From aa79f4a5ee080388ce5fe578cc87802df8c5abc3 Mon Sep 17 00:00:00 2001 From: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com> Date: Thu, 21 Jul 2022 15:34:11 +0100 Subject: [PATCH] Update web_cve_2022_33891_spark_shell_command_injection.yml --- rules/web/web_cve_2022_33891_spark_shell_command_injection.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/rules/web/web_cve_2022_33891_spark_shell_command_injection.yml b/rules/web/web_cve_2022_33891_spark_shell_command_injection.yml index 6d7b4f1ab..6b0452cb2 100644 --- a/rules/web/web_cve_2022_33891_spark_shell_command_injection.yml +++ b/rules/web/web_cve_2022_33891_spark_shell_command_injection.yml @@ -1,5 +1,5 @@ title: Apache Spark Shell Command Injection - Weblogs -id: a133193c-2daa-4a29-8022-018695fcf0ae +id: 1a9a04fd-02d1-465c-abad-d733fd409f9c status: experimental description: Detects attempts to exploit an apache spark server via CVE-2014-6287 from a weblogs perspective author: Nasreddine Bencherchali