Files
zira-etc/crowdsec/hub/scenarios/crowdsecurity/vmware-cve-2022-22954.yaml

20 lines
637 B
YAML

type: trigger
format: 2.0
name: crowdsecurity/vmware-cve-2022-22954
description: "Detect Vmware CVE-2022-22954 exploitation attempts"
filter: |
evt.Meta.log_type in ['http_access-log', 'http_error-log'] && Upper(QueryUnescape(evt.Meta.http_path)) startsWith Upper('/catalog-portal/ui/oauth/verify?error=&deviceUdid=${"freemarker.template.utility.Execute"?new()(')
groupby: "evt.Meta.source_ip"
blackhole: 2m
labels:
confidence: 3
spoofable: 0
classification:
- attack.T1190
- attack.T1595
- cve.CVE-2022-22954
behavior: "vm-management:exploit"
label: "VMWARE CVE-2022-22954"
remediation: true
service: vmware