20 lines
590 B
YAML
20 lines
590 B
YAML
type: trigger
|
|
format: 2.0
|
|
name: crowdsecurity/vmware-vcenter-vmsa-2021-0027
|
|
description: "Detect VMSA-2021-0027 exploitation attemps"
|
|
filter: |
|
|
evt.Meta.log_type in ['http_access-log', 'http_error-log'] && evt.Meta.http_path matches '/ui/vcav-bootstrap/rest/vcav-providers/provider-logo\\?url=(file|http)'
|
|
groupby: "evt.Meta.source_ip"
|
|
blackhole: 2m
|
|
labels:
|
|
confidence: 3
|
|
spoofable: 0
|
|
classification:
|
|
- attack.T1190
|
|
- attack.T1595
|
|
- cve.CVE-2021-0027
|
|
behavior: "vm-management:exploit"
|
|
label: "VMWARE VCenter VMSA CVE-2021-0027"
|
|
remediation: true
|
|
service: vmware
|