Skip to content

Conversation

@crowdsec-automation
Copy link
Contributor

This rule targets SQL injection attempts in the ZEROF Web Server 2.0, specifically on the /HandleEvent endpoint. The nuclei template shows that the vulnerable parameter is O33 in the POST body, which is manipulated to include a single quote (') to trigger SQL errors.

  • The first rule condition matches requests to the /HandleEvent endpoint, using a case-insensitive comparison (lowercase transform).
  • The second rule condition inspects the O33 parameter in the POST body (BODY_ARGS), applying both lowercase and urldecode transforms to ensure normalization and to catch encoded payloads. It matches if the value contains a single quote, a common SQL injection indicator.
  • The labels section includes the correct CVE, ATT&CK, and CWE references, and the product/vuln class label is formatted as required.

The test nuclei template is adapted to send a POST request with the vulnerable parameter and expects a 403 response, as per the detection rule. All value: fields are lowercase, and the rule uses contains for the SQL metacharacter, as per guidelines. No regex is used where a simple contains suffices, and all transforms are present for case insensitivity and decoding.

@github-actions
Copy link

Hello @crowdsec-automation and thank you for your contribution!

❗ It seems that the following scenarios are not part of the 'crowdsecurity/appsec-virtual-patching' collection:

🔴 crowdsecurity/vpatch-CVE-2022-25322 🔴

@github-actions
Copy link

Hello @crowdsec-automation,

Scenarios/AppSec Rule are compliant with the taxonomy, thank you for your contribution!

@github-actions
Copy link

Hello @seemanne and thank you for your contribution!

❗ It seems that the following scenarios are not part of the 'crowdsecurity/appsec-virtual-patching' collection:

🔴 crowdsecurity/vpatch-CVE-2023-0600 🔴
🔴 crowdsecurity/vpatch-CVE-2023-2009 🔴
🔴 crowdsecurity/vpatch-CVE-2023-0900 🔴
🔴 crowdsecurity/vpatch-CVE-2023-6623 🔴
🔴 crowdsecurity/vpatch-CVE-2023-23489 🔴
🔴 crowdsecurity/vpatch-CVE-2023-4634 🔴
🔴 crowdsecurity/vpatch-CVE-2023-23488 🔴
🔴 crowdsecurity/vpatch-CVE-2024-1071 🔴
🔴 crowdsecurity/vpatch-CVE-2023-6567 🔴
🔴 crowdsecurity/vpatch-CVE-2023-6360 🔴
🔴 crowdsecurity/vpatch-CVE-2024-1061 🔴

@github-actions
Copy link

Hello @seemanne,

Scenarios/AppSec Rule are compliant with the taxonomy, thank you for your contribution!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants