Share
## https://sploitus.com/exploit?id=29679EC9-9C5B-5910-8104-E911791DA3A6
# CVE-2022-21449
Zeek script to detect exploitation attempts of CVE-2022-21449 targeting TLS clients. Only works for TLS 1.2 and below.
## Install
`zkg install https://github.com/thack1/CVE-2022-21449`
## Run
Run against supplied pcap file:
`$ zeek -Cr pcaps/CVE-2022-21449.pcap CVE-2022-21449`
## Example Notices
```
#separator \x09
#set_separator ,
#empty_field (empty)
#unset_field -
#path notice
#open 2022-04-24-13-05-55
#fields ts uid id.orig_h id.orig_p id.resp_h id.resp_p fuid file_mime_type file_desc proto note msg sub src dst p n peer_descr actions email_dest suppress_for remote_location.country_code remote_location.region remote_location.city remote_location.latitude remote_location.longitude
#types time string addr port addr port string string string enum enum string string addr addr port count string set[enum] set[string] interval string string string double double
1650798355.280690 CrR9204TYgm1nkpJG1 192.168.125.154 59592 192.168.125.167 443 - - - tcp CVE_2022_21449::Null_Signature Null server signature; potential CVE-2022-21449 exploit attempt - 192.168.125.154 192.168.125.167 443 - - Notice::ACTION_LOG (empty) 3600.000000 - - - - -
#close 2022-04-24-13-14-45
```
## References
1. https://neilmadden.blog/2022/04/19/psychic-signatures-in-java/
1. https://github.com/khalednassar/CVE-2022-21449-TLS-PoC