type: trigger format: 2.0 name: crowdsecurity/pulse-secure-sslvpn-cve-2019-11510 description: "Detect cve-2019-11510 exploitation attemps" filter: | evt.Meta.log_type in ["http_access-log", "http_error-log"] and (Upper(evt.Meta.http_path) matches Upper('/dana-na/../dana/html5acc/guacamole/../../../../../../../[^?]+\\?/dana/html5acc/guacamole/') or Upper(evt.Meta.http_path) matches Upper('/dana-na/%2E%2E/dana/html5acc/guacamole/%2E%2E/%2E%2E/%2E%2E/%2E%2E/%2E%2E/%2E%2E/%2E%2E/[^?]+\\?/dana/html5acc/guacamole/')) groupby: "evt.Meta.source_ip" blackhole: 2m labels: remediation: true confidence: 3 spoofable: 0 classification: - attack.T1190 - cve.CVE-2019-11510 behavior: "http:exploit" label: "Pulse Secure CVE-2019-11510" service: pulse-secure