Skip to content

Instantly share code, notes, and snippets.

@Obsecurus
Last active May 28, 2020 15:48
Show Gist options
  • Select an option

  • Save Obsecurus/b4bdf1d99735a988810efbad68fd03c0 to your computer and use it in GitHub Desktop.

Select an option

Save Obsecurus/b4bdf1d99735a988810efbad68fd03c0 to your computer and use it in GitHub Desktop.

Revisions

  1. Obsecurus revised this gist Jun 19, 2019. No changes.
  2. Obsecurus revised this gist Jun 19, 2019. No changes.
  3. Obsecurus revised this gist Jun 19, 2019. No changes.
  4. Obsecurus revised this gist Jun 19, 2019. No changes.
  5. Obsecurus revised this gist Jun 19, 2019. No changes.
  6. Obsecurus created this gist Jun 19, 2019.
    1 change: 1 addition & 0 deletions exim-rce.rules
    Original file line number Diff line number Diff line change
    @@ -0,0 +1 @@
    alert smtp any any -> $SMTP_SERVERS any (msg:"ET EXPLOIT Possible Exim 4.87-4.91 RCE Attempt Inbound (CVE-2019-10149)"; flow:established,to_server; content:"RCPT|20|TO"; content:"|24 7b|run|7b|"; distance:0; fast_pattern; content:"|7d 7d 40|"; distance:0; content:"RCPT|20|TO|3a|"; pcre:"/^\s*\x24\x7brun\x7b[^\r\n]+\x7d{2}\x40/R"; metadata: former_category EXPLOIT; reference:url,www.qualys.com/2019/06/05/cve-2019-10149/return-wizard-rce-exim.txt; classtype:attempted-admin; sid:2027442; rev:1; metadata:attack_target SMTP_Server, deployment Perimeter, cve 2019_10149, signature_severity Major, created_at 2019_06_07, performance_impact Low, updated_at 2019_06_07;)