27 lines
803 B
YAML
27 lines
803 B
YAML
type: trigger
|
|
#debug: true
|
|
name: crowdsecurity/CVE-2022-42889
|
|
description: "Detect CVE-2022-42889 exploits (Text4Shell)"
|
|
filter: |
|
|
Upper(PathUnescape(evt.Meta.http_path)) contains Upper('${script:javascript:java.lang.Runtime.getRuntime().exec(')
|
|
or
|
|
Upper(PathUnescape(evt.Meta.http_path)) contains Upper('${script:js:java.lang.Runtime.getRuntime().exec(')
|
|
or
|
|
Upper(PathUnescape(evt.Meta.http_path)) contains Upper('${url:UTF-8:')
|
|
or
|
|
Upper(PathUnescape(evt.Meta.http_path)) contains Upper('${dns:address|')
|
|
blackhole: 1m
|
|
groupby: "evt.Meta.source_ip"
|
|
labels:
|
|
type: exploit
|
|
remediation: true
|
|
classification:
|
|
- attack.T1595
|
|
- attack.T1190
|
|
- cve.CVE-2022-42889
|
|
spoofable: 0
|
|
confidence: 3
|
|
behavior: "http:exploit"
|
|
label: "Text4Shell CVE-2022-42889"
|
|
service: apache
|