11 lines
412 B
YAML
11 lines
412 B
YAML
type: trigger
|
|
name: crowdsecurity/fortinet-cve-2022-40684
|
|
description: "Detect cve-2022-40684 exploitation attempts"
|
|
filter: |
|
|
evt.Meta.log_type in ["http_access-log", "http_error-log"] and
|
|
Upper(evt.Meta.http_path) startsWith Upper('/api/v2/cmdb/system/admin/') and Lower(evt.Parsed.http_user_agent) == 'report runner'
|
|
groupby: "evt.Meta.source_ip"
|
|
blackhole: 2m
|
|
labels:
|
|
type: exploit
|
|
remediation: true |