Validate SpringShell Vulnerabilities with Azure Network Security

Published May 03 2022 09:01 AM 1,197 Views
Microsoft

Author: Eliran Azulai, Principal Program Manager, Azure Networking 

Co-author: Gunjan Jain, Principal PM Manager, Azure Networking 

 

If you were wondering how to protect your resources from the latest Spring Framework exploits, this blog will guide you step-by-step on how to detect and protect against SpringShell vulnerabilities using our native network security services, Azure Firewall Premium and Azure Web Application. You can utilize one of these services or all of them for a Multi-layered security approach.

For more in-depth information on the SpringShell vulnerability and guidance for protection and detection, please check out the blog published by the Microsoft Threat Intelligence Team.

 

Prerequisites for each service

  1. Enable IDPS and TLS inspection on Azure Firewall Premium
  2. Enable SpringShell WAF rules on your Azure Front Door WAF (they are disabled by default):

- Rule group: MS-ThreatIntel-WebShells, Rule Id: 99005006 – Spring4Shell Interaction Attempt

- Rule group: MS-ThreatIntel-CVEs, Rule Id: 99001014 – Attempted Spring Cloud routing-expression injection (CVE-2022-22963)

- Rule group: MS-ThreatIntel-CVEs, Rule Id: 99001015 – Attempted Spring Framework unsafe class object exploitation (CVE-2022-22965)

- Rule group: MS-ThreatIntel-CVEs, Rule Id: 99001016 – Attempted Spring Cloud Gateway Actuator injection (CVE-2022-22947)

 

 

SaleemBseeu_0-1651512764366.png

 

 

    3. No need to enable SpringShell WAF rules on Azure Application Gateway WAF V2 as they are enabled by default:

- Rule Id: 800110 – Spring4Shell Interaction Attempt

- Rule Id: 800111 – Attempted Spring Cloud routing-expression injection – CVE-2022-22963

- Rule Id: 800112 – Attempted Spring Framework unsafe class object exploitation – CVE-2022-22965

- Rule Id: 800113 – Attempted Spring Cloud Gateway Actuator injection – CVE-2022-22947

 

SaleemBseeu_1-1651512764381.png

 

 

Testing the exploit in Azure Firewall Premium lab

To provide customers with a safe environment to simulate the exploits, we developed a lab setup built with an application that is vulnerable to the Spring4Shell exploit (CVE-2022-22965). You can follow the instructions provided in this GitHub repository to build your own setup.

 

SaleemBseeu_1-1651512335612.png

SaleemBseeu_0-1651514491639.png

  1. Setup requires deploying VNETs in hub-and-spoke model. Firewall, in the hub and spokes, is configured to forward traffic to the hub Firewall for inspection.
  2. Configure two Linux machines in the spokes as shown in the diagram above.
  3. Make sure the Spring application is available at http://localhost:8080/helloworld/greeting

 

                                       tobiotolorin_3-1651597074606.png

  1. Run the exploit.py script locally to view the exploit impact on the server, as shown below:

 

SaleemBseeu_4-1651512764394.png

 

  1. Run the exploit.py script across the network and verify Azure Firewall blocks the exploit.

 

SaleemBseeu_5-1651512764396.png

 

  1. Check out Premium Firewall logs to verify the exploit was blocked.

 

SaleemBseeu_6-1651512764447.png

 

 

 

Testing the exploit with Azure WAF on Azure Front Door

 

  1. Setup Azure Front Door with an attached WAF policy. You can use your existing Azure Front Door deployment or set up a new Azure Front Door with an attached WAF policy.
  2. Ensure WAF SpringShell rules are enabled to get protection from SpringShell threats.
  3. Replace domain name with your domain name in the following command and run the command in a browser to simulate the exploit:       

 

 https://www.<mydomain>.com/test.jsp?pwd=test\&cmd=cat+/secret/file

 

  1. Check Azure Front Door WAF logs to verify the exploit is blocked.

 

SaleemBseeu_7-1651512764491.png

 

 

