Skip to content

Commit 19eb423

Browse files
changed to EQL
1 parent 4a8ac09 commit 19eb423

File tree

1 file changed

+14
-16
lines changed

1 file changed

+14
-16
lines changed

rules_building_block/initial_access_react_server_components_rce_attempt.toml

Lines changed: 14 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -14,8 +14,8 @@ vulnerability in React Server Components (RSC). The vulnerability allows attacke
1414
server by sending specially crafted RSC deserialization payloads.
1515
"""
1616
from = "now-9m"
17-
interval = "8m"
18-
language = "esql"
17+
index = ["logs-network_traffic.http*"]
18+
language = "eql"
1919
license = "Elastic License v2"
2020
name = "Potential React Server Components RCE Attempt (CVE-2025-55182)"
2121
note = """## Triage and analysis
@@ -67,22 +67,20 @@ tags = [
6767
"Resources: Investigation Guide",
6868
]
6969
timestamp_override = "event.ingested"
70-
type = "esql"
70+
type = "eql"
7171

7272
query = '''
73-
FROM logs-network_traffic.http-* metadata _id, _version, _index
74-
| WHERE http.request.method == "POST"
75-
AND (
76-
http.request.body.content LIKE "*$ACTION_REF*"
77-
OR http.request.body.content LIKE "*$ACTION_*:*"
78-
)
79-
AND (
80-
http.request.body.content LIKE "*constructor*"
81-
OR http.request.body.content LIKE "*__proto__*"
82-
OR http.request.body.content LIKE "*prototype*"
83-
OR http.request.body.content RLIKE """\$\d+:[a-z]+:[a-z]+"""
84-
)
85-
| KEEP *
73+
network where event.category == "network" and http.request.method == "POST" and
74+
(
75+
http.request.body.content like~ "*$ACTION_REF*" or
76+
http.request.body.content like~ "*$ACTION_*:*"
77+
) and
78+
(
79+
http.request.body.content like~ "*constructor*" or
80+
http.request.body.content like~ "*__proto__*" or
81+
http.request.body.content like~ "*prototype*" or
82+
http.request.body.content regex~ """\$\d+:[a-z]+:[a-z]+"""
83+
)
8684
'''
8785

8886

0 commit comments

Comments
 (0)