Apache - Apache 2449 flaw CVE-2021-41773
| Id | 767f9dc4-3b01-11ec-8d3d-0242ac130003 |
| Rulename | Apache - Apache 2.4.49 flaw CVE-2021-41773 |
| Description | Detects using Apache 2.4.49 flaw CVE-2021-41773 |
| Severity | High |
| Tactics | InitialAccess LateralMovement |
| Techniques | T1190 T1133 T1210 |
| Required data connectors | CustomLogsAma |
| Kind | Scheduled |
| Query frequency | 10m |
| Query period | 10m |
| Trigger threshold | 0 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/ApacheHTTPServer/Analytic Rules/ApacheCVE-2021-41773.yaml |
| Version | 1.0.3 |
| Arm template | 767f9dc4-3b01-11ec-8d3d-0242ac130003.json |
ApacheHTTPServer
| where HttpRequestMethod =~ "GET"
| where UrlOriginal has_all ("/cgi-bin/", "/%2e%2e/")
| where HttpStatusCode == "200"
| extend UrlCustomEntity = UrlOriginal
name: Apache - Apache 2.4.49 flaw CVE-2021-41773
id: 767f9dc4-3b01-11ec-8d3d-0242ac130003
description: |
'Detects using Apache 2.4.49 flaw CVE-2021-41773'
triggerThreshold: 0
entityMappings:
- fieldMappings:
- columnName: UrlCustomEntity
identifier: Url
entityType: URL
version: 1.0.3
triggerOperator: gt
query: |
ApacheHTTPServer
| where HttpRequestMethod =~ "GET"
| where UrlOriginal has_all ("/cgi-bin/", "/%2e%2e/")
| where HttpStatusCode == "200"
| extend UrlCustomEntity = UrlOriginal
tactics:
- InitialAccess
- LateralMovement
kind: Scheduled
queryFrequency: 10m
severity: High
queryPeriod: 10m
requiredDataConnectors:
- datatypes:
- ApacheHTTPServer_CL
connectorId: CustomLogsAma
status: Available
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/ApacheHTTPServer/Analytic Rules/ApacheCVE-2021-41773.yaml
relevantTechniques:
- T1190
- T1133
- T1210