HTTP requests containing command injection patterns

Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel, n'hésitez pas à nous contacter.

Goal

Detect HTTP requests whose query parameters contain command-injection-style patterns, including when the server returns a successful response.

Strategy

This rule monitors OCSF HTTP activity (@ocsf.class_uid:4002) for suspicious sequences in @ocsf.http_request.url.query_string, grouped by @ocsf.src_endpoint.ip, and correlates with successful HTTP status codes where applicable.

Triage and response

  • Confirm whether traffic from {{@ocsf.src_endpoint.ip}} is expected (approved scanning or internal testing).
  • Review path, user agent, and application context to see whether payloads may have been executed or only probed.
  • If the activity is unauthorized, follow your incident response process.