type: trigger format: 2.0 name: crowdsecurity/fortinet-cve-2018-13379 description: "Detect cve-2018-13379 exploitation attemps" filter: | evt.Meta.log_type in ["http_access-log", "http_error-log"] and Upper(evt.Meta.http_path) contains Upper('/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession') groupby: "evt.Meta.source_ip" blackhole: 2m labels: type: exploit remediation: true