Add vpatch-CVE-2021-32478 rule and test
This rule targets the Moodle LTI authorization endpoint vulnerable to reflected XSS and open redirect via the redirect_uri parameter. The detection logic is as follows:
- The first condition matches requests to
/mod/lti/auth.phpin the URI, ensuring the rule only applies to the relevant endpoint. - The second condition inspects the
redirect_uriargument in the query string, after lowercasing and URL decoding, and checks if it contains the stringjavascript:. This is a common vector for XSS and open redirect attacks, as shown in the nuclei template payload. - The use of
containsandlowercaseensures the rule is robust against case variations and encoding tricks. - The labels section includes the correct CVE, ATT&CK, and CWE references, and the product/vuln class label is formatted as required.
- The test config and nuclei test are adapted to expect a 403 response, as per the guidelines.
- All
value:fields are lowercase, and the rule usescontainsfor matching, as required.
Hello @crowdsec-automation and thank you for your contribution!
:heavy_exclamation_mark: It seems that the following scenarios are not part of the 'crowdsecurity/appsec-virtual-patching' collection:
:red_circle: crowdsecurity/vpatch-CVE-2021-32478 :red_circle:
Hello @crowdsec-automation and thank you for your contribution!
I'm a bot that helps maintainers to validate scenarios and ensure they include all the required information. I've found some errors in your scenarios, please fix them and re-submit your PR, or ask for help if you need it.
The following items have errors:
crowdsecurity/crs-exclusion-plugin-cpanel:
labelsnot found
crowdsecurity/crs-exclusion-plugin-dokuwiki:
labelsnot found
crowdsecurity/crs-exclusion-plugin-drupal:
labelsnot found
crowdsecurity/crs-exclusion-plugin-nextcloud:
labelsnot found
crowdsecurity/crs-exclusion-plugin-phpbb:
labelsnot found
crowdsecurity/crs-exclusion-plugin-phpmyadmin:
labelsnot found
crowdsecurity/crs-exclusion-plugin-wordpress:
labelsnot found
crowdsecurity/crs-exclusion-plugin-xenforo:
labelsnot found
Mitre ATT&CK
Information about mitre attack can be found here. As an example, some common mitre attack techniques:
- T1110 for bruteforce attacks
- T1595 and T1190 for exploitation of public vulnerabilities
- T1595 for generic scanning of exposed applications
Expected format is (where XXXX is the technique ID):
labels:
classification:
- attack.TXXXX
CVEs
If your scenario covers a specific CVE (Common Vulnerabilities and Exposures), please add it.
Expected format is (where CVE-XXX-XXX is the CVE ID):
labels:
classification:
- cve.CVE-XXX-XXX
Behaviors
Please identify the behavior(s) your scenario is targeting. You can find the list of available behaviors here.
Expected format is (where <behavior> is the behavior you want to target):
labels:
behavior: <behavior>
See the labels documentation for more information.
Hello @buixor and thank you for your contribution!
:heavy_exclamation_mark: It seems that the following scenarios are not part of the 'crowdsecurity/appsec-virtual-patching' collection:
:red_circle: crowdsecurity/vpatch-CVE-2023-0600 :red_circle: :red_circle: crowdsecurity/vpatch-CVE-2023-2009 :red_circle: :red_circle: crowdsecurity/vpatch-CVE-2023-0900 :red_circle: :red_circle: crowdsecurity/vpatch-CVE-2023-6623 :red_circle: :red_circle: crowdsecurity/vpatch-CVE-2023-23489 :red_circle: :red_circle: crowdsecurity/vpatch-CVE-2023-4634 :red_circle: :red_circle: crowdsecurity/vpatch-CVE-2023-23488 :red_circle: :red_circle: crowdsecurity/vpatch-CVE-2024-1071 :red_circle: :red_circle: crowdsecurity/vpatch-CVE-2023-6567 :red_circle: :red_circle: crowdsecurity/vpatch-CVE-2023-6360 :red_circle: :red_circle: crowdsecurity/vpatch-CVE-2024-1061 :red_circle:
Hello @buixor and thank you for your contribution!
I'm a bot that helps maintainers to validate scenarios and ensure they include all the required information. I've found some errors in your scenarios, please fix them and re-submit your PR, or ask for help if you need it.
