Add vpatch-CVE-2022-3254 rule and test#1737
Add vpatch-CVE-2022-3254 rule and test#1737crowdsec-automation wants to merge 6 commits intomasterfrom
Conversation
|
Hello @crowdsec-automation and thank you for your contribution! ❗ It seems that the following scenarios are not part of the 'crowdsecurity/appsec-virtual-patching' collection: 🔴 crowdsecurity/vpatch-CVE-2022-3254 🔴 |
|
Hello @crowdsec-automation and thank you for your contribution! I'm a bot that helps maintainers to validate scenarios and ensure they include all the required information. The following items have errors: crowdsecurity/crs-exclusion-plugin-cpanel:
crowdsecurity/crs-exclusion-plugin-dokuwiki:
crowdsecurity/crs-exclusion-plugin-drupal:
crowdsecurity/crs-exclusion-plugin-nextcloud:
crowdsecurity/crs-exclusion-plugin-phpbb:
crowdsecurity/crs-exclusion-plugin-phpmyadmin:
crowdsecurity/crs-exclusion-plugin-wordpress:
crowdsecurity/crs-exclusion-plugin-xenforo:
Mitre ATT&CKInformation about mitre attack can be found here.
Expected format is (where labels:
classification:
- attack.TXXXXCVEsIf your scenario covers a specific CVE (Common Vulnerabilities and Exposures), please add it. Expected format is (where labels:
classification:
- cve.CVE-XXX-XXXBehaviorsPlease identify the behavior(s) your scenario is targeting. You can find the list of available behaviors here. Expected format is (where labels:
behavior: <behavior>See the labels documentation for more information. |
|
@copilot Please fix the regular expression in the WAF so we're just looking for non A-Z 0-9 |
Agent-Logs-Url: https://github.com/crowdsecurity/hub/sessions/8f58ae59-ef56-4f17-ba9f-f6fa71a98b8d Co-authored-by: buixor <990714+buixor@users.noreply.github.com>
|
Hello @Copilot, ✅ The new VPATCH Rule is compliant, thank you for your contribution! |
|
Hello @copilot and thank you for your contribution! I'm a bot that helps maintainers to validate scenarios and ensure they include all the required information. The following items have errors: crowdsecurity/crs-exclusion-plugin-cpanel:
crowdsecurity/crs-exclusion-plugin-dokuwiki:
crowdsecurity/crs-exclusion-plugin-drupal:
crowdsecurity/crs-exclusion-plugin-nextcloud:
crowdsecurity/crs-exclusion-plugin-phpbb:
crowdsecurity/crs-exclusion-plugin-phpmyadmin:
crowdsecurity/crs-exclusion-plugin-wordpress:
crowdsecurity/crs-exclusion-plugin-xenforo:
Mitre ATT&CKInformation about mitre attack can be found here.
Expected format is (where labels:
classification:
- attack.TXXXXCVEsIf your scenario covers a specific CVE (Common Vulnerabilities and Exposures), please add it. Expected format is (where labels:
classification:
- cve.CVE-XXX-XXXBehaviorsPlease identify the behavior(s) your scenario is targeting. You can find the list of available behaviors here. Expected format is (where labels:
behavior: <behavior>See the labels documentation for more information. |
|
@copilot add the vpatch rule to the wordpress vpatch collection instead |
Agent-Logs-Url: https://github.com/crowdsecurity/hub/sessions/39667a09-4bc1-446c-b0ee-d1a3d4e676b3 Co-authored-by: buixor <990714+buixor@users.noreply.github.com>
Description
This rule targets the unauthenticated SQL injection vulnerability in the AWP Classifieds WordPress plugin (CVE-2022-3254). The attack is performed via a GET request to
/wp-admin/admin-ajax.phpwith theactionparameter set toawpcp-get-regions-options. The vulnerable parameter isparent, which is injected with SQL metacharacters./wp-admin/admin-ajax.php), usingcontainswithlowercaseandurldecodetransforms for normalization.parentargument using a regex[^a-z0-9]to detect any non-alphanumeric character (afterlowercaseandurldecodetransforms), flagging SQL injection attempts via special characters.actionparameter is exactlyawpcp-get-regions-options, confirming the request is for the vulnerable AJAX action.All
value:fields are lowercase, and all relevant transforms are applied. The rule is included in thecrowdsecurity/appsec-wordpresscollection, as CVE-2022-3254 is a WordPress-specific vulnerability.Checklist