9 deprecated signatures:
CRITICAL | HTTP:HPE-CVE-2019-11941-EL | HTTP: HPE Intelligent Management Center CVE-2019-11941 Expression Language Injection | Removal Date: 09/07/2020 | Reason For Deprecation: Pattern covered in https://qnc-sigdb1.juniper.net/sigs/signature/20161/ |
HIGH | HTTP:CTS:HPE-IMC-EXP-LANG-INJ | HTTP: HPE IMC CustomReportTemplateSelectBean Expression Language Injection | Removal Date: 09/07/2020 | Reason For Deprecation: Covered in https://qnc-sigdb1.juniper.net/sigs/signature/20161/ |
HIGH | HTTP:CTS:HPE-IMC-EXPINJ | HTTP: HPE IMC devGroupSelect Expression Language Injection | Removal Date: 09/07/2020 | Reason For Deprecation: Covered in https://qnc-sigdb1.juniper.net/sigs/signature/20161/ |
HIGH | HTTP:CTS-HPE-IMC-RCE | HTTP: HPE Intelligent Management Center iccSelectCommand Expression Language Injection | Removal Date: 09/08/2020 | Reason For Deprecation: Covered in https://qnc-sigdb1.juniper.net/sigs/signature/20161/ |
CRITICAL | HTTP:MISC:HPE-IMC-ELINJ | HTTP: HPE Intelligent Management Center SoapConfigBean Expression Language Injection | Removal Date: 09/08/2020 | Reason For Deprecation: Covered in https://qnc-sigdb1.juniper.net/sigs/signature/20161/ |
HIGH | HTTP:HPE-IMCP-URL-RCE | HTTP: HPE Intelligent Management Center PlatNavigationToBean URL Expression Language Injection | Removal Date: 09/08/2020 | Reason For Deprecation: Covered in https://qnc-sigdb1.juniper.net/sigs/signature/20161/ |
HIGH | HTTP:HPE-INJECTION-RCE | HTTP: HPE Intelligent Management Center wmiConfigContent Expression Language Injection | Removal Date: 09/08/2020 | Reason For Deprecation: Covered in https://qnc-sigdb1.juniper.net/sigs/signature/20161/ |
HIGH | HTTP:CTS:HPE-IMC-FR-EL-CI | HTTP: HPE IMC ForwardRedirect Expression Language Injection | Removal Date: 09/08/2020 | Reason For Deprecation: Covered in https://qnc-sigdb1.juniper.net/sigs/signature/20161/ |
CRITICAL | HTTP:MISC:HPE-IMC-OPETATOR-CE | HTTP: HPE IMC OperatorGroupTreeSelectBean Expression Language Injection | Removal Date: 09/08/2020 | Reason For Deprecation: Covered in https://qnc-sigdb1.juniper.net/sigs/signature/20161/ |
Customers are suggested to remove the deprecated signatures from the IDP policy, if they are explicitly configured, other than Dynamic groups
4 new signatures:
HIGH | HTTP:SQL:INJ:VBULLETIN-NODEID | HTTP: vBulletin nodeId SQL Injection |
CRITICAL | HTTP:CTS:SAP-NETW-UN-AUTH-UC | HTTP: SAP NetWeaver Unauthenticated User Creation |
MEDIUM | HTTP:CTS:CITRIX-APP-DEL-AUTH-BY | HTTP: Citrix Application Delivery Controller Authorization bypass |
MEDIUM | HTTP:STC:ADOBE:CVE-2020-9606UAF | HTTP: Adobe Acrobat and Reader CVE-2020-9606 Use After Free |
9 new protocol anomalies:
MEDIUM | HTTP:OVERFLOW:ETAG | HTTP:Etag Header Overflow |
MEDIUM | HTTP:OVERFLOW:DATE | HTTP:Date Header Overflow |
MEDIUM | HTTP:OVERFLOW:ACCEPT_RANGES | HTTP:Accept ranges Header Overflow |
MEDIUM | LPR:ERROR:INVALID_FILE_SIZE | LPR:Invalid FileSize |
MEDIUM | MSN:ERROR:INVALID_CONTENT_LEN | MSN:Invalid Content Length Value |
MEDIUM | MSN:ERROR:INVALID_APP_ID | MSN:Invalid AppID |
MEDIUM | HTTP:FIRST-CHUNK-PREPADDING | HTTP:First Chunk Prepadding |
MEDIUM | HTTP:OVERFLOW:SOAPACTION | HTTP:Soapaction Header Overflow |
MEDIUM | HTTP:OVERFLOW:PROXY_AUTH | HTTP:Proxy authorization Header Overflow |
2 updated signatures:
HIGH | HTTP:IIS:CVE-2017-7269-RCE | HTTP: Microsoft IIS WebDAV ScStoragePathFromUrl Buffer Overflow |
MEDIUM | SMB:MS-SMBV3-COMP-INFO-DIS | SMB: Microsoft Windows SMBv3 Compression Information Disclosure |
This signature detects attempts to exploit a known vulnerability against vBulletin nodeID. A successful attack can lead to command injection and arbitrary code execution.
