Snort mailing list archives

SNORT sig to cover the latest Chrome\FF Webex Vulnerability


From: joshua burgess <avonyxx () hotmail com>
Date: Tue, 24 Jan 2017 19:22:03 +0000

So this is what I came up with to cover the latest vulnerability disclosed by Tavis regarding the Webex plugin in 
Chrome\FF.


Let me know what you think:

alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"STE-5803 - Cisco: Magic WebEx URL"; 
flow:established,to_server; content:"GET"; http_method; 
content:"cwcsf-nativemsg-iframe-43c85c0d-d633-af5e-c056-32dc7efc570b.html"; within:70; content:"HTTP/1.1"; within:15; 
content:"User-Agent|3a| WebExRA"; http_header; content:!".webex.com"; http_header; content:!"webex.com"; http_header; 
reference:url,https://bugs.chromium.org/p/project-zero/issues/detail?id=1096; classtype:trojan-activity; sid:6000051; 
rev:1;)



Backstory:

https://bugs.chromium.org/p/project-zero/issues/detail?id=1096

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, SlashDot.org! http://sdm.link/slashdot
_______________________________________________
Snort-sigs mailing list
Snort-sigs () lists sourceforge net
https://lists.sourceforge.net/lists/listinfo/snort-sigs

http://www.snort.org

Please visit http://blog.snort.org for the latest news about Snort!

Visit the Snort.org to subscribe to the official Snort ruleset, make sure to stay up to date to catch the most <a 
href=" https://snort.org/downloads/#rule-downloads";>emerging threats</a>!

Current thread: