The Cloud Armor WAF rules use a variety of techniques to detect attempted obfuscations and bypasses within attempted exploits of CVE-2021-44228.
Snort Rules in server-web and server-other detect Log4j aswell. As long as traffic is not end to end encrypted.https://www.snort.org/advisories/talos-rules-2021-12-11
Quote from: XeroX on December 13, 2021, 04:06:43 pmSnort Rules in server-web and server-other detect Log4j aswell. As long as traffic is not end to end encrypted.https://www.snort.org/advisories/talos-rules-2021-12-11are you using Snort on Opns? i am having issues with Suricata.
It is possible to detect and block the log4j hacking attempts with the OPNSense firewall (or other parts) rules?
[Drop] [1:2034672:1] ET EXPLOIT Apache log4j RCE Attempt - 2021/12/12 Obfuscation Observed M1 (CVE-2021-44228) [Classification: Attempted Administrator Privilege Gain] [Priority: 1] {UDP} 10.10.x.1:51488 -> 10.10.x.69:516
Quote from: Julien on December 14, 2021, 03:12:44 pmQuote from: XeroX on December 13, 2021, 04:06:43 pmSnort Rules in server-web and server-other detect Log4j aswell. As long as traffic is not end to end encrypted.https://www.snort.org/advisories/talos-rules-2021-12-11are you using Snort on Opns? i am having issues with Suricata.3.x rules what are those? Thank youNo I'm using suricata with additional Snort Rules. Use 29190. Don't use 3.x rules.