CARVIEW |
Rule Category
SERVER-WEBAPP -- Snort has detected traffic exploiting vulnerabilities in web based applications on servers.
Alert Message
SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt
Rule Explanation
This rule looks for configuration files which match the exploit condition for some SharePoint servers.
What To Look For
This alert alerts on an attempt to trigger an authenticated, remote code execution vulnerability in Microsoft SharePoint Server.
Known Usage
No public information
False Positives
No known false positives
Contributors
Cisco Talos Intelligence Group
Rule Groups
MITRE::ATT&CK Framework::Enterprise::Execution::User Execution::Malicious File
An adversary may rely upon a user opening a malicious file in order to gain execution. Users may be subjected to social engineering to get them to open a file that will lead to code execution. This user action will typically be observed as follow-on behavior from Spearphishing Attachment. Adversaries may use several types of files that require a user to execute them, including .doc, .pdf, .xls, .rtf, .scr, .exe, .lnk, .pif, and .cpl.
T1204.002
MITRE::ATT&CK Framework::Enterprise::Initial Access::Exploit Public-Facing Application
Adversaries may attempt to take advantage of a weakness in an Internet-facing computer or program using software, data, or commands in order to cause unintended or unanticipated behavior. The weakness in the system can be a bug, a glitch, or a design vulnerability. These applications are often websites, but can include databases (like SQL), standard services (like SMB or SSH), network device administration and management protocols (like SNMP and Smart Install), and any other applications with Internet accessible open sockets, such as web servers and related services.
T1190
Rule Categories::Operating Systems::Windows
Rules for detecting attacks against the Windows operating system
Rule Categories::Server::Web Applications
Rules for detecting attacks against miscellaneous Web applications
CVE
Additional Links
Rule Vulnerability
Insecure Deserialization
Insecure Deserialization relates to web application security. Applications turn an object into data through serialization; the reverse of that process, deserialization, can be vulnerable to attacks when the application trusts the data that is being deserialized. Serialized data is machine readable and not encrypted; serialized user-supplied data should not be trusted. Deserialization attacks can lead to remote code execution.
CVE Additional Information
This product uses data from the NVD API but is not endorsed or certified by the NVD.
CVE-2021-40487 |
Loading description
|
|
|||||||||||||||||||||||
CVE-2025-21400 |
Loading description
|
|
|||||||||||||||||||||||
CVE-2025-29794 |
Loading description
|
|
MITRE ATT&CK Framework
Tactic: Initial Access
Technique: Exploit Public-Facing Application
For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org
©2025 Cisco and/or its affiliates. Snort, the Snort and Pig logo are registered trademarks of Cisco. All rights reserved.