Skip to content

Add vpatch-CVE-2024-6671 rule and test#1744

Merged
buixor merged 4 commits intomasterfrom
1774875593-vpatch-CVE-2024-6671
Mar 31, 2026
Merged

Add vpatch-CVE-2024-6671 rule and test#1744
buixor merged 4 commits intomasterfrom
1774875593-vpatch-CVE-2024-6671

Conversation

@crowdsec-automation
Copy link
Copy Markdown
Contributor

This rule targets the SQL injection vulnerability in WhatsUp Gold's DeviceStatisticalMonitors endpoint (CVE-2024-6671). The detection logic is as follows:

  • The first rule block matches requests to the endpoint /NmConsole/Platform/Filter/DeviceStatisticalMonitors, using a case-insensitive contains match on the URI.
  • The second rule block inspects the JSON body argument statisticalMonitorTable for the presence of a semicolon (;), which is a strong indicator of SQL injection attempts, especially as seen in the nuclei template payloads (where multiple SQL statements are chained with ;).
  • The lowercase and urldecode transforms ensure the match is case-insensitive and robust against encoding tricks.
  • The labels section includes the correct CVE, ATT&CK, and CWE references, and the product/vuln class label is formatted as required.

This approach minimizes false positives by focusing on the specific vulnerable endpoint and the key injection vector, and avoids overbroad matching. The test nuclei template is adapted to check for a 403 response, as required. All value: fields are lowercase, and the rule uses contains as appropriate.

@github-actions
Copy link
Copy Markdown

Hello @crowdsec-automation and thank you for your contribution!

❗ It seems that the following scenarios are not part of the 'crowdsecurity/appsec-virtual-patching' collection:

🔴 crowdsecurity/vpatch-CVE-2024-6671 🔴

@github-actions
Copy link
Copy Markdown

Hello @crowdsec-automation and thank you for your contribution!

I'm a bot that helps maintainers to validate scenarios and ensure they include all the required information.
I've found some errors in your scenarios, please fix them and re-submit your PR, or ask for help if you need it.

The following items have errors:

crowdsecurity/crs-exclusion-plugin-cpanel:

  • labels not found

crowdsecurity/crs-exclusion-plugin-dokuwiki:

  • labels not found

crowdsecurity/crs-exclusion-plugin-drupal:

  • labels not found

crowdsecurity/crs-exclusion-plugin-nextcloud:

  • labels not found

crowdsecurity/crs-exclusion-plugin-phpbb:

  • labels not found

crowdsecurity/crs-exclusion-plugin-phpmyadmin:

  • labels not found

crowdsecurity/crs-exclusion-plugin-wordpress:

  • labels not found

crowdsecurity/crs-exclusion-plugin-xenforo:

  • labels not found

Mitre ATT&CK

Information about mitre attack can be found here.
As an example, some common mitre attack techniques:

  • T1110 for bruteforce attacks
  • T1595 and T1190 for exploitation of public vulnerabilities
  • T1595 for generic scanning of exposed applications

Expected format is (where XXXX is the technique ID):

labels:
  classification:
    - attack.TXXXX

CVEs

If your scenario covers a specific CVE (Common Vulnerabilities and Exposures), please add it.

Expected format is (where CVE-XXX-XXX is the CVE ID):

labels:
  classification:
    - cve.CVE-XXX-XXX

Behaviors

Please identify the behavior(s) your scenario is targeting. You can find the list of available behaviors here.

Expected format is (where <behavior> is the behavior you want to target):

labels:
  behavior: <behavior>

See the labels documentation for more information.

@buixor buixor merged commit e352137 into master Mar 31, 2026
11 checks passed
@buixor buixor deleted the 1774875593-vpatch-CVE-2024-6671 branch March 31, 2026 07:48
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants