-
Notifications
You must be signed in to change notification settings - Fork 612
[New Rule] Web Server Potential Command Injection Request #5341
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Rule: New - GuidelinesThese guidelines serve as a reminder set of considerations when proposing a new rule. Documentation and Context
Rule Metadata Checks
New BBR Rules
Testing and Validation
|
|
⛔️ Test failed Results
|
|
⛔️ Test failed Results
|
|
⛔️ Test failed Results
|
| """ | ||
| from = "now-61m" | ||
| interval = "1h" | ||
| language = "esql" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
can't we use an EQL query for this logic ? u can try to create both EQL and ES|QL in your stack and compare the execution runtime.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
++
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
For this one I would prefer staying in ES|QL to ensure I can add thresholds for document volume. That doc volume allows to differentiate between an actual RCE and fuzzing.
rules/cross-platform/persistence_web_server_potential_command_injection.toml
Outdated
Show resolved
Hide resolved
rules/cross-platform/persistence_web_server_potential_command_injection.toml
Outdated
Show resolved
Hide resolved
rules/cross-platform/persistence_web_server_potential_command_injection.toml
Outdated
Show resolved
Hide resolved
terrancedejesus
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Couple of needed changes. Great idea to use case for capturing different variants!
|
⛔️ Test failed Results
|
|
⛔️ Test failed Results
|
|
⛔️ Test failed Results
|
|
⛔️ Test failed Results
|
rules/cross-platform/persistence_web_server_potential_command_injection.toml
Outdated
Show resolved
Hide resolved
…injection.toml Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com>
|
⛔️ Test failed Results
|
rules/cross-platform/persistence_web_server_potential_command_injection.toml
Outdated
Show resolved
Hide resolved
|
⛔️ Test failed Results
|
…injection.toml Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com>
|
⛔️ Test failed Results
|
|
⛔️ Test failed Results
|
|
⛔️ Test failed Results
|
Summary
This rule detects potential command injection attempts via web server requests by identifying URLs that contain suspicious patterns commonly associated with command execution payloads. Attackers may exploit vulnerabilities in web applications to inject and execute arbitrary commands on the server, often using interpreters like Python, Perl, Ruby, PHP, or shell commands. By monitoring for these indicators in web traffic, security teams can identify and respond to potential threats early.
Telemetry