type: trigger #debug: true name: crowdsecurity/CVE-2022-42889 description: "Detect CVE-2022-42889 exploits (Text4Shell)" filter: | Upper(PathUnescape(evt.Meta.http_path)) contains Upper('${script:javascript:java.lang.Runtime.getRuntime().exec(') or Upper(PathUnescape(evt.Meta.http_path)) contains Upper('${script:js:java.lang.Runtime.getRuntime().exec(') or Upper(PathUnescape(evt.Meta.http_path)) contains Upper('${url:UTF-8:') or Upper(PathUnescape(evt.Meta.http_path)) contains Upper('${dns:address|') blackhole: 1m groupby: "evt.Meta.source_ip" labels: type: exploit remediation: true classification: - attack.T1595 - attack.T1190 - cve.CVE-2022-42889 spoofable: 0 confidence: 3 behavior: "http:exploit" label: "Text4Shell CVE-2022-42889" service: apache