type: trigger format: 2.0 #debug: true name: crowdsecurity/jira_cve-2021-26086 description: "Detect Atlassian Jira CVE-2021-26086 exploitation attemps" filter: | evt.Meta.log_type in ["http_access-log", "http_error-log"] and any(File("jira_cve_2021-26086.txt"), {Upper(evt.Meta.http_path) contains Upper(#)}) data: - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/master/web/jira_cve_2021-26086.txt dest_file: jira_cve_2021-26086.txt type: string groupby: "evt.Meta.source_ip" blackhole: 2m labels: remediation: true classification: - attack.T1595.001 - attack.T1190 - cve.CVE-2021-26086 behavior: "http:exploit" label: "Jira CVE-2021-26086 exploitation" spoofable: 0 service: jira confidence: 3