{ "version":1, "origin":{ "name":"worker01", "module":"wazuh-execd" }, "command":"add", "parameters":{ "extra_args":[], "alert":{ "timestamp":"2021-02-01T20:58:44.830+0000", "rule":{ "level":15, "description":"Shellshock attack detected", "id":"31168", "mitre":{ "id":["T1068","T1190"], "tactic":["Privilege Escalation","Initial Access"], "technique":["Exploitation for Privilege Escalation","Exploit Public-Facing Application"] }, "info":"CVE-2014-6271https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271", "firedtimes":2, "mail":true, "groups":["web","accesslog","attack"], "pci_dss":["11.4"], "gdpr":["IV_35.7.d"], "nist_800_53":["SI.4"], "tsc":["CC6.1","CC6.8","CC7.2","CC7.3"] }, "agent":{ "id":"000", "name":"wazuh-server" }, "manager":{ "name":"wazuh-server" }, "id":"1612213124.6448363", "full_log":"192.168.0.223 - - [01/Feb/2021:20:58:43 +0000] \"GET / HTTP/1.1\" 200 612 \"-\" \"() { :; }; /bin/cat /etc/passwd\"", "decoder":{ "name":"web-accesslog" }, "data":{ "protocol":"GET", "srcip":"192.168.0.223", "id":"200", "url":"/" }, "location":"/var/log/nginx/access.log" }, "program":"/var/ossec/active-response/bin/firewall-drop" } }