Analytics Story: Confluence Data Center and Confluence Server Vulnerabilities

Description

The following analytic story covers use cases for detecting and investigating potential attacks against Confluence Data Center and Confluence Server.

Why it matters

The analytic story of Confluence Data Center and Confluence Server encompasses a comprehensive approach to safeguarding these platforms from a variety of threats. By leveraging the analytics created in the project, security teams are equipped to detect, investigate, and respond to potential attacks that target Confluence environments.

Detections

Name ▲▼ Technique ▲▼ Type ▲▼
Windows Metasploit Confluence Plugin Execution Stage Capabilities, Web Shell, Exploit Public-Facing Application TTP
Windows Unusual File Creation in Confluence Directory Exploit Public-Facing Application, Upload Malware, Upload Tool Anomaly
Confluence Data Center and Server Privilege Escalation Exploit Public-Facing Application TTP
Confluence Pre-Auth RCE via OGNL Injection CVE-2023-22527 Exploit Public-Facing Application TTP
Confluence Unauthenticated Remote Code Execution CVE-2022-26134 Server Software Component, Exploit Public-Facing Application, External Remote Services TTP

Data Sources

Name ▲▼ Platform ▲▼ Sourcetype ▲▼ Source ▲▼
CrowdStrike ProcessRollup2 Other crowdstrike:events:sensor crowdstrike
Nginx Access Other nginx:plus:kv /var/log/nginx/access.log
Palo Alto Network Threat Network icon Network pan:threat not_applicable
Suricata Other suricata not_applicable
Sysmon EventID 1 Windows icon Windows XmlWinEventLog XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
Sysmon EventID 11 Windows icon Windows XmlWinEventLog XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
Windows Event Log Security 4688 Windows icon Windows XmlWinEventLog XmlWinEventLog:Security

References


Source: GitHub | Version: 1