
Summary
This detection rule focuses on identifying potentially malicious file uploads in web applications, as they are a significant entry point for attackers. The rule leverages a combination of HTTP POST and PUT request methods targeting files with extensions often associated with web applications and scripts (such as .php, .jsp, .py, etc.). The logic is structured to detect these uploads by monitoring specific patterns in web logs, checking for both the method of request and the content type that is being uploaded. The detection leverages Splunk's query capabilities to filter, summarize, and extract relevant pieces of data – specifically the time of the event, host details, user data, and request specifics. The rule also incorporates geo-location data for the source IP, which can help identify the geographic origins of the uploads. Additionally, it cites several known threat actors and software associated with file upload exploits, underlining the importance of detecting these activities to prevent unauthorized access or compromise of web applications.
Categories
- Web
- Application
- Endpoint
Data Sources
- Web Credential
- Application Log
- Network Traffic
ATT&CK Techniques
- T1190
- T1505.003
Created: 2024-02-09