Testing the exploit with Azure WAF on Azure Application Gateway

 

  1. Setup Azure Application Gateway WAF v2 with an attached WAF policy. You can use your existing Azure Application Gateway setup or create a new Azure Application Gateway with a WAF policy.  
  2. Replace domain name with your domain name in the following command and run the command in a browser to simulate the exploit:        

 

https://www.<mydomain>.com/test.jsp?pwd=test\&cmd=cat+/secret/file

 

  1. Check Azure Application Gateway WAF logs to verify the exploit is blocked.

 

SaleemBseeu_8-1651512764541.png

 

 

 

Learn More

Azure Firewall Premium and Azure WAF provide advanced threat protection capabilities to help detect and protect against SpringShell and other exploits. For more information on everything we covered above, please see the following documentation:

 

 

%3CLINGO-SUB%20id%3D%22lingo-sub-3300647%22%20slang%3D%22en-US%22%3EValidate%20SpringShell%20Vulnerabilities%20with%20Azure%20Network%20Security%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3300647%22%20slang%3D%22en-US%22%3E%3CP%3EAuthor%3A%20%3CA%20href%3D%22https%3A%2F%2Fazure.microsoft.com%2Fen-us%2Fblog%2Fauthor%2Feliran-azulai%2F%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%22%3EEliran%20Azulai%3C%2FA%3E%2C%20Principal%20Program%20Manager%2C%20Azure%20Networking%26nbsp%3B%3C%2FP%3E%0A%3CP%3ECo-author%3A%20%3CA%20href%3D%22https%3A%2F%2Fazure.microsoft.com%2Fen-us%2Fblog%2Fauthor%2Fgunjanj%2F%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%22%3EGunjan%20Jain%3C%2FA%3E%2C%20Principal%20PM%20Manager%2C%20Azure%20Networking%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIf%20you%20were%20wondering%20how%20to%20protect%20your%20resources%20from%20the%20latest%20Spring%20Framework%20exploits%2C%20this%20blog%20will%20guide%20you%20step-by-step%20on%20how%20to%20detect%20and%20protect%20against%20SpringShell%20vulnerabilities%20using%20our%20native%20network%20security%20services%2C%20Azure%20Firewall%20Premium%20and%20Azure%20Web%20Application.%20You%20can%20utilize%20one%20of%20these%20services%20or%20all%20of%20them%20for%20a%20Multi-layered%20security%20approach.%3C%2FP%3E%0A%3CP%3EFor%20more%20in-depth%20information%20on%20the%20SpringShell%20vulnerability%20and%20guidance%20for%20protection%20and%20detection%2C%20please%20check%20out%20the%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2022%2F04%2F04%2Fspringshell-rce-vulnerability-guidance-for-protecting-against-and-detecting-cve-2022-22965%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Eblog%3C%2FA%3E%20published%20by%20the%20Microsoft%20Threat%20Intelligence%20Team.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EPrerequisites%20for%20each%20service%3C%2FSTRONG%3E%3C%2FP%3E%0A%3COL%3E%0A%3CLI%3EEnable%20IDPS%20and%20TLS%20inspection%20on%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Ffirewall%2Fpremium-features%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EAzure%20Firewall%20Premium%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3EEnable%20SpringShell%20WAF%20rules%20on%20your%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fweb-application-firewall%2Fafds%2Fafds-overview%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EAzure%20Front%20Door%20WAF%3C%2FA%3E%20(they%20are%20disabled%20by%20default)%3A%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%20style%3D%22%20padding-left%20%3A%2060px%3B%20%22%3E%3CFONT%20size%3D%222%22%3E-%20Rule%20group%3A%3CEM%3E%20MS-ThreatIntel-WebShells%2C%20%3C%2FEM%3ERule%20Id%3A%2099005006%20%E2%80%93%20Spring4Shell%26nbsp%3BInteraction%26nbsp%3BAttempt%