We've noticed attempted injection attacks on one of our servers and even though 
the virus scanners are halting the execution of the malicious code, there is 
still a level of penetration that we are trying to stop.

Can anyone give me an idea why this url is not triggering the Rewrite rule 
below?

The intent is to redirect any url containing references to cmd.exe, ftp.exe, 
any .bat file, or anything with a SQL Query embedded back to just pull up the 
site's homepage.

(Note : it is not the actual attack URL, but one that was modified to generate 
a harmless file, but still mimic the attack method)

https://[IP 
redacted]/appname/disabilityInfo.action?redirect:$%7b(new+java.lang.ProcessBuilder(new+java.lang.String%5b%5d%7b%27cmd.exe%27%2C%20%27%2Fd%20%2Fc%20md%20rewritetest%26cd%20rewritetest%26del%20*.*%20%2Ff%20%2Fs%20%2Fq%26echo%20bartsimpson.eat.my.shorts%20%3Ej%26echo%20homer%20%3E%3Ej%26echo%20mmmdoughnuts%20%3E%3Ej%26echo%20mget%20*.exe%20%3E%3Ej%26echo%20bye%20%3E%3Ej%26echo%20for%20%25%25i%20in%20(*.exe)%20do%20start%20%25%25i%20%3ED.bat%26echo%20for%20%25%25i%20in%20(*.exe)%20do%20%25%25i%20%3E%3ED.bat%26echo%20del%20%2Ff%20%2Fq%20%250%25%20%3E%3ED.bat%26D.bat%27%7D)).start()%7D


RewriteCond %{QUERY_STRING} 
.*(java\.lang|FTP\.exe|cmd\.exe|\.bat|\.exe|insert|delete|set|declare|drop|update).*
 [NC]
RewriteRule ^(.*)$ https://[IP redacted]/ [F,L]


Any help would be greatly appreciated.

Jeff Cabell
Applications Administrator

Reply via email to