Files
zira-etc/crowdsec/hub/scenarios/crowdsecurity/jira_cve-2021-26086.yaml

25 lines
757 B
YAML

type: trigger
format: 2.0
#debug: true
name: crowdsecurity/jira_cve-2021-26086
description: "Detect Atlassian Jira CVE-2021-26086 exploitation attemps"
filter: |
evt.Meta.log_type in ["http_access-log", "http_error-log"] and any(File("jira_cve_2021-26086.txt"), {Upper(evt.Meta.http_path) contains Upper(#)})
data:
- source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/master/web/jira_cve_2021-26086.txt
dest_file: jira_cve_2021-26086.txt
type: string
groupby: "evt.Meta.source_ip"
blackhole: 2m
labels:
remediation: true
classification:
- attack.T1595.001
- attack.T1190
- cve.CVE-2021-26086
behavior: "http:exploit"
label: "Jira CVE-2021-26086 exploitation"
spoofable: 0
service: jira
confidence: 3