Skip to content

Commit b4da050

Browse files
Fix string errors and tag errors
1 parent dc7f007 commit b4da050

File tree

3 files changed

+4
-4
lines changed

3 files changed

+4
-4
lines changed

rules/cross-platform/discovery_web_server_local_file_inclusion_activity.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ interval = "10m"
1818
language = "esql"
1919
license = "Elastic License v2"
2020
name = "Web Server Local File Inclusion Activity"
21-
note = """## Triage and analysis
21+
note = """ ## Triage and analysis
2222
2323
> **Disclaimer**:
2424
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
@@ -42,7 +42,7 @@ This rule surfaces successful GET requests containing directory traversal or dir
4242
4343
### Response and remediation
4444
45-
- Immediately block the source IP at the reverse proxy/WAF and deploy deny rules for GET requests using ../../ or ..\..\ traversal or wrappers (php://, expect://, data://) that fetch /etc/passwd, /proc/self/environ, wp-config.php, web.config, or applicationhost.config.
45+
- Immediately block the source IP at the reverse proxy/WAF and deploy deny rules for GET requests using ../../ or ..\\..\\ traversal or wrappers (php://, expect://, data://) that fetch /etc/passwd, /proc/self/environ, wp-config.php, web.config, or applicationhost.config.
4646
- Configure the web server to return 403 for paths resolving to /proc, /etc, /var/log, /inetpub, applicationhost.config, and web.config and to reject wrapper schemes like php:// and expect://, then reload Nginx/Apache/IIS to apply.
4747
- Fix the vulnerable include logic by canonicalizing input with realpath, rejecting any .. segments or absolute paths, enforcing a whitelist of allowed files, and in PHP disabling allow_url_include/allow_url_fopen and setting open_basedir to a safe directory.
4848
- Rotate exposed secrets by changing database and API credentials from wp-config.php, connection strings and machine keys from web.config/applicationhost.config, and any tokens in /proc/self/environ, then invalidate active sessions and cache.

rules/linux/execution_suspicious_pod_or_container_creation_command_execution.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ tags = [
7171
"Data Source: Auditd Manager",
7272
"Data Source: Crowdstrike",
7373
"Data Source: SentinelOne",
74-
"Resource: Investigation Guide",
74+
"Resources: Investigation Guide",
7575
]
7676
timestamp_override = "event.ingested"
7777
type = "eql"

rules/linux/persistence_web_server_unusual_command_execution.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ tags = [
5858
"Use Case: Threat Detection",
5959
"Tactic: Persistence",
6060
"Data Source: Elastic Defend",
61-
"Resource: Investigation Guide",
61+
"Resources: Investigation Guide",
6262
]
6363
timestamp_override = "event.ingested"
6464
type = "new_terms"

0 commit comments

Comments
 (0)