Command injection exploited
Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel,
n'hésitez pas à nous contacter.
Goal
Detect successful exploits of the command injection vulnerability.
Command injection is an attack in which the goal is execution of arbitrary commands on the host operating system through a vulnerable application. Command injection attacks are possible when an application passes unsafe user parameters to a system shell. In this attack, the attacker-supplied operating system commands are usually executed with the privileges of the vulnerable application. Command injection attacks are possible largely due to insufficient input validation.
Strategy
This detection rule is based on our Exploit Prevention feature. This feature leverages the context from the application to detect command injection 0-days in real time, at a very high level of accuracy. For each command executed or shell called by your application, the library reviews the user parameter for their presence in the command executed. If it finds a match, it’ll review whether the parameter changes how the command is parsed (i.e. does the parameter changes the meaning of the interpreted command). In case it does, the library will flag the command as exploited and prevent its execution (if it was configured in blocking mode). This detection can’t be bypassed by obfuscating the payload or by using different encoding techniques, both standard techniques to bypass WAFs.
The heuristic is controlled by rule rasp-932-100
and rasp-932-110
. When a match is detected, those specific requests are highlighted (@appsec.security_activity:vulnerability_trigger.command_injection
).
The severity of the signal is set to Critical
when the exploit is found since the exploit is proven and the attacker may be taking over the underlying infrastructure.
Triage and response
- Consider blocking the attacking IPs temporarily to slow down the further exploitation of your infrastructure.
- Consider switching the WAF rule
rasp-932-100
to blocking mode to prevent exploitation. - Leverage traces to determine the vulnerable codepath, and fix the code.
Triage and response
- Review the route and the suspected injection. In some cases, applications are vulnerable on purpose. If this is the case and the feature is properly hardened, you can introduce a passlist to ignore this vulnerability on this route.
- If the attack isn’t expected, consider switching the
rasp-932-100
and rasp-932-110
rule to blocking mode to prevent exploitation. - Consider blocking the attacking IPs to slow down the further exploitation of your infrastructure.
- Leverage the stack trace to determine the vulnerable codepaths, and fix the code by preventing any unsanitized user input from being fed into a command.
- Review the commands executed by the attacker perform damage control.