@@ -14,8 +14,8 @@ vulnerability in React Server Components (RSC). The vulnerability allows attacke
1414server by sending specially crafted RSC deserialization payloads.
1515"""
1616from = " now-9m"
17- interval = " 8m "
18- language = " esql "
17+ index = [ " logs-network_traffic.http* " ]
18+ language = " eql "
1919license = " Elastic License v2"
2020name = " Potential React Server Components RCE Attempt (CVE-2025-55182)"
2121note = """ ## Triage and analysis
@@ -67,22 +67,20 @@ tags = [
6767 " Resources: Investigation Guide" ,
6868]
6969timestamp_override = " event.ingested"
70- type = " esql "
70+ type = " eql "
7171
7272query = '''
73- FROM logs-network_traffic.http-* metadata _id, _version, _index
74- | WHERE http.request.method == "POST"
75- AND (
76- http.request.body.content LIKE "*$ACTION_REF*"
77- OR http.request.body.content LIKE "*$ACTION_*:*"
78- )
79- AND (
80- http.request.body.content LIKE "*constructor*"
81- OR http.request.body.content LIKE "*__proto__*"
82- OR http.request.body.content LIKE "*prototype*"
83- OR http.request.body.content RLIKE """\$\d+:[a-z]+:[a-z]+"""
84- )
85- | KEEP *
73+ network where event.category == "network" and http.request.method == "POST" and
74+ (
75+ http.request.body.content like~ "*$ACTION_REF*" or
76+ http.request.body.content like~ "*$ACTION_*:*"
77+ ) and
78+ (
79+ http.request.body.content like~ "*constructor*" or
80+ http.request.body.content like~ "*__proto__*" or
81+ http.request.body.content like~ "*prototype*" or
82+ http.request.body.content regex~ """\$\d+:[a-z]+:[a-z]+"""
83+ )
8684'''
8785
8886
0 commit comments