Skip to content

Commit

Permalink
Removed old, created new rule to bypass "type" bug
Browse files Browse the repository at this point in the history
  • Loading branch information
Aegrah committed Feb 22, 2023
1 parent 28bda94 commit e994b62
Showing 1 changed file with 4 additions and 4 deletions.
Original file line number Diff line number Diff line change
@@ -1,10 +1,10 @@
[metadata]
creation_date = "2020/02/18"
creation_date = "2023/02/22"
integration = ["endpoint"]
maturity = "production"
min_stack_comments = "New fields added: required_fields, related_integrations, setup"
min_stack_version = "8.3.0"
updated_date = "2023/02/21"
updated_date = "2023/02/22"

[rule]
author = ["Elastic"]
Expand All @@ -19,7 +19,7 @@ from = "now-9m"
index = ["auditbeat-*", "logs-endpoint.events.*", "endgame-*"]
language = "eql"
license = "Elastic License v2"
name = "Potential Shell via Web Server"
name = "Potential Remote Code Execution via Web Server"
note = """## Triage and analysis
### Investigating Potential Shell via Web Server
Expand Down Expand Up @@ -67,7 +67,7 @@ references = [
"https://www.elastic.co/security-labs/elastic-response-to-the-the-spring4shell-vulnerability-cve-2022-22965",
]
risk_score = 47
rule_id = "0bb0296f-0e9f-44e5-b709-bd61e0577fd5"
rule_id = "b7b2c320-d4db-4f8e-8f92-83f9d0c3e6a4"
severity = "medium"
tags = ["Elastic", "Host", "Linux", "Threat Detection", "Persistence", "Investigation Guide", "Elastic Endgame"]
timestamp_override = "event.ingested"
Expand Down

0 comments on commit e994b62

Please sign in to comment.