@@ -10,12 +10,12 @@ building_block_type = "default"
1010description = """
1111This rule detects anomalous patterns in React Server Components (RSC) Flight protocol data streams that may indicate
1212code injection or exploitation attempts. The Flight protocol is used by React and Next.js for server-client
13- communication, and should never contain Node.js code execution primitives like child_process, fs module calls, or
14- eval patterns. This building block rule casts a wider net to identify suspicious payloads that warrant further
15- investigation.
13+ communication, and should never contain Node.js code execution primitives like child_process, fs module calls, or eval
14+ patterns. This building block rule casts a wider net to identify suspicious payloads that warrant further investigation.
1615"""
17- from = " now-9m "
16+ from = " now-119m "
1817index = [" logs-network_traffic.http*" ]
18+ interval = " 60m"
1919language = " eql"
2020license = " Elastic License v2"
2121name = " Anomalous React Server Components Flight Data Patterns"
@@ -25,7 +25,7 @@ references = [
2525 " https://www.wiz.io/blog/critical-vulnerability-in-react-cve-2025-55182" ,
2626 " https://slcyber.io/research-center/high-fidelity-detection-mechanism-for-rsc-next-js-rce-cve-2025-55182-cve-2025-66478/" ,
2727 " https://nextjs.org/docs/app/building-your-application/rendering/server-components" ,
28- " https://tonyalicea.dev/blog/understanding-react-server-components/"
28+ " https://tonyalicea.dev/blog/understanding-react-server-components/" ,
2929]
3030risk_score = 21
3131rule_id = " b9c8d7e6-5a4f-3c2b-1d0e-9f8a7b6c5d4e"
@@ -44,7 +44,7 @@ timestamp_override = "event.ingested"
4444type = " eql"
4545
4646query = '''
47- network where http.request.method == "POST" and http.response.status_code != 200
47+ network where http.request.method == "POST" and http.response.status_code != 200 and
4848(
4949 // Node.js child_process module
5050 (
@@ -97,7 +97,6 @@ reference = "https://attack.mitre.org/techniques/T1190/"
9797id = " TA0001"
9898name = " Initial Access"
9999reference = " https://attack.mitre.org/tactics/TA0001/"
100-
101100[[rule .threat ]]
102101framework = " MITRE ATT&CK"
103102[[rule .threat .technique ]]
@@ -110,7 +109,9 @@ name = "JavaScript"
110109reference = " https://attack.mitre.org/techniques/T1059/007/"
111110
112111
112+
113113[rule .threat .tactic ]
114114id = " TA0002"
115115name = " Execution"
116116reference = " https://attack.mitre.org/tactics/TA0002/"
117+
0 commit comments