] | ||
confidence: 80 | ||
impact: 90 | ||
message: Possible exploitation of CVE-2023-46805 and CVE-2024-21887 against $dest$. | ||
mitre_attack_id: | ||
- T1190 | ||
observable: | ||
- name: dest | ||
type: Hostname | ||
role: | ||
- Victim | ||
product: | ||
- Splunk Enterprise | ||
- Splunk Enterprise Security | ||
- Splunk Cloud | ||
risk_score: 72 | ||
required_fields: | ||
- Web.src | ||
- Web.dest | ||
- Web.http_user_agent | ||
- Web.status | ||
- Web.url | ||
security_domain: network | ||
tests: | ||
- name: True Positive Test | ||
attack_data: | ||
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1190/ivanti/ivanti_bookmark_web_access.log | ||
source: suricata | ||
sourcetype: suricata |
57 changes: 57 additions & 0 deletions
57
detections/web/ivanti_connect_secure_command_injection_attempts.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,57 @@ | ||
name: Ivanti Connect Secure Command Injection Attempts | ||
id: 1f32a7e0-a060-4545-b7de-73fcf9ad536e | ||
version: 1 | ||
date: '2024-01-16' | ||
author: Michael Haag, Splunk | ||
status: production | ||
type: TTP | ||
data_source: [] | ||
description: This analytic is designed to identify the exploit phase of the CVE-2023-46805 and CVE-2024-21887 vulnerabilities. During this phase, a POST request is made to the /api/v1/totp/user-backup-code/../../system/maintenance/archiving/cloud-server-test-connection URI. This request exploits the command injection vulnerability to execute arbitrary commands. A successful request, indicated by a 200 OK response, suggests that the system is vulnerable. | ||
search: '| tstats count min(_time) as firstTime max(__time) as lastTime from datamodel=Web where Web.url="*/api/v1/totp/user-backup-code/../../system/maintenance/archiving/cloud-server-test-connection*" Web.http_method=POST Web.status=200 by Web.src, Web.dest, Web.http_user_agent, Web.url | ||
| `drop_dm_object_name("Web")` | ||
| `security_content_ctime(firstTime)` | ||
| `security_content_ctime(lastTime)` | ||
| `ivanti_connect_secure_command_injection_attempts_filter`' | ||
how_to_implement: This detection requires the Web datamodel to be populated from a supported Technology Add-On like Suricata, Splunk for Apache, Splunk for Nginx, or Splunk for Palo Alto. | ||
known_false_positives: This analytic is limited to HTTP Status 200; adjust as necessary. False positives may occur if the URI path is IP-restricted or externally blocked. It's recommended to review the context of the alerts and adjust the analytic parameters to better fit the specific environment. | ||
references: | ||
- https://github.com/RootUp/PersonalStuff/blob/master/http-vuln-cve2023-46805_2024_21887.nse | ||
- https://github.com/projectdiscovery/nuclei-templates/blob/c6b351e71b0fb0e40e222e97038f1fe09ac58194/http/misconfiguration/ivanti/CVE-2023-46085-CVE-2024-21887-mitigation-not-applied.yaml | ||
- https://github.com/rapid7/metasploit-framework/pull/18708/files | ||
- https://attackerkb.com/topics/AdUh6by52K/cve-2023-46805/rapid7-analysis | ||
- https://labs.watchtowr.com/welcome-to-2024-the-sslvpn-chaos-continues-ivanti-cve-2023-46805-cve-2024-21887/ | ||
tags: | ||
cve: | ||
- CVE-2023-46805 | ||
- CVE-2024-21887 | ||
analytic_story: | ||
- Ivanti Connect Secure VPN Vulnerabilities | ||
asset_type: VPN Appliance | ||
atomic_guid: [] | ||
confidence: 90 | ||
impact: 100 | ||
message: Possible exploitation of CVE-2023-46805 and CVE-2024-21887 against $dest$. | ||
mitre_attack_id: | ||
- T1190 | ||
observable: | ||
- name: dest | ||
type: Hostname | ||
role: | ||
- Victim | ||
product: | ||
- Splunk Enterprise | ||
- Splunk Enterprise Security | ||
- Splunk Cloud | ||
risk_score: 90 | ||
required_fields: | ||
- Web.src | ||
- Web.dest | ||
- Web.http_user_agent | ||
- Web.url | ||
security_domain: network | ||
