- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
Tactic:
Detect successful exploits of the command injection vulnerability.
Command injection is an attack in which the goal is execution of arbitrary commands on the host operating system through a vulnerable application. Command injection attacks are possible when an application passes unsafe user parameters to a system shell. In this attack, the attacker-supplied operating system commands are usually executed with the privileges of the vulnerable application. Command injection attacks are possible largely due to insufficient input validation.
This detection rule is based on our Exploit Prevention feature. This feature leverages the context from the application to detect command injection 0-days in real time, at a very high level of accuracy. For each command executed or shell called by your application, the library reviews the user parameter for their presence in the command executed. If it finds a match, it’ll review whether the parameter changes how the command is parsed (i.e. does the parameter changes the meaning of the interpreted command). In case it does, the library will flag the command as exploited and prevent its execution (if it was configured in blocking mode). This detection can’t be bypassed by obfuscating the payload or by using different encoding techniques, both standard techniques to bypass WAFs.
The heuristic is controlled by rule rasp-932-100
and rasp-932-110
. When a match is detected, those specific requests are highlighted (@appsec.security_activity:vulnerability_trigger.command_injection
).
The severity of the signal is set to Critical
when the exploit is found since the exploit is proven and the attacker may be taking over the underlying infrastructure.
rasp-932-100
to blocking mode to prevent exploitation.rasp-932-100
and rasp-932-110
rule to blocking mode to prevent exploitation.