cscli scenarios install crowdsecurity/thinkphp-cve-2018-20062
1type: trigger2format: 2.03#debug: true4name: crowdsecurity/thinkphp-cve-2018-200625description: "Detect ThinkPHP CVE-2018-20062 exploitation attemps"6filter: |7 evt.Meta.log_type in ["http_access-log", "http_error-log"] and RegexpInFile(Lower(evt.Meta.http_path), "thinkphp_cve_2018-20062.txt")8data:9 - source_url: https://hub-data.crowdsec.net/web/thinkphp_cve_2018-20062.txt10 dest_file: thinkphp_cve_2018-20062.txt11 type: regexp12 strategy: LRU13 size: 2014 ttl: 10s15groupby: "evt.Meta.source_ip"16blackhole: 2m17labels:18 confidence: 319 spoofable: 020 classification:21 - attack.T119022 - attack.T159523 - cve.CVE-2018-2006224 behavior: "http:exploit"25 label: "ThinkPHP CVE-2018-20062"26 remediation: true27 service: thinkphp28