FortiAnalyzer
FortiAnalyzer can receive logs and Windows host events directly from endpoints connected to EMS, and you can use FortiAnalyzer to analyze the logs and run reports.
fduncan
Staff
Staff
Article Id 262759
Description

This article describes how to use a custom event handler in FortiAnalyzer to raise alerts for incident response related to attacks that attempt to leverage the Apache RocketMQ Remote Command Execution Vulnerability. A report is also provided to gain historical visibility into the logs.

Scope

This article contains the files necessary to load an event handler and report into the FortiAnalyzer for either a Fabric ADOM or a FortiGate ADOM. The Fabric report and event handler leverage logs from other Fortinet products that can be used to detect the attack in addition to FortiGate logs.

Solution

What is included in Fortinet_ Apache RocketMQ Remote Command Execution Vulnerability.zip:

 

  1. Apache RocketMQ Remote Command Execution Vulnerability_event-handler.json.
    This event handler helps identify Apache RocketMQ Remote Command Execution Vulnerability detected by FortiGate and other Fortinet products.

  2. Apache RocketMQ Remote Command Execution Vulnerability _report.dat.
    This report displays the findings on Apache RocketMQ Remote Command Execution Vulnerability attacks from FortiGate and other Fortinet products. 

  3.  fgt_ Apache RocketMQ Remote Command Execution Vulnerability _event-handler.json.
    The event handler for FortiGate ADOMs is configured for FortiGate logs only.

  4. fgt_ Apache RocketMQ Remote Command Execution Vulnerability _report.dat.
    The report for FortiGate ADOMs includes FortiGate charts only.

  Steps:

  1. Download the Fortinet_Apache RocketMQ Remote Command Execution Vulnerability.zip file (contains 4 files).

  2. Unzip Fortinet_Apache RocketMQ Remote Command Execution Vulnerability.zip.

  3. Import Apache RocketMQ Remote Command Execution Vulnerability_event-handler.json or fgt_Apache RocketMQ Remote Command Execution Vulnerability_event-handler.json event handler:
  • Choose an ADOM (if ADOMs are enabled). The ADOM may have the Fabric or FortiGate type.
  • Choose the FortiSOC module. 
  • Select Event Handler List.
  • Select the Import option under More.
  • Select the appropriate event handler depending on the ADOM type:

 

fduncan_0-1688586757837.png

 

Result:

The event handler is enabled and will be triggered if the appropriate logs are received following the import of the event handler. 

Edit the event handler to customize the notification section.

  1. Import Apache RocketMQ Remote Command Execution Vulnerability_report.dat or fgt_Apache RocketMQ Remote Command Execution Vulnerability_report.dat to Reports:
  • Choose an ADOM (if ADOMs are enabled). The ADOM may have the Fabric or FortiGate type.
  • Choose the Report module.
  • Select the Import option under 'More'.
  • Select the appropriate file for the ADOM type to add the report to the ADOM:

 

fduncan_1-1688586757840.png

Result

The Apache RocketMQ RCE Report can be run anytime as determined by an admin user.