Command injection is an attack technique that allows an attacker to inject and execute commands in the vulnerable application. An attacker can exploit command injection vulnerability with a command sequence appended to the appropriate format or escape string to execute arbitrary commands. Successful exploitation results in a system compromise, disclosure or modification of data.
Apply associated Trend Micro DPI Rules.
Trend Micro Deep Security DPI Rule Number: 1005934
Trend Micro Deep Security DPI Rule Name: 1005934 - Identified Suspicious Command Injection Attack