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%20style%3D%22%20padding-left%20%3A%2060px%3B%20%22%3E%3CFONT%20size%3D%222%22%3E-%20Rule%20group%3A%3CEM%3E%20MS-ThreatIntel-CVEs%2C%20%3C%2FEM%3ERule%20Id%3A%2099001014%20%E2%80%93%20Attempted%26nbsp%3BSpring%26nbsp%3BCloud%26nbsp%3Brouting-expression%26nbsp%3Binjection%26nbsp%3B(CVE-2022-22963)%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%20style%3D%22%20padding-left%20%3A%2060px%3B%20%22%3E%3CFONT%20size%3D%222%22%3E-%20Rule%20group%3A%3CEM%3E%20MS-ThreatIntel-CVEs%2C%20%3C%2FEM%3ERule%20Id%3A%2099001015%20%E2%80%93%20Attempted%26nbsp%3BSpring%26nbsp%3BFramework%26nbsp%3Bunsafe%26nbsp%3Bclass%26nbsp%3Bobject%26nbsp%3Bexploitation%26nbsp%3B(CVE-2022-22965)%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%20style%3D%22%20padding-left%20%3A%2060px%3B%20%22%3E%3CFONT%20size%3D%222%22%3E-%20Rule%20group%3A%3CEM%3E%20MS-ThreatIntel-CVEs%2C%20%3C%2FEM%3ERule%20Id%3A%2099001016%20%E2%80%93%20Attempted%26nbsp%3BSpring%26nbsp%3BCloud%26nbsp%3BGateway%26nbsp%3BActuator%26nbsp%3Binjection%26nbsp%3B(CVE-2022-22947)%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20style%3D%22%20padding-left%20%3A%20150px%3B%20%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22SaleemBseeu_0-1651512764366.png%22%20style%3D%22width%3A%20791px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F368601iD9DA19D49F3C4219%2Fimage-dimensions%2F791x398%3Fv%3Dv2%22%20width%3D%22791%22%20height%3D%22398%22%20role%3D%22button%22%20title%3D%22SaleemBseeu_0-1651512764366.png%22%20alt%3D%22SaleemBseeu_0-1651512764366.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%20%26nbsp%3B%203.%20No%20need%20to%20enable%20SpringShell%20WAF%20rules%20on%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fweb-application-firewall%2Fag%2Fag-overview%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EAzure%20Application%20Gateway%20WAF%3C%2FA%3E%20V2%20as%20they%20are%20enabled%20by%20default%3A%3C%2FP%3E%0A%3CP%20style%3D%22%20padding-left%20%3A%2060px%3B%20%22%3E%3CFONT%20size%3D%222%22%3E-%20Rule%20Id%3A%20800110%20%E2%80%93%26nbsp%3BSpring4Shell%26nbsp%3BInteraction%26nbsp%3BAttempt%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%20style%3D%22%20padding-left%20%3A%2060px%3B%20%22%3E%3CFONT%20size%3D%222%22%3E-%20Rule%20Id%3A%20800111%20%E2%80%93%20Attempted%20Spring%20Cloud%20routing-expression%20injection%20%E2%80%93%20CVE-2022-22963%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%20style%3D%22%20padding-left%20%3A%2060px%3B%20%22%3E%3CFONT%20size%3D%222%22%3E-%20Rule%20Id%3A%20800112%20%E2%80%93%20Attempted%20Spring%20Framework%20unsafe%20class%20object%20exploitation%20%E2%80%93%20CVE-2022-22965%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%20style%3D%22%20padding-left%20%3A%2060px%3B%20%22%3E%3CFONT%20size%3D%222%22%3E-%20Rule%20Id%3A%20800113%20%E2%80%93%20Attempted%20Spring%20Cloud%20Gateway%20Actuator%20injection%20%E2%80%93%20CVE-2022-22947%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20style%3D%22%20padding-left%20%3A%20150px%3B%20%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22SaleemBseeu_1-1651512764381.png%22%20style%3D%22width%3A%20819px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F368603iE274D2D07346C934%2Fimage-dimensions%2F819x371%3Fv%3Dv2%22%20width%3D%22819%22%20height%3D%22371%22%20role%3D%22button%22%20title%3D%22SaleemBseeu_1-1651512764381.png%22%20alt%3D%22SaleemBseeu_1-1651512764381.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ETesting%20the%20exploit%20in%20Azure%20Firewall%20Premium%20lab%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3ETo%20provide%20customers%20with%20a%20safe%20environment%20to%20simulate%20the%20exploits%2C%20we%20developed%20a%20lab%20setup%20built%20with%20an%20application%20that%20is%20vulnerable%20to%20the%20Spring4Shell%20exploit%20(CVE-2022-22965).