Add vpatch-CVE-2023-24000 rule and test#1739
Add vpatch-CVE-2023-24000 rule and test#1739crowdsec-automation wants to merge 5 commits intomasterfrom
Conversation
|
Hello @crowdsec-automation and thank you for your contribution! ❗ It seems that the following scenarios are not part of the 'crowdsecurity/appsec-virtual-patching' collection: 🔴 crowdsecurity/vpatch-CVE-2023-24000 🔴 |
|
Hello @crowdsec-automation and thank you for your contribution! I'm a bot that helps maintainers to validate scenarios and ensure they include all the required information. The following items have errors: crowdsecurity/crs-exclusion-plugin-cpanel:
crowdsecurity/crs-exclusion-plugin-dokuwiki:
crowdsecurity/crs-exclusion-plugin-drupal:
crowdsecurity/crs-exclusion-plugin-nextcloud:
crowdsecurity/crs-exclusion-plugin-phpbb:
crowdsecurity/crs-exclusion-plugin-phpmyadmin:
crowdsecurity/crs-exclusion-plugin-wordpress:
crowdsecurity/crs-exclusion-plugin-xenforo:
Mitre ATT&CKInformation about mitre attack can be found here.
Expected format is (where labels:
classification:
- attack.TXXXXCVEsIf your scenario covers a specific CVE (Common Vulnerabilities and Exposures), please add it. Expected format is (where labels:
classification:
- cve.CVE-XXX-XXXBehaviorsPlease identify the behavior(s) your scenario is targeting. You can find the list of available behaviors here. Expected format is (where labels:
behavior: <behavior>See the labels documentation for more information. |
| - urldecode | ||
| match: | ||
| type: contains | ||
| value: "')" |
There was a problem hiding this comment.
Changed to a negative regex [^a-z0-9_-] in commit 12264ce. This matches any trigger_type[] value containing characters outside of lowercase alphanumeric, underscore, and hyphen — the same pattern used in similar SQL injection rules like vpatch-CVE-2019-9762.
Agent-Logs-Url: https://github.com/crowdsecurity/hub/sessions/c3bff159-da7c-41b1-9a0f-2d2ba68d3d2e Co-authored-by: buixor <990714+buixor@users.noreply.github.com>
This rule targets SQL injection attempts in the WordPress GamiPress plugin (CVE-2023-24000). The attack is performed by injecting SQL syntax into the
trigger_type[]parameter of the/wp-json/wp/v2/gamipress-logsendpoint. The rule:/wp-json/wp/v2/gamipress-logs(withlowercaseandurldecodetransforms for normalization).trigger_type[]argument using a negative regex[^a-z0-9_-], which matches any value containing characters outside of lowercase alphanumeric, underscore, and hyphen — catching SQL injection payloads while allowing normal trigger type values.Validation checklist:
value:fields are lowercase.lowercaseandurldecode.match.valuecontains capital letters.[^a-z0-9_-]) for parameter validation, consistent with similar SQL injection rules in the hub.Description
This PR adds a new vpatch rule for CVE-2023-24000 (WordPress GamiPress SQL injection via
trigger_type[]parameter) along with its corresponding test configuration.Checklist