Phoenix Studio

Convert indexed Sigma rules into analyst-ready detections.

This studio is built around Phoenix's own rule corpus, not a blank editor. Search by title or rule id, choose a live sigma-cli backend, then reveal pipelines only when you actually need them.

Indexed Rules

3,707

Ready to search

Backends

17

Live from sigconverter.io

CLI Versions

10

Newest: 2.0.2

Translation Workspace

Shape the rule before it leaves Phoenix

Tune Translation

Active Rule

CVE-2020-5902 F5 BIG-IP Exploitation Attempt

Target Profile

Splunk

Splunk SPL & tstats data model queries

Format Mode

Default

Plain SPL queries

Conversion Output

CVE-2020-5902 F5 BIG-IP Exploitation Attempt

Using Splunk · Default · sigma-cli 2.0.2

Translation controls

Adjust the rule on the left, then regenerate when you want a fresh backend-native query.

BackendSplunkFormatDefaultVersion2.0.2
title: CVE-2020-5902 F5 BIG-IP Exploitation Attempt
id: 44b53b1c-e60f-4a7b-948e-3435a7918478
status: test
description: Detects the exploitation attempt of the vulnerability found in F5 BIG-IP and described in CVE-2020-5902
references:
    - https://support.f5.com/csp/article/K52145254
    - https://www.ptsecurity.com/ww-en/about/news/f5-fixes-critical-vulnerability-discovered-by-positive-technologies-in-big-ip-application-delivery-controller/
    - https://twitter.com/yorickkoster/status/1279709009151434754
    - https://www.criticalstart.com/f5-big-ip-remote-code-execution-exploit/
author: Florian Roth (Nextron Systems)
date: 2020-07-05
modified: 2023-01-02
tags:
    - attack.initial-access
    - attack.t1190
    - cve.2020-5902
    - detection.emerging-threats
logsource:
    category: webserver
detection:
    selection_base:
        cs-uri-query|contains:
            - '/tmui/'
            - '/hsqldb'
    selection_traversal:
        cs-uri-query|contains:
            - '..;/'
            - '.jsp/..'
    condition: selection_base and selection_traversal
falsepositives:
    - Unknown
level: critical

CLI command

Copy the exact command to reproduce this translation locally.

sigma convert --without-pipeline -t splunk -f default rules-emerging-threats/2020/Exploits/CVE-2020-5902/web_cve_2020_5902_f5_bigip.yml