HTTP requests containing command injection patterns
이 페이지는 아직 한국어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우
언제든지 연락주시기 바랍니다.Goal
Detect HTTP requests whose query parameters contain command-injection-style patterns, including when the server returns a successful response.
Strategy
This rule monitors OCSF HTTP activity (@ocsf.class_uid:4002) for suspicious sequences in @ocsf.http_request.url.query_string, grouped by @ocsf.src_endpoint.ip, and correlates with successful HTTP status codes where applicable.
Triage and response
- Confirm whether traffic from
{{@ocsf.src_endpoint.ip}} is expected (approved scanning or internal testing). - Review path, user agent, and application context to see whether payloads may have been executed or only probed.
- If the activity is unauthorized, follow your incident response process.