Skip to content

Instantly share code, notes, and snippets.

@Epivalent
Created July 10, 2024 12:49
Show Gist options
  • Save Epivalent/fa81a6a84a8f71fe1d109789f9901908 to your computer and use it in GitHub Desktop.
Save Epivalent/fa81a6a84a8f71fe1d109789f9901908 to your computer and use it in GitHub Desktop.

There could be several reasons why this Suricata rule does not match a specific HTTP GET request. Here are a few possibilities:

  1. Incorrect flowbits usage: The rule uses the "flowbits" keyword to set a flowbit called "cve-2024-36991". If this flowbit is not properly set in another part of the rule or in a previous rule, the condition for matching may not be met.

  2. Missing or incorrect content match: The rule includes a content match for "GET", which should match the HTTP method of the request. However, if the actual request does not contain exactly "GET" (e.g., it may have additional whitespace or case differences), the content match will fail.

  3. Different ports or IP addresses: The rule is written to apply to any TCP traffic from any source IP and port to any destination IP and port. If the actual HTTP GET request is using different source/destination IPs or ports, it will not trigger this specific rule.

  4. Rule ordering: If there are other rules that have higher priority and match before this particular rule, they may prevent this rule from being evaluated for that specific traffic.

  5. Rule syntax errors: There could be syntax errors in other parts of your Suricata configuration that prevent this specific rule from being loaded or evaluated correctly.

It's important to note that troubleshooting Suricata rules can be complex, and these are just some general possibilities to consider. Detailed analysis of network traffic, logs, and Suricata configuration would be required for accurate diagnosis.

Wed 10 Jul 14:49:52 CEST 2024 - why doesn't this suricata rule match a HTTP GET request? alert tcp any any -> any any (msg:"Attempted exploitation of CVE-2024-36991 - Splunk Enterprise path traversal"; http.method; content:"GET"; flowbits: set, cve-2024-36991; reference:url,https://nvd.nist.gov/vuln/detail/CVE-2024-36991; sid:1007202401; rev:1;)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment