<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Joomla Remote Code Execution - CVE-2015-8562 in Custom Signatures</title>
    <link>https://live.paloaltonetworks.com/t5/custom-signatures/joomla-remote-code-execution-cve-2015-8562/m-p/69823#M34</link>
    <description>&lt;P&gt;FYI, content release 547 which was released today (12/23/2015) contains dections for this vulnerability. ID 38640 &amp;amp; 38638.&lt;/P&gt;</description>
    <pubDate>Wed, 23 Dec 2015 21:14:26 GMT</pubDate>
    <dc:creator>kalakai</dc:creator>
    <dc:date>2015-12-23T21:14:26Z</dc:date>
    <item>
      <title>Joomla Remote Code Execution - CVE-2015-8562</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/joomla-remote-code-execution-cve-2015-8562/m-p/69551#M33</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I created a custom vulnerability signature that helps to detect and block the recently discovered &lt;A href="https://developer.joomla.org/security-centre/630-20151214-core-remote-code-execution-vulnerability.html" target="_blank"&gt;Joomla RCE zero day&lt;/A&gt;&amp;nbsp;which has since been patched by the vendor. I've opened a case with an engineer and he suggesed some additional protections until an official signature is released. The engineer suggested I post it here so that other people may benefit.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It checks for the following http headers in a GET request:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;JDatabaseDriverMysqli&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;JSimplepieFactory&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;disconnectHandlers&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;eval(base64_decode($_POST[111]))&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I don't see an option to upload the .xml so here is the full xml code, sorry for the length:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;&amp;lt;vulnerability-threat version="6.1.0"&amp;gt;
  &amp;lt;entry name="41001"&amp;gt;
    &amp;lt;signature&amp;gt;
      &amp;lt;standard&amp;gt;
        &amp;lt;entry name="Suspicious HTTP Header"&amp;gt;
          &amp;lt;and-condition&amp;gt;
            &amp;lt;entry name="And Condition 1"&amp;gt;
              &amp;lt;or-condition&amp;gt;
                &amp;lt;entry name="Or Condition 1"&amp;gt;
                  &amp;lt;operator&amp;gt;
                    &amp;lt;pattern-match&amp;gt;
                      &amp;lt;qualifier&amp;gt;
                        &amp;lt;entry name="http-method"&amp;gt;
                          &amp;lt;value&amp;gt;GET&amp;lt;/value&amp;gt;
                        &amp;lt;/entry&amp;gt;
                      &amp;lt;/qualifier&amp;gt;
                      &amp;lt;pattern&amp;gt;((JDatabaseDriverMysqli)|(JSimplepieFactory)|(disconnectHandlers))&amp;lt;/pattern&amp;gt;
                      &amp;lt;context&amp;gt;http-req-headers&amp;lt;/context&amp;gt;
                    &amp;lt;/pattern-match&amp;gt;
                  &amp;lt;/operator&amp;gt;
                &amp;lt;/entry&amp;gt;
                &amp;lt;entry name="Or Condition 2"&amp;gt;
                  &amp;lt;operator&amp;gt;
                    &amp;lt;pattern-match&amp;gt;
                      &amp;lt;qualifier&amp;gt;
                        &amp;lt;entry name="http-method"&amp;gt;
                          &amp;lt;value&amp;gt;GET&amp;lt;/value&amp;gt;
                        &amp;lt;/entry&amp;gt;
                      &amp;lt;/qualifier&amp;gt;
                      &amp;lt;pattern&amp;gt;eval(base64_decode($_POST[111]))&amp;lt;/pattern&amp;gt;
                      &amp;lt;context&amp;gt;http-req-headers&amp;lt;/context&amp;gt;
                    &amp;lt;/pattern-match&amp;gt;
                  &amp;lt;/operator&amp;gt;
                &amp;lt;/entry&amp;gt;
              &amp;lt;/or-condition&amp;gt;
            &amp;lt;/entry&amp;gt;
          &amp;lt;/and-condition&amp;gt;
          &amp;lt;order-free&amp;gt;no&amp;lt;/order-free&amp;gt;
          &amp;lt;scope&amp;gt;protocol-data-unit&amp;lt;/scope&amp;gt;
          &amp;lt;comment&amp;gt;User agent strings identified in the reference link&amp;lt;/comment&amp;gt;
        &amp;lt;/entry&amp;gt;
      &amp;lt;/standard&amp;gt;
    &amp;lt;/signature&amp;gt;
    &amp;lt;default-action&amp;gt;
      &amp;lt;drop-packets/&amp;gt;
    &amp;lt;/default-action&amp;gt;
    &amp;lt;cve&amp;gt;
      &amp;lt;member&amp;gt;CVE-2015-8562&amp;lt;/member&amp;gt;
    &amp;lt;/cve&amp;gt;
    &amp;lt;reference&amp;gt;
      &amp;lt;member&amp;gt;https://wp.me/p3AjUX-u58&amp;lt;/member&amp;gt;
    &amp;lt;/reference&amp;gt;
    &amp;lt;vendor&amp;gt;
      &amp;lt;member&amp;gt;Joomla&amp;lt;/member&amp;gt;
    &amp;lt;/vendor&amp;gt;
    &amp;lt;threatname&amp;gt;Joomla CVE-2015-8562&amp;lt;/threatname&amp;gt;
    &amp;lt;severity&amp;gt;critical&amp;lt;/severity&amp;gt;
    &amp;lt;direction&amp;gt;client2server&amp;lt;/direction&amp;gt;
    &amp;lt;comment&amp;gt;Remote Code Execution Vulnerability. This signature is only a band-aid per the link in the reference below.&amp;lt;/comment&amp;gt;
    &amp;lt;affected-host&amp;gt;
      &amp;lt;server&amp;gt;yes&amp;lt;/server&amp;gt;
    &amp;lt;/affected-host&amp;gt;
  &amp;lt;/entry&amp;gt;
&amp;lt;/vulnerability-threat&amp;gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Dec 2015 18:21:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/joomla-remote-code-execution-cve-2015-8562/m-p/69551#M33</guid>
      <dc:creator>kalakai</dc:creator>
      <dc:date>2015-12-16T18:21:36Z</dc:date>
    </item>
    <item>
      <title>Re: Joomla Remote Code Execution - CVE-2015-8562</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/joomla-remote-code-execution-cve-2015-8562/m-p/69823#M34</link>
      <description>&lt;P&gt;FYI, content release 547 which was released today (12/23/2015) contains dections for this vulnerability. ID 38640 &amp;amp; 38638.&lt;/P&gt;</description>
      <pubDate>Wed, 23 Dec 2015 21:14:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/joomla-remote-code-execution-cve-2015-8562/m-p/69823#M34</guid>
      <dc:creator>kalakai</dc:creator>
      <dc:date>2015-12-23T21:14:26Z</dc:date>
    </item>
  </channel>
</rss>

