rule SUSP_EXPL_POC_VMWare_Workspace_ONE_CVE_2022_22954_Apr22 { meta: old_rule_name = "EXPL_POC_VMWare_Workspace_ONE_CVE_2022_22954_Apr22" description = "Detects payload as seen in PoC code to exploit Workspace ONE Access freemarker server-side template injection CVE-2022-22954" author = "Florian Roth" reference = "https://github.com/sherlocksecurity/VMware-CVE-2022-22954" reference2 = "https://twitter.com/rwincey/status/1512241638994853891/photo/1" date = "2022-04-08" modified = "2023-04-28" score = 70 id = "b7b7cefb-96f5-53f9-b6fc-6e798f557c5d" strings: $x1 = "66%72%65%65%6d%61%72%6b%65%72%2e%74%65%6d%70%6c%61%74%65%2e%75%74%69%6c%69%74%79%2e%45%78%65%63%75%74%65%22%3f%6e%65%77%28%29%28" ascii $x2 = "${\"freemarker.template.utility.Execute\"?new()(" $x3 = "cat /etc/passwd\")).(#execute=#instancemanager.newInstance(\"freemarker.template.utility.Execute" $x4 = "cat /etc/passwd\\\")).(#execute=#instancemanager.newInstance(\\\"freemarker.template.utility.Execute" $x5 = "cat /etc/shadow\")).(#execute=#instancemanager.newInstance(\"freemarker.template.utility.Execute" $x6 = "cat /etc/shadow\\\")).(#execute=#instancemanager.newInstance(\\\"freemarker.template.utility.Execute" condition: 1 of them }