tests: | ||
- name: True Positive Test | ||
attack_data: | ||
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1190/ivanti/suricata_ivanti_secure_connect_exploitphase.log | ||
source: suricata | ||
sourcetype: suricata |
55 changes: 55 additions & 0 deletions
55
detections/web/ivanti_connect_secure_system_information_access_via_auth_bypass.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,55 @@ | ||
name: Ivanti Connect Secure System Information Access via Auth Bypass | ||
id: d51c13dd-a232-4c83-a2bb-72ab36233c5d | ||
version: 1 | ||
date: '2024-01-16' | ||
author: Michael Haag, Splunk | ||
status: production | ||
type: Anomaly | ||
data_source: [] | ||
description: This analytic is designed to identify the "check phase" of the CVE-2023-46805 and CVE-2024-21887 vulnerabilities. During this phase, a GET request is made to the /api/v1/totp/user-backup-code/../../system/system-information URI. This request exploits the authentication bypass vulnerability to gain access to system information. A successful request, indicated by a 200 OK response, suggests that the system is vulnerable. | ||
search: '| tstats count min(_time) as firstTime max(_time) as lastTime from datamodel=Web where Web.url="*/api/v1/totp/user-backup-code/../../system/system-information*" Web.http_method=GET Web.status=200 by Web.src, Web.dest, Web.http_user_agent, Web.url | ||
| `drop_dm_object_name("Web")` | ||
| `security_content_ctime(firstTime)` | ||
| `security_content_ctime(lastTime)` | ||
| `ivanti_connect_secure_system_information_access_via_auth_bypass_filter`' | ||
how_to_implement: This detection requires the Web datamodel to be populated from a supported Technology Add-On like Suricata, Splunk for Apache, Splunk for Nginx, or Splunk for Palo Alto. | ||
known_false_positives: This analytic is limited to HTTP Status 200; adjust as necessary. False positives may occur if the URI path is IP-restricted or externally blocked. It's recommended to review the context of the alerts and adjust the analytic parameters to better fit the specific environment. | ||
references: | ||
- https://github.com/RootUp/PersonalStuff/blob/master/http-vuln-cve2023-46805_2024_21887.nse | ||
- https://github.com/projectdiscovery/nuclei-templates/blob/c6b351e71b0fb0e40e222e97038f1fe09ac58194/http/misconfiguration/ivanti/CVE-2023-46085-CVE-2024-21887-mitigation-not-applied.yaml | ||
- https://github.com/rapid7/metasploit-framework/pull/18708/files | ||
tags: | ||
cve: | ||
- CVE-2023-46805 | ||
- CVE-2024-21887 | ||
analytic_story: | ||
- Ivanti Connect Secure VPN Vulnerabilities | ||
asset_type: VPN Appliance | ||
atomic_guid: [] | ||
confidence: 80 | ||
impact: 90 | ||
message: Possible exploitation of CVE-2023-46805 and CVE-2024-21887 against $dest$. | ||
mitre_attack_id: | ||
- T1190 | ||
observable: | ||
- name: dest | ||
type: Hostname | ||
role: | ||
- Victim | ||
product: | ||
- Splunk Enterprise | ||
- Splunk Enterprise Security | ||
- Splunk Cloud | ||
risk_score: 72 | ||
required_fields: | ||
- Web.src | ||
- Web.dest | ||
- Web.http_user_agent | ||
- Web.url | ||
security_domain: network | ||
tests: | ||
- name: True Positive Test | ||
attack_data: | ||
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1190/ivanti/suricata_ivanti_secure_connect_checkphase.log | ||
source: suricata | ||
sourcetype: suricata |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,8 +1,8 @@ | ||
############# | ||
# Automatically generated by generator.py in splunk/security_content | ||
# On Date: 2024-01-10T18:42:59 UTC | ||
# On Date: 2024-01-17T18:35:46 UTC | ||
# Author: Splunk Threat Research Team - Splunk | ||
# Contact: research@splunk.com | ||
############# | ||
[content-version] | ||
version = 4.19.0 | ||
version = 4.20.0 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.