<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic False Positive on Sig 4689/1 Bash Environment Variable Command Injection in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/false-positive-on-sig-4689-1-bash-environment-variable-command/m-p/2546126#M45444</link>
    <description>&lt;P&gt;I am seeing what I believe is false positives on Sig 4689/1 outbound from our network. When I look at the traffic capture from events it does not seem to match inbound traffic events that fire on the same signature. The inbound traffic looks very much like what I think is the exploit code for the Bash injection vulnerability.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any one else seeing this on their systems?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;</description>
    <pubDate>Sun, 10 Mar 2019 13:14:47 GMT</pubDate>
    <dc:creator>mhanson2004</dc:creator>
    <dc:date>2019-03-10T13:14:47Z</dc:date>
    <item>
      <title>False Positive on Sig 4689/1 Bash Environment Variable Command Injection</title>
      <link>https://community.cisco.com/t5/network-security/false-positive-on-sig-4689-1-bash-environment-variable-command/m-p/2546126#M45444</link>
      <description>&lt;P&gt;I am seeing what I believe is false positives on Sig 4689/1 outbound from our network. When I look at the traffic capture from events it does not seem to match inbound traffic events that fire on the same signature. The inbound traffic looks very much like what I think is the exploit code for the Bash injection vulnerability.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any one else seeing this on their systems?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 13:14:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/false-positive-on-sig-4689-1-bash-environment-variable-command/m-p/2546126#M45444</guid>
      <dc:creator>mhanson2004</dc:creator>
      <dc:date>2019-03-10T13:14:47Z</dc:date>
    </item>
    <item>
      <title>I'm seeing things like this.</title>
      <link>https://community.cisco.com/t5/network-security/false-positive-on-sig-4689-1-bash-environment-variable-command/m-p/2546127#M45445</link>
      <description>&lt;P&gt;I'm seeing things like this. Whenever I look up the victim IPs they resolve to Amazon servers. It looks like a false positive to me also.&lt;/P&gt;&lt;P&gt;event_id = 1360033965674082135&lt;/P&gt;&lt;P&gt;severity = high&lt;/P&gt;&lt;P&gt;device_name = xxxxxxx&lt;/P&gt;&lt;P&gt;app_name = sensorApp&lt;/P&gt;&lt;P&gt;receive_time = 09/28/2014&amp;nbsp; 06:32:59&lt;/P&gt;&lt;P&gt;event_time = 09/28/2014 10:33:29&lt;/P&gt;&lt;P&gt;sensor_local_time = 09/28/2014 06:33:29&lt;/P&gt;&lt;P&gt;sig_id = 4689&lt;/P&gt;&lt;P&gt;subsig_id = 1&lt;/P&gt;&lt;P&gt;sig_name = Bash Environment Variable Command Injection sig_details = CVE-2014-6271 sig_version = S824 attacker_ip = xxx.xxx.xxx.xxx attacker_port = 50986 attacker_locality = OUT victim_ip = 54.204.5.190 victim_port = 80 victim_os = unknown unknown (relevant) victim_locality = OUT summary_count = 0 initial_alert_id = summary_type = is_final_alert = interface = GigabitEthernet0/1 vlan = 0 virtual_sensor = vs0 context = bGVicml0eWJhYmllcy5wZW9wbGUuY29tJTdDYWlkJTNEMjA4OTQ1JTdDY2glM0RiYWJpZXMlN0NzY2glM0RuZXdzJTdDcHR5cGUlM0Rjb250ZW50JTdDY3R5cGUlM0RibG9nJTdDcGFnZSUzRDElN0NzdWJqJTNEYmFiaWVzJTJDa2FueWUtd2VzdCUyQ2tpbS1rYXJkYXNoaWFuJTJDbmV3cyU3Q2NlbGViJTNEJTdDdW5pcXVlJTNEZnVuY3Rpb24rKCkrJTdCJTBBKysrKysrKysrKysrdmFyK2ErJTNEKyU1QiU1RCUyQ2srJTNEKzAlMkNlJTNCJTBBKysrKw==$&lt;/P&gt;&lt;P&gt;actions = droppedPacket+deniedFlow+tcpOneWayResetSent&lt;/P&gt;&lt;P&gt;alert_details = InterfaceAttributes:&amp;nbsp; context="single_vf" physical="Unknown" backplane="GigabitEthernet0/1" ; risk_rating_num = 100(TVR=medium ARR=relevant) threat_rating = 65 reputation = protocol = tcp&lt;/P&gt;</description>
      <pubDate>Mon, 29 Sep 2014 19:11:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/false-positive-on-sig-4689-1-bash-environment-variable-command/m-p/2546127#M45445</guid>
      <dc:creator>John Buchinsky</dc:creator>
      <dc:date>2014-09-29T19:11:29Z</dc:date>
    </item>
    <item>
      <title>I am starting to think that</title>
      <link>https://community.cisco.com/t5/network-security/false-positive-on-sig-4689-1-bash-environment-variable-command/m-p/2546128#M45446</link>
      <description>&lt;P&gt;I am starting to think that these are not false positives but some sort of call back to the control servers.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can anyone from Cisco chime in on this and provide more information please?&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;</description>
