Apache - Apache 2449 flaw CVE-2021-41773
| Id | 767f9dc4-3b01-11ec-8d3d-0242ac130003 |
| Rulename | Apache - Apache 2.4.49 flaw CVE-2021-41773 |
| Description | Detects using Apache 2.4.49 flaw CVE-2021-41773 |
| Severity | High |
| Tactics | InitialAccess LateralMovement |
| Techniques | T1190 T1133 T1210 |
| Required data connectors | CustomLogsAma |
| Kind | Scheduled |
| Query frequency | 10m |
| Query period | 10m |
| Trigger threshold | 0 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/ApacheHTTPServer/Analytic Rules/ApacheCVE-2021-41773.yaml |
| Version | 1.0.3 |
| Arm template | 767f9dc4-3b01-11ec-8d3d-0242ac130003.json |
ApacheHTTPServer
| where HttpRequestMethod =~ "GET"
| where UrlOriginal has_all ("/cgi-bin/", "/%2e%2e/")
| where HttpStatusCode == "200"
| extend UrlCustomEntity = UrlOriginal
queryPeriod: 10m
query: |
ApacheHTTPServer
| where HttpRequestMethod =~ "GET"
| where UrlOriginal has_all ("/cgi-bin/", "/%2e%2e/")
| where HttpStatusCode == "200"
| extend UrlCustomEntity = UrlOriginal
name: Apache - Apache 2.4.49 flaw CVE-2021-41773
entityMappings:
- fieldMappings:
- columnName: UrlCustomEntity
identifier: Url
entityType: URL
queryFrequency: 10m
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/ApacheHTTPServer/Analytic Rules/ApacheCVE-2021-41773.yaml
requiredDataConnectors:
- connectorId: CustomLogsAma
datatypes:
- ApacheHTTPServer_CL
description: |
'Detects using Apache 2.4.49 flaw CVE-2021-41773'
kind: Scheduled
version: 1.0.3
status: Available
severity: High
relevantTechniques:
- T1190
- T1133
- T1210
triggerOperator: gt
triggerThreshold: 0
tactics:
- InitialAccess
- LateralMovement
id: 767f9dc4-3b01-11ec-8d3d-0242ac130003