Command injection vulnerability triggered
このページは日本語には対応しておりません。随時翻訳に取り組んでいます。翻訳に関してご質問やご意見ございましたら、お気軽にご連絡ください。
Goal
Detect successful exploits of the command injection vulnerability.
Strategy
Run a heuristic in the library (rule rasp-932-100
) to monitor shell command execution.
When the command executed appears to be controlled by the user (and that the control doesn’t appear legitimate), those specific commands are highlighted.
Since the exploit is proven and the attacker may be taking over the underlying infrastructure, the severity of the signal is set to CRITICAL
.
Triage and response
- Consider blocking the attacking IPs temporarily to slow down the further exploitation of your infrastructure.
- Consider switching the WAF rule
rasp-932-100
to blocking mode to prevent exploitation. - Leverage traces to determine the vulnerable codepath, and fix the code.