type: trigger #debug: true name: crowdsecurity/CVE-2022-44877 description: "Detect CVE-2022-44877 exploits" filter: | Lower(evt.Meta.http_path) contains '/index.php' && Upper(evt.Parsed.verb) == 'POST' && evt.Meta.http_status == '302' && Lower(evt.Parsed.http_args) matches 'login=.*[$|%24][\\(|%28].*[\\)|%29]' blackhole: 1m groupby: "evt.Meta.source_ip" labels: type: exploit remediation: true