%20You%20can%20follow%20the%20instructions%20provided%20in%20this%20%3CA%20href%3D%22https%3A%2F%2Fgithub.com%2Flunasec-io%2FSpring4Shell-POC%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EGitHub%20repository%3C%2FA%3E%20to%20build%20your%20own%20setup.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22SaleemBseeu_1-1651512335612.png%22%20style%3D%22width%3A%200px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F368596iB655087E6A2EA83D%2Fimage-size%2Fsmall%3Fv%3Dv2%26amp%3Bpx%3D200%22%20width%3D%220%22%20height%3D%220%22%20role%3D%22button%22%20title%3D%22SaleemBseeu_1-1651512335612.png%22%20alt%3D%22SaleemBseeu_1-1651512335612.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%20style%3D%22%20padding-left%20%3A%20270px%3B%20%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22SaleemBseeu_0-1651514491639.png%22%20style%3D%22width%3A%20495px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F368619i7DAFEEF4873BACB1%2Fimage-dimensions%2F495x306%3Fv%3Dv2%22%20width%3D%22495%22%20height%3D%22306%22%20role%3D%22button%22%20title%3D%22SaleemBseeu_0-1651514491639.png%22%20alt%3D%22SaleemBseeu_0-1651514491639.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3COL%3E%0A%3CLI%3ESetup%20requires%20deploying%20VNETs%20in%20hub-and-spoke%20model.%20Firewall%2C%20in%20the%20hub%20and%20spokes%2C%20is%20configured%20to%20forward%20traffic%20to%20the%20hub%20Firewall%20for%20inspection.%3C%2FLI%3E%0A%3CLI%3EConfigure%20two%20Linux%20machines%20in%20the%20spokes%20as%20shown%20in%20the%20diagram%20above.%3C%2FLI%3E%0A%3CLI%3EMake%20sure%20the%20Spring%20application%20is%20available%20at%20%3CA%20style%3D%22font-family%3A%20inherit%3B%20background-color%3A%20%23ffffff%3B%22%20href%3D%22http%3A%2F%2Flocalhost%3A8080%2Fhelloworld%2Fgreeting%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3Ehttp%3A%2F%2Flocalhost%3A8080%2Fhelloworld%2Fgreeting%3C%2FA%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22tobiotolorin_3-1651597074606.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F368918i2345544D269589C3%2Fimage-size%2Fmedium%3Fv%3Dv2%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22tobiotolorin_3-1651597074606.png%22%20alt%3D%22tobiotolorin_3-1651597074606.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3COL%3E%0A%3CLI%3ERun%20the%20exploit.py%20script%20locally%20to%20view%20the%20exploit%20impact%20on%20the%20server%2C%20as%20shown%20below%3A%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20style%3D%22%20padding-left%20%3A%20150px%3B%20%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22SaleemBseeu_4-1651512764394.png%22%20style%3D%22width%3A%20505px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F368606i3D677F080C964AF3%2Fimage-dimensions%2F505x188%3Fv%3Dv2%22%20width%3D%22505%22%20height%3D%22188%22%20role%3D%22button%22%20title%3D%22SaleemBseeu_4-1651512764394.png%22%20alt%3D%22SaleemBseeu_4-1651512764394.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3COL%20start%3D%225%22%3E%0A%3CLI%3ERun%20the%20exploit.py%20script%20across%20the%20network%20and%20verify%20Azure%20Firewall%20blocks%20the%20exploit.%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20style%3D%22%20padding-left%20%3A%20150px%3B%20%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22SaleemBseeu_5-1651512764396.png%22%20style%3D%22width%3A%20666px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F368605iCD14AC3E9F66331A%2Fimage-dimensions%2F666x89%3Fv%3Dv2%22%20width%3D%22666%22%20height%3D%2289%22%20role%3D%22button%22%20title%3D%22SaleemBseeu_5-1651512764396.png%22%20alt%3D%22SaleemBseeu_5-1651512764396.