-
Notifications
You must be signed in to change notification settings - Fork 162
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
* CVE-2024-3272 * CVE-2024-32113 * fix CVE and title --------- Co-authored-by: GitHub Action <[email protected]>
- Loading branch information
1 parent
d91f10b
commit 12b3713
Showing
10 changed files
with
263 additions
and
11 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,5 @@ | ||
|
||
appsec-rules: | ||
- ./appsec-rules/crowdsecurity/base-config.yaml | ||
- ./appsec-rules/crowdsecurity/vpatch-CVE-2024-32113.yaml | ||
nuclei_template: test-CVE-2024-32113.yaml |
28 changes: 28 additions & 0 deletions
28
.appsec-tests/vpatch-CVE-2024-32113/test-CVE-2024-32113.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,28 @@ | ||
id: test-CVE-2024-32113 | ||
info: | ||
name: test-CVE-2024-32113 | ||
author: crowdsec | ||
severity: info | ||
description: test-CVE-2024-32113 testing | ||
tags: appsec-testing | ||
http: | ||
- raw: | ||
- | | ||
POST /webtools/control/forgotPassword;/ProgramExport HTTP/1.1 | ||
Host: {{Hostname}} | ||
Content-Type: application/x-www-form-urlencoded | ||
groovyProgram=throw+new+Exception('id'.execute().text); | ||
- | | ||
POST /webtools/control/forgotPassword;/ProgramExport HTTP/1.1 | ||
Host: {{Hostname}} | ||
Content-Type: application/x-www-form-urlencoded | ||
groovyProgram=\u0074\u0068\u0072\u006f\u0077\u0020\u006e\u0065\u0077\u0020\u0045\u0078\u0063\u0065\u0070\u0074\u0069\u006f\u006e\u0028\u0027\u0069\u0064\u0027\u002e\u0065\u0078\u0065\u0063\u0075\u0074\u0065\u0028\u0029\u002e\u0074\u0065\u0078\u0074\u0029\u003b | ||
cookie-reuse: true | ||
matchers: | ||
- type: dsl | ||
condition: and | ||
dsl: | ||
- "status_code_1 == 403" | ||
- "status_code_2 == 403" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,5 @@ | ||
|
||
appsec-rules: | ||
- ./appsec-rules/crowdsecurity/base-config.yaml | ||
- ./appsec-rules/crowdsecurity/vpatch-CVE-2024-3272.yaml | ||
nuclei_template: test-CVE-2024-3272.yaml |
22 changes: 22 additions & 0 deletions
22
.appsec-tests/vpatch-CVE-2024-3272/test-CVE-2024-3272.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,22 @@ | ||
id: test-CVE-2024-3272 | ||
info: | ||
name: test-CVE-2024-3272 | ||
author: crowdsec | ||
severity: info | ||
description: test-CVE-2024-3272 testing | ||
tags: appsec-testing | ||
http: | ||
- raw: | ||
- | | ||
GET /cgi-bin/nas_sharing.cgi?user=&passwd=&cmd=15&system=aWQ= HTTP/1.1 | ||
Host: {{Hostname}} | ||
- | | ||
GET /cgi-bin/nas_sharing.cgi?user=mydlinkBRionyg&passwd=YWJjMTIzNDVjYmE&cmd=15&system=aWQ= HTTP/1.1 | ||
Host: {{Hostname}} | ||
cookie-reuse: true | ||
matchers: | ||
- type: dsl | ||
condition: and | ||
dsl: | ||
- "status_code_1 == 403" | ||
- "status_code_2 == 403" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,28 @@ | ||
name: crowdsecurity/vpatch-CVE-2024-32113 | ||
description: "Apache OFBiz - Path Traversal (CVE-2024-32113)" | ||
rules: | ||
- and: | ||
- zones: | ||
- METHOD | ||
match: | ||
type: equals | ||
value: POST | ||
- zones: | ||
- URI | ||
transform: | ||
- lowercase | ||
match: | ||
type: equals | ||
value: /webtools/control/forgotpassword;/programexport | ||
labels: | ||
type: exploit | ||
service: http | ||
confidence: 3 | ||
spoofable: 0 | ||
behavior: "http:exploit" | ||
label: "Apache OFBiz - Path Traversal" | ||
classification: | ||
- cve.CVE-2024-32113 | ||
- attack.T1595 | ||
- attack.T1190 | ||
- cwe.CWE-22 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,42 @@ | ||
name: crowdsecurity/vpatch-CVE-2024-3272 | ||
description: " D-Link NAS - RCE (CVE-2024-3272)" #UPDATE THIS | ||
rules: | ||
- and: | ||
- zones: | ||
- METHOD | ||
match: | ||
type: equals | ||
value: GET | ||
- zones: | ||
- URI | ||
transform: | ||
- lowercase | ||
match: | ||
type: endsWith | ||
value: /cgi-bin/nas_sharing.cgi | ||
- zones: | ||
- ARGS | ||
variables: | ||
- cmd | ||
transform: | ||
- lowercase | ||
match: | ||
type: equals | ||
value: "15" | ||
- zones: | ||
- ARGS_NAMES | ||
match: | ||
type: equals | ||
value: system | ||
labels: | ||
type: exploit | ||
service: http | ||
confidence: 3 | ||
spoofable: 0 | ||
behavior: "http:exploit" | ||
label: " D-Link NAS - RCE" #UPDATE THIS | ||
classification: | ||
- cve.CVE-2024-3272 | ||
- attack.T1595 | ||
- attack.T1190 | ||
- cwe.CWE-287 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.