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, idp-5.1.110170603, vsrx-15.1
This anomaly triggers when a suspiciously long etag header is detected. The maximum length of this header, specified in the Sensor Setting Rulebase and can be configured in the Sensor Settings of the policy.
vsrx-12.1, vsrx-15.1, srx-12.1, vsrx-17.4, srx-17.4, vsrx3bsd-18.2, srx-18.2, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, srx-19.2, vsrx3bsd-19.2, vsrx-19.2, srx-17.3, vsrx-19.4, vsrx3bsd-19.4, srx-19.4, srx-branch-12.1, srx-branch-17.4, srx-branch-19.1, srx-branch-19.2, srx-branch-19.4
This anomaly triggers when a suspiciously long Accept-Ranges header is detected.The maximum length of this header, specified in the Sensor Setting Rulebase and can be configured in the Sensor Settings of the policy.
vsrx-12.1, vsrx-15.1, srx-12.1, vsrx-17.4, srx-17.4, vsrx3bsd-18.2, srx-18.2, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, srx-19.2, vsrx3bsd-19.2, vsrx-19.2, srx-17.3, vsrx-19.4, vsrx3bsd-19.4, srx-19.4, srx-branch-12.1, srx-branch-17.4, srx-branch-19.1, srx-branch-19.2, srx-branch-19.4
This signature detects attempts to exploit a known vulnerability against Microsoft Windows SMBv3 Compression. A successful attack can lead to sensitive information disclosure.
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, idp-5.0.0, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, isg-3.5.141818, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1
This anomaly triggers when a suspiciously long date header is detected. The maximum length of this header, specified in the Sensor Setting Rulebase and can be configured in the Sensor Settings of the policy.
vsrx-12.1, vsrx-15.1, srx-12.1, vsrx-17.4, srx-17.4, vsrx3bsd-18.2, srx-18.2, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, srx-19.2, vsrx3bsd-19.2, vsrx-19.2, srx-17.3, vsrx-19.4, vsrx3bsd-19.4, srx-19.4, srx-branch-12.1, srx-branch-17.4, srx-branch-19.1, srx-branch-19.2, srx-branch-19.4
This signature detects attempts to exploit a known vulnerability against Adobe Acrobat and Reader. A successful attack can lead to arbitrary code execution.
idp-5.1.110161014, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, vsrx3bsd-18.2, srx-18.2, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, srx-branch-19.1, vsrx-19.2, srx-19.2, srx-branch-19.2, vsrx3bsd-19.2, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, j-series-9.5, mx-11.4, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1
This anomaly triggers when LPR message receives file with Invalid size is detected.
vsrx-12.1, vsrx-15.1, srx-12.1, vsrx-17.4, srx-17.4, vsrx3bsd-18.2, srx-18.2, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, srx-19.2, vsrx3bsd-19.2, vsrx-19.2, srx-17.3, vsrx-19.4, vsrx3bsd-19.4, srx-19.4, srx-branch-12.1, srx-branch-17.4, srx-branch-19.1, srx-branch-19.2, srx-branch-19.4
This signature detects attempts to exploit a known vulnerability against Internet Information Services (IIS) 6.0 in Microsoft Windows Server 2003 R2. A successful attack can lead to arbitrary code execution.
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, isg-3.0.0, idp-5.1.110170603, vsrx-15.1
This anomaly triggers when a suspiciously long soapaction header is detected.The maximum length of this header, specified in the Sensor Setting Rulebase and can be configured in the Sensor Settings of the policy.
vsrx-12.1, vsrx-15.1, srx-12.1, vsrx-17.4, srx-17.4, vsrx3bsd-18.2, srx-18.2, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, srx-19.2, vsrx3bsd-19.2, vsrx-19.2, srx-17.3, vsrx-19.4, vsrx3bsd-19.4, srx-19.4, srx-branch-12.1, srx-branch-17.4, srx-branch-19.1, srx-branch-19.2, srx-branch-19.4
This signature detects attempts to exploit a known vulnerability against Citrix Application Delivery Controller. A successful attack can lead to Authentication bypass.
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, idp-5.1.110170603, vsrx-15.1
This signature detects attempts to exploit a known vulnerability against SAP NetWeaver. A successful attack can lead to unauthenticated user creation.
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, srx-19.4, vsrx3bsd-19.4, srx-branch-19.4, vsrx-19.4, vmx-19.4, mx-19.4, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1
This anomaly triggers when a suspiciously long proxy-authorization header is detected. The maximum length of this header, specified in the Sensor Setting Rulebase and can be configured in the Sensor Settings of the policy.
vsrx-12.1, vsrx-15.1, srx-12.1, vsrx-17.4, srx-17.4, vsrx3bsd-18.2, srx-18.2, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, srx-19.2, vsrx3bsd-19.2, vsrx-19.2, srx-17.3, vsrx-19.4, vsrx3bsd-19.4, srx-19.4, srx-branch-12.1, srx-branch-17.4, srx-branch-19.1, srx-branch-19.2, srx-branch-19.4
This protocol anomaly triggers when it detects extra characters before the 1st chunk of the chunked payload, which may indicate an evasion attempt
vsrx-12.1, vsrx-15.1, vsrx-17.4, vsrx-19.1, vsrx-19.2, vsrx-19.4, srx-branch-12.1, srx-branch-17.4, srx-branch-19.1, srx-branch-19.2, srx-branch-19.4
This anomaly triggers when MSN receives message with Invalid content length value detected.
vsrx-12.1, vsrx-15.1, srx-12.1, vsrx-17.4, srx-17.4, vsrx3bsd-18.2, srx-18.2, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, srx-19.2, vsrx3bsd-19.2, vsrx-19.2, srx-17.3, vsrx-19.4, vsrx3bsd-19.4, srx-19.4, srx-branch-12.1, srx-branch-17.4, srx-branch-19.1, srx-branch-19.2, srx-branch-19.4
This anomaly triggers when MSN receives message with Invalid AppID value detected.
vsrx-12.1, vsrx-15.1, srx-12.1, vsrx-17.4, srx-17.4, vsrx3bsd-18.2, srx-18.2, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, srx-19.2, vsrx3bsd-19.2, vsrx-19.2, srx-17.3, vsrx-19.4, vsrx3bsd-19.4, srx-19.4, srx-branch-12.1, srx-branch-17.4, srx-branch-19.1, srx-branch-19.2, srx-branch-19.4