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3COL%20start%3D%226%22%3E%0A%3CLI%3ECheck%20out%20Premium%20Firewall%20logs%20to%20verify%20the%20exploit%20was%20blocked.%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20style%3D%22%20padding-left%20%3A%20150px%3B%20%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22SaleemBseeu_6-1651512764447.png%22%20style%3D%22width%3A%20800px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F368607i6F1A4ABD3CEE6152%2Fimage-dimensions%2F800x338%3Fv%3Dv2%22%20width%3D%22800%22%20height%3D%22338%22%20role%3D%22button%22%20title%3D%22SaleemBseeu_6-1651512764447.png%22%20alt%3D%22SaleemBseeu_6-1651512764447.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ETesting%20the%20exploit%20with%20Azure%20WAF%20on%20Azure%20Front%20Door%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3COL%3E%0A%3CLI%3ESetup%20Azure%20Front%20Door%20with%20an%20attached%20WAF%20policy.%20You%20can%20use%20your%20existing%20Azure%20Front%20Door%20deployment%20or%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fweb-application-firewall%2Fafds%2Fwaf-front-door-create-portal%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Eset%20up%20a%20new%20Azure%20Front%20Door%20with%20an%20attached%20WAF%20policy%3C%2FA%3E.%3C%2FLI%3E%0A%3CLI%3EEnsure%20WAF%20SpringShell%20rules%20are%20enabled%20to%20get%20protection%20from%20SpringShell%20threats.%3C%2FLI%3E%0A%3CLI%3EReplace%20domain%20name%20with%20your%20domain%20name%20in%20the%20following%20command%20and%20run%20the%20command%20in%20a%20browser%20to%20simulate%20the%20exploit%3A%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CPRE%20class%3D%22lia-code-sample%20language-markup%22%3E%3CCODE%3E%20https%3A%2F%2Fwww.%3CMYDOMAIN%3E.com%2Ftest.jsp%3Fpwd%3Dtest%5C%26amp%3Bcmd%3Dcat%2B%2Fsecret%2Ffile%3C%2FMYDOMAIN%3E%3C%2FCODE%3E%3C%2FPRE%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3COL%20start%3D%224%22%3E%0A%3CLI%3ECheck%20Azure%20Front%20Door%20WAF%20logs%20to%20verify%20the%20exploit%20is%20blocked.%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20style%3D%22%20padding-left%20%3A%20150px%3B%20%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22SaleemBseeu_7-1651512764491.png%22%20style%3D%22width%3A%20794px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F368609iD6BF5B3C66C44DDC%2Fimage-dimensions%2F794x324%3Fv%3Dv2%22%20width%3D%22794%22%20height%3D%22324%22%20role%3D%22button%22%20title%3D%22SaleemBseeu_7-1651512764491.png%22%20alt%3D%22SaleemBseeu_7-1651512764491.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ETesting%20the%20exploit%20with%20Azure%20WAF%20on%20Azure%20Application%20Gateway%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3COL%3E%0A%3CLI%3ESetup%20Azure%20Application%20Gateway%20WAF%20v2%20with%20an%20attached%20WAF%20policy.%20You%20can%20use%20your%20existing%20Azure%20Application%20Gateway%20setup%20or%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fweb-application-firewall%2Fag%2Fapplication-gateway-web-application-firewall-portal%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ecreate%20a%20new%20Azure%20Application%20Gateway%20with%20a%20WAF%20policy%3C%2FA%3E.%20%26nbsp%3B%3C%2FLI%3E%0A%3CLI%3EReplace%20domain%20name%20with%20your%20domain%20name%20in%20the%20following%20command%20and%20run%20the%20command%20in%20a%20browser%20to%20simulate%20the%20exploit%3A%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%26nbsp%3B%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CPRE%20class%3D%22lia-code-sample%20language-markup%22%3E%3CCODE%3Ehttps%3A%2F%2Fwww.