[Silicon Defense logo]

SnortSnarf signature page

SERVER-WEBAPP Jenkins Groovy metaprogramming remote code execution attempt

SnortSnarf v021111.1

Signature section (933)Top 20 source IPsTop 20 dest IPs

1 alerts with this signature using input module SnortFileInput, with sources:

Earliest such alert at 04:18:13.355261 on 05/02/2021
Latest such alert at 04:18:13.355261 on 05/02/2021

SERVER-WEBAPP Jenkins Groovy metaprogramming remote code execution attempt 1 sources 1 destinations
Priority: 1Classification: Attempted Administrator Privilege Gain
[sid:49499] [CVE:2019-1003002][Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-1003001][Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-1003000]

Sources triggering this attack signature

Source# Alerts (sig)# Alerts (total)# Dsts (sig)# Dsts (total)
193.38.50.2341711

Destinations receiving this attack signature

Destinations# Alerts (sig)# Alerts (total)# Srcs (sig)# Srcs (total)
192.168.0.3819291557

SnortSnarf brought to you courtesy of Silicon Defense
Authors: Jim Hoagland and Stuart Staniford
See also the Snort Page by Marty Roesch
Page generated at Tue Sep 28 08:01:02 2021