Add vpatch-CVE-2025-27223 rule and test #1527
Open
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This rule detects attempts to exploit the authentication bypass vulnerability in TRUfusion Enterprise (CVE-2025-27223). The detection is based on two main criteria:
/trufusionportal/getprojectlist
, which is a sensitive endpoint that should require authentication.COOKIEID
in the Cookie header, which is the session identifier that can be forged due to the hard-coded cryptographic key vulnerability.The rule uses the
HEADERS_NAMES
zone with acontains
match forcookieid
(case-insensitive) to ensure it triggers only when the relevant session cookie is present. Thelowercase
transform is applied to both URI and header name checks to ensure case-insensitive matching. This approach minimizes false positives by focusing on the specific endpoint and the presence of the vulnerable session cookie.Validation checklist:
value:
fields are lowercase.transform:
includelowercase
.match.value
contains capital letters.contains
instead ofregex
where applicable.