heroui logo

Web Server Potential Remote File Inclusion Activity

Elastic Detection Rules

View Source
Summary
This detection rule is designed to identify potential Remote File Inclusion (RFI) activities on web servers by analyzing HTTP GET requests. It targets web servers that include Nginx, Apache, Apache Tomcat, and IIS. The rule specifically looks for GET requests where the response status is 200 (OK) and the requested URL contains indications of potentially malicious patterns, such as the presence of URL encoding that could suggest attempts to access remote files. The detection logic involves decoding the URL to check for suspicious file paths or remote locations (like http://, https://, ftp://, smb://, and file://). By monitoring such patterns, the rule aims to detect possible exploitation of RFI vulnerabilities that could lead to unauthorized access to sensitive data or further compromise of the server. A low risk score of 21 indicates that while these activities should be monitored, they may not always signify active exploitation without additional corroborating evidence.
Categories
  • Web
Data Sources
  • Named Pipe
  • Container
  • Process
  • File
  • Network Traffic
ATT&CK Techniques
  • T1083
Created: 2025-12-02