
Summary
This detection rule analyzes Kubernetes Nginx ingress controller logs to identify local file inclusion (LFI) attacks. LFI vulnerabilities allow malicious actors to include files from the server's file system, which can lead to unauthorized access to sensitive data and system exploitation. The detection relies on parsing standard Kubernetes logs to extract relevant fields such as the request method, URL, and response status, which are then evaluated for LFI patterns. If suspicious activity is detected, the rule triggers alerts based on the use of known vulnerable paths, indicating potential attacks. This rule is critical for maintaining security within Kubernetes environments, particularly for applications exposed through Nginx ingress controllers.
Categories
- Cloud
- Kubernetes
- Web
- Application
- Infrastructure
Data Sources
- Kernel
- Logon Session
- Process
- Network Traffic
- Application Log
ATT&CK Techniques
- T1212
Created: 2024-11-14