type: trigger format: 2.0 name: crowdsecurity/fortinet-cve-2018-13379 description: "Detect cve-2018-13379 exploitation attemps" filter: | evt.Meta.log_type in ["http_access-log", "http_error-log"] and Upper(evt.Meta.http_path) contains Upper('/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession') groupby: "evt.Meta.source_ip" blackhole: 2m labels: confidence: 3 spoofable: 0 classification: - attack.T1190 - attack.T1595 - cve.CVE-2018-13379 behavior: "http:exploit" label: "CVE-2018-13379" remediation: true service: fortinet