%3CMYDOMAIN%3E.com%2Ftest.jsp%3Fpwd%3Dtest%5C%26amp%3Bcmd%3Dcat%2B%2Fsecret%2Ffile%3C%2FMYDOMAIN%3E%3C%2FCODE%3E%3C%2FPRE%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3COL%20start%3D%223%22%3E%0A%3CLI%3ECheck%20Azure%20Application%20Gateway%20WAF%20logs%20to%20verify%20the%20exploit%20is%20blocked.%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20style%3D%22%20padding-left%20%3A%20150px%3B%20%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22SaleemBseeu_8-1651512764541.png%22%20style%3D%22width%3A%20783px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F368608iD35DF72E8F3CD344%2Fimage-dimensions%2F783x323%3Fv%3Dv2%22%20width%3D%22783%22%20height%3D%22323%22%20role%3D%22button%22%20title%3D%22SaleemBseeu_8-1651512764541.png%22%20alt%3D%22SaleemBseeu_8-1651512764541.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ELearn%20More%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EAzure%20Firewall%20Premium%20and%20Azure%20WAF%20provide%20advanced%20threat%20protection%20capabilities%20to%20help%20detect%20and%20protect%20against%20SpringShell%20and%20other%20exploits.%20For%20more%20information%20on%20everything%20we%20covered%20above%2C%20please%20see%20the%20following%20documentation%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CSTRONG%3E%26nbsp%3B%3C%2FSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Ffirewall%2Fpremium-features%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3E%3CSTRONG%3EAzure%20Firewall%20Premium%20features%20%7C%20Microsoft%20Docs%3C%2FSTRONG%3E%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3E%26nbsp%3B%3C%2FSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Ffirewall%2Fpremium-deploy%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3E%3CSTRONG%3EDeploy%20and%20configure%20Azure%20Firewall%20Premium%20%7C%20Microsoft%20Docs%3C%2FSTRONG%3E%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fweb-application-firewall%2Fafds%2Fwaf-front-door-drs%3Ftabs%3Ddrs20%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3E%3CSTRONG%3EAzure%20WAF%20DRS%20rules%20documentation%20for%20Azure%20Front%20Door%3C%2FSTRONG%3E%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fweb-application-firewall%2Fag%2Fapplication-gateway-crs-rulegroups-rules%3Ftabs%3Dowasp32%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3E%3CSTRONG%3EAzure%20WAF%20CRS%20rules%20documentation%20for%20Azure%20Application%20Gateway%3C%2FSTRONG%3E%3C%2FA%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-3300647%22%20slang%3D%22en-US%22%3E%3CP%3EThis%20blog%20will%20guide%20you%20step-by-step%20on%20how%20to%20detect%20and%20protect%20against%20SpringShell%20vulnerabilities%20using%20our%20native%20network%20security%20services%2C%20Azure%20Firewall%20Premium%20and%20Azure%20Web%20Application.%20You%20can%20utilize%20one%20of%20these%20services%20or%20all%20of%20them%20for%20a%20Multi-layered%20security%20approach.%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22SaleemBseeu_1-1651512335612.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F368596iB655087E6A2EA83D%2Fimage-size%2Fmedium%3Fv%3Dv2%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22SaleemBseeu_1-1651512335612.png%22%20alt%3D%22SaleemBseeu_1-1651512335612.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-3300647%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAzure%20Firewall%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EAzure%20Network%20Security%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EAzure%20WAF%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Co-Authors
Version history
Last update:
‎May 03 2022 10:03 AM
Updated by: