23 lines
536 B
YAML
23 lines
536 B
YAML
type: leaky
|
|
name: crowdsecurity/CVE-2022-41697
|
|
description: "Detect CVE-2022-41697 enumeration"
|
|
filter: |
|
|
Upper(evt.Meta.http_path) contains Upper('/ghost/api/admin/session') &&
|
|
Upper(evt.Parsed.verb) == 'POST' &&
|
|
evt.Meta.http_status == '404'
|
|
leakspeed: "10s"
|
|
capacity: 5
|
|
blackhole: 1m
|
|
groupby: "evt.Meta.source_ip"
|
|
labels:
|
|
type: exploit
|
|
remediation: true
|
|
classification:
|
|
- attack.T1589
|
|
- cve.CVE-2022-41697
|
|
spoofable: 0
|
|
confidence: 3
|
|
behavior: "http:exploit"
|
|
label: "Ghost CVE-2022-41697"
|
|
service: ghost
|