The following items have errors:
crowdsecurity/crs-exclusion-plugin-cpanel:
labelsnot found
crowdsecurity/crs-exclusion-plugin-dokuwiki:
labelsnot found
crowdsecurity/crs-exclusion-plugin-drupal:
labelsnot found
crowdsecurity/crs-exclusion-plugin-nextcloud:
labelsnot found
crowdsecurity/crs-exclusion-plugin-phpbb:
labelsnot found
crowdsecurity/crs-exclusion-plugin-phpmyadmin:
labelsnot found
crowdsecurity/crs-exclusion-plugin-wordpress:
labelsnot found
crowdsecurity/crs-exclusion-plugin-xenforo:
labelsnot found
Mitre ATT&CK
Information about mitre attack can be found here. As an example, some common mitre attack techniques:
- T1110 for bruteforce attacks
- T1595 and T1190 for exploitation of public vulnerabilities
- T1595 for generic scanning of exposed applications
Expected format is (where XXXX is the technique ID):
labels:
classification:
- attack.TXXXX
CVEs
If your scenario covers a specific CVE (Common Vulnerabilities and Exposures), please add it.
Expected format is (where CVE-XXX-XXX is the CVE ID):
labels:
classification:
- cve.CVE-XXX-XXX
Behaviors
Please identify the behavior(s) your scenario is targeting. You can find the list of available behaviors here.
Expected format is (where <behavior> is the behavior you want to target):
labels:
behavior: <behavior>
See the labels documentation for more information.
Hello @buixor and thank you for your contribution!
:heavy_exclamation_mark: It seems that the following scenarios are not part of the 'crowdsecurity/appsec-virtual-patching' collection:
:red_circle: crowdsecurity/vpatch-CVE-2023-0600 :red_circle: :red_circle: crowdsecurity/vpatch-CVE-2023-2009 :red_circle: :red_circle: crowdsecurity/vpatch-CVE-2023-0900 :red_circle: :red_circle: crowdsecurity/vpatch-CVE-2023-6623 :red_circle: :red_circle: crowdsecurity/vpatch-CVE-2023-23489 :red_circle: :red_circle: crowdsecurity/vpatch-CVE-2023-4634 :red_circle: :red_circle: crowdsecurity/vpatch-CVE-2023-23488 :red_circle: :red_circle: crowdsecurity/vpatch-CVE-2024-1071 :red_circle: :red_circle: crowdsecurity/vpatch-CVE-2023-6567 :red_circle: :red_circle: crowdsecurity/vpatch-CVE-2023-6360 :red_circle: :red_circle: crowdsecurity/vpatch-CVE-2024-1061 :red_circle:
Hello @buixor and thank you for your contribution!
I'm a bot that helps maintainers to validate scenarios and ensure they include all the required information. I've found some errors in your scenarios, please fix them and re-submit your PR, or ask for help if you need it.
The following items have errors:
crowdsecurity/crs-exclusion-plugin-cpanel:
labelsnot found
crowdsecurity/crs-exclusion-plugin-dokuwiki:
labelsnot found
crowdsecurity/crs-exclusion-plugin-drupal:
labelsnot found
crowdsecurity/crs-exclusion-plugin-nextcloud:
labelsnot found
crowdsecurity/crs-exclusion-plugin-phpbb:
labelsnot found
crowdsecurity/crs-exclusion-plugin-phpmyadmin:
labelsnot found
crowdsecurity/crs-exclusion-plugin-wordpress:
labelsnot found
crowdsecurity/crs-exclusion-plugin-xenforo:
labelsnot found
Mitre ATT&CK
Information about mitre attack can be found here. As an example, some common mitre attack techniques:
- T1110 for bruteforce attacks
- T1595 and T1190 for exploitation of public vulnerabilities
- T1595 for generic scanning of exposed applications
Expected format is (where XXXX is the technique ID):
labels:
classification:
- attack.TXXXX
CVEs
If your scenario covers a specific CVE (Common Vulnerabilities and Exposures), please add it.
Expected format is (where CVE-XXX-XXX is the CVE ID):
labels:
classification:
- cve.CVE-XXX-XXX
Behaviors
Please identify the behavior(s) your scenario is targeting. You can find the list of available behaviors here.
Expected format is (where <behavior> is the behavior you want to target):
labels:
behavior: <behavior>
See the labels documentation for more information.