25 lines
757 B
YAML
25 lines
757 B
YAML
type: trigger
|
|
format: 2.0
|
|
#debug: true
|
|
name: crowdsecurity/thinkphp-cve-2018-20062
|
|
description: "Detect ThinkPHP CVE-2018-20062 exploitation attemps"
|
|
filter: |
|
|
evt.Meta.log_type in ["http_access-log", "http_error-log"] and any(File("thinkphp_cve_2018-20062.txt"), {Upper(evt.Meta.http_path) matches Upper(#)})
|
|
data:
|
|
- source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/master/web/thinkphp_cve_2018-20062.txt
|
|
dest_file: thinkphp_cve_2018-20062.txt
|
|
type: string
|
|
groupby: "evt.Meta.source_ip"
|
|
blackhole: 2m
|
|
labels:
|
|
confidence: 3
|
|
spoofable: 0
|
|
classification:
|
|
- attack.T1190
|
|
- attack.T1595
|
|
- cve.CVE-2018-20062
|
|
behavior: "http:exploit"
|
|
label: "ThinkPHP CVE-2018-20062"
|
|
remediation: true
|
|
service: thinkphp
|