      <pubDate>Mon, 29 Sep 2014 19:39:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/false-positive-on-sig-4689-1-bash-environment-variable-command/m-p/2546128#M45446</guid>
      <dc:creator>mhanson2004</dc:creator>
      <dc:date>2014-09-29T19:39:04Z</dc:date>
    </item>
    <item>
      <title>How many are you getting? I</title>
      <link>https://community.cisco.com/t5/network-security/false-positive-on-sig-4689-1-bash-environment-variable-command/m-p/2546129#M45447</link>
      <description>&lt;P&gt;How many are you getting? I've only gotten a handful. We've got maybe 1000 machines and I might have gotten 7-8 notices since Friday. I got a handful on Friday afternoon, 1-2 on Sunday, and none today. The most I've ever gotten per IP is 2 notices.&lt;/P&gt;&lt;P&gt;We checked one of the machines out on Friday after we got 2 notices on it but didn't see any kind of malware/rootkits and we haven't gotten anything since from that IP.&lt;/P&gt;&lt;P&gt;I was thinking maybe it's something like the SQL Query in HTTP Request false positives that come from some Yahoo/Facebook traffic.&lt;/P&gt;</description>
      <pubDate>Mon, 29 Sep 2014 19:50:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/false-positive-on-sig-4689-1-bash-environment-variable-command/m-p/2546129#M45447</guid>
      <dc:creator>John Buchinsky</dc:creator>
      <dc:date>2014-09-29T19:50:50Z</dc:date>
    </item>
    <item>
      <title>We have gotten hundreds of</title>
      <link>https://community.cisco.com/t5/network-security/false-positive-on-sig-4689-1-bash-environment-variable-command/m-p/2546130#M45448</link>
      <description>&lt;P&gt;We have gotten hundreds of the alerts. We are at a university, and I just figured out that some Mac machines are vulnerable to the bash exploit.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am wondering if these are the machines that are tripping the signature when they&amp;nbsp;calling back to a C and C server?&lt;/P&gt;</description>
      <pubDate>Mon, 29 Sep 2014 20:18:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/false-positive-on-sig-4689-1-bash-environment-variable-command/m-p/2546130#M45448</guid>
      <dc:creator>mhanson2004</dc:creator>
      <dc:date>2014-09-29T20:18:12Z</dc:date>
    </item>
    <item>
      <title>I have also experiencing this</title>
      <link>https://community.cisco.com/t5/network-security/false-positive-on-sig-4689-1-bash-environment-variable-command/m-p/2546131#M45450</link>
      <description>&lt;P&gt;I have also experiencing this kind of problem.&lt;/P&gt;&lt;P&gt;We already patched the internal attacker IP and the events are still appearing.&lt;/P&gt;&lt;P&gt;Victim IPs are mostly to Amazon.&lt;/P&gt;</description>
      <pubDate>Tue, 30 Sep 2014 01:28:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/false-positive-on-sig-4689-1-bash-environment-variable-command/m-p/2546131#M45450</guid>
      <dc:creator>Jhun Banzuela</dc:creator>
      <dc:date>2014-09-30T01:28:49Z</dc:date>
    </item>
    <item>
      <title>in the example from</title>
      <link>https://community.cisco.com/t5/network-security/false-positive-on-sig-4689-1-bash-environment-variable-command/m-p/2546132#M45451</link>
      <description>&lt;P&gt;in the example from jbuchinsky below, we see javascript embedded in a POST body argument&lt;/P&gt;&lt;P&gt;%3Dfunction+()+%7B%0A&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;a new version of sig 4689-1 will be released in S825 which tighten the sig to only catch ()+%7B immediately after an = instead of anywhere in the POST body, thus ignoring these cases of javascript sent in http requests&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also it will reduce the SFR to 85 so these packets will not be denied by default&lt;/P&gt;</description>
      <pubDate>Tue, 30 Sep 2014 04:55:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/false-positive-on-sig-4689-1-bash-environment-variable-command/m-p/2546132#M45451</guid>
      <dc:creator>shepp</dc:creator>
      <dc:date>2014-09-30T04:55:47Z</dc:date>
    </item>
    <item>
      <title>Could you rephrase this</title>
      <link>https://community.cisco.com/t5/network-security/false-positive-on-sig-4689-1-bash-environment-variable-command/m-p/2546133#M45452</link>
      <description>&lt;P&gt;Could you rephrase this explanation for a&amp;nbsp;non-IT executive?&lt;/P&gt;&lt;P&gt;thx.&lt;/P&gt;</description>
      <pubDate>Wed, 01 Oct 2014 16:15:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/false-positive-on-sig-4689-1-bash-environment-variable-command/m-p/2546133#M45452</guid>
      <dc:creator>wgorman</dc:creator>
      <dc:date>2014-10-01T16:15:06Z</dc:date>
    </item>
  </channel>
</rss>

