High Severity
Attachment: SVG file execution
Description
Detects file execution attempts in SVG files. ActiveXObject is used to invoke WScript.Shell and run a program.
Sublime Security
Created Aug 17th, 2023 • Last updated Aug 21st, 2023
Feed Source
Sublime Core Feed
Source
type.inbound
and any(attachments,
(.file_extension =~ "svg" or .file_extension in $file_extensions_common_archives)
and any(file.explode(.),
.file_extension == "svg"
// Author Matt harr0ey @harr0ey
// Topic: SVG file Execution
// WScript inside SVG
// <script language="JScript">
// <![CDATA[
// var r = new ActiveXObject("WScript.Shell").Run("calc.exe")
// ]]>
// </script>
and any(.scan.strings.strings, strings.icontains(., "ActiveXObject"))
and any(.scan.strings.strings, strings.icontains(., "WScript.Shell"))
and any(.scan.strings.strings, strings.like(., "*Run*", "*Execute*"))
)
)
Playground
Test against your own EMLs or sample data.