diff --git a/rules/web/web_cve_2022_33891_spark_shell_command_injection.yml b/rules/web/web_cve_2022_33891_spark_shell_command_injection.yml index 6d7b4f1ab..6b0452cb2 100644 --- a/rules/web/web_cve_2022_33891_spark_shell_command_injection.yml +++ b/rules/web/web_cve_2022_33891_spark_shell_command_injection.yml @@ -1,5 +1,5 @@ title: Apache Spark Shell Command Injection - Weblogs -id: a133193c-2daa-4a29-8022-018695fcf0ae +id: 1a9a04fd-02d1-465c-abad-d733fd409f9c status: experimental description: Detects attempts to exploit an apache spark server via CVE-2014-6287 from a weblogs perspective author: Nasreddine Bencherchali