29 lines
885 B
YAML
29 lines
885 B
YAML
type: leaky
|
|
name: crowdsecurity/CVE-2022-46169-bf
|
|
description: "Detect CVE-2022-46169 brute forcing"
|
|
filter: |
|
|
Upper(evt.Meta.http_path) contains Upper('/remote_agent.php') &&
|
|
Upper(evt.Parsed.verb) == 'GET' &&
|
|
Lower(evt.Parsed.http_args) contains 'host_id' &&
|
|
Lower(evt.Parsed.http_args) contains 'local_data_ids'
|
|
leakspeed: "10s"
|
|
capacity: 5
|
|
blackhole: 1m
|
|
groupby: "evt.Meta.source_ip"
|
|
labels:
|
|
type: exploit
|
|
remediation: true
|
|
---
|
|
type: trigger
|
|
name: crowdsecurity/CVE-2022-46169-cmd
|
|
description: "Detect CVE-2022-46169 cmd injection"
|
|
filter: |
|
|
Upper(evt.Meta.http_path) contains Upper('/remote_agent.php') &&
|
|
Upper(evt.Parsed.verb) == 'GET' &&
|
|
Lower(evt.Parsed.http_args) contains 'action=polldata' &&
|
|
Lower(evt.Parsed.http_args) matches 'poller_id=.*(;|%3b)'
|
|
blackhole: 1m
|
|
groupby: "evt.Meta.source_ip"
|
|
labels:
|
|
type: exploit
|
|
remediation: true |