Skip to content

Commit efef99b

Browse files
authored
[New Rule] Potential HTTP Downgrade Attack (#5372)
* [New Rule] Potential HTTP Downgrade Attack * Update defense_evasion_potential_http_downgrade_attack.toml
1 parent f42b514 commit efef99b

File tree

1 file changed

+67
-0
lines changed

1 file changed

+67
-0
lines changed
Lines changed: 67 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,67 @@
1+
[metadata]
2+
creation_date = "2025/11/27"
3+
integration = ["nginx", "apache", "apache_tomcat"]
4+
maturity = "production"
5+
updated_date = "2025/11/27"
6+
7+
[rule]
8+
author = ["Elastic"]
9+
description = """
10+
Through the new_terms rule type, this rule detects potential HTTP downgrade attacks by identifying
11+
HTTP traffic that uses a different HTTP version than the one typically used in the environment. An
12+
HTTP downgrade attack occurs when an attacker forces a connection via an older HTTP version,
13+
resulting in potentially less secure communication. For example, an attacker might downgrade a
14+
connection from HTTP/2 to HTTP/1.1 or HTTP/1.0 to exploit known vulnerabilities or weaknesses in
15+
the older protocol versions.
16+
"""
17+
from = "now-9m"
18+
index = [
19+
"logs-nginx.access-*",
20+
"logs-apache.access-*",
21+
"logs-apache_tomcat.access-*",
22+
]
23+
language = "kuery"
24+
license = "Elastic License v2"
25+
name = "Potential HTTP Downgrade Attack"
26+
risk_score = 21
27+
rule_id = "9797d2c8-8ec9-48e6-a022-350cdfbf2d5e"
28+
severity = "low"
29+
tags = [
30+
"Domain: Web",
31+
"Use Case: Threat Detection",
32+
"Tactic: Defense Evasion",
33+
"Data Source: Nginx",
34+
"Data Source: Apache",
35+
"Data Source: Apache Tomcat",
36+
]
37+
timestamp_override = "event.ingested"
38+
type = "new_terms"
39+
query = '''
40+
http.version:*
41+
'''
42+
43+
[[rule.threat]]
44+
framework = "MITRE ATT&CK"
45+
46+
[[rule.threat.technique]]
47+
id = "T1562"
48+
name = "Impair Defenses"
49+
reference = "https://attack.mitre.org/techniques/T1562/"
50+
51+
[[rule.threat.technique.subtechnique]]
52+
id = "T1562.010"
53+
name = "Downgrade Attack"
54+
reference = "https://attack.mitre.org/techniques/T1562/010/"
55+
56+
[rule.threat.tactic]
57+
id = "TA0005"
58+
name = "Defense Evasion"
59+
reference = "https://attack.mitre.org/tactics/TA0005/"
60+
61+
[rule.new_terms]
62+
field = "new_terms_fields"
63+
value = ["http.version", "agent.id"]
64+
65+
[[rule.new_terms.history_window_start]]
66+
field = "history_window_start"
67+
value = "now-7d"

0 commit comments

Comments
 (0)