Skip to content

Commit bd128f2

Browse files
authored
Merge branch 'master' into 1776259684-vpatch-CVE-2026-1603
2 parents 86b5474 + ab16c20 commit bd128f2

12 files changed

Lines changed: 177 additions & 59 deletions

File tree

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
## autogenerated on 2026-03-30 12:50:01
2+
id: CVE-2023-24000
3+
info:
4+
name: CVE-2023-24000
5+
author: crowdsec
6+
severity: info
7+
description: CVE-2023-24000 testing
8+
tags: appsec-testing
9+
http:
10+
- raw:
11+
- |
12+
GET /wp-json/wp/v2/gamipress-logs?trigger_type[]=test')%20AND%20(SELECT%201%20FROM%20(SELECT(SLEEP(6)))x)%20AND%20('a'='a HTTP/1.1
13+
Host: {{Hostname}}
14+
cookie-reuse: true
15+
matchers:
16+
- type: status
17+
status:
18+
- 403
Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
## autogenerated on 2026-03-30 12:50:01
2+
appsec-rules:
3+
- ./appsec-rules/crowdsecurity/base-config.yaml
4+
- ./appsec-rules/crowdsecurity/vpatch-CVE-2023-24000.yaml
5+
nuclei_template: CVE-2023-24000.yaml

.github/workflows/lint.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -33,9 +33,9 @@ jobs:
3333
go-version-file: waf-check/go.mod
3434

3535
- name: golangci-lint
36-
uses: golangci/golangci-lint-action@4afd733a84b1f43292c63897423277bb7f4313a9 # v8.0.0
36+
uses: golangci/golangci-lint-action@1e7e51e771db61008b38414a730f564565cf7c20 # v9.2.0
3737
with:
38-
version: v2.5
38+
version: v2.10
3939
args: --issues-exit-code=1 --timeout 10m
4040
only-new-issues: false
4141
working-directory: waf-check

.github/workflows/test_appsec_rules.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ jobs:
3131
uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0
3232
- uses: actions/setup-go@44694675825211faa026b3c33043df3e48a5fa00 # v6.0.0
3333
with:
34-
go-version: '1.25'
34+
go-version: '1.26'
3535
- name: Install requirements
3636
run: |
3737
sudo apt update

.index.json

Lines changed: 40 additions & 4 deletions
Large diffs are not rendered by default.
Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,35 @@
1+
## autogenerated on 2026-03-30 12:50:01
2+
name: crowdsecurity/vpatch-CVE-2023-24000
3+
description: 'Detects SQL injection attempts in WordPress GamiPress plugin via trigger_type[] parameter.'
4+
rules:
5+
- and:
6+
- zones:
7+
- URI
8+
transform:
9+
- lowercase
10+
- urldecode
11+
match:
12+
type: contains
13+
value: /wp-json/wp/v2/gamipress-logs
14+
- zones:
15+
- ARGS
16+
variables:
17+
- trigger_type[]
18+
transform:
19+
- lowercase
20+
- urldecode
21+
match:
22+
type: regex
23+
value: "[^a-z0-9_-]"
24+
25+
labels:
26+
type: exploit
27+
service: http
28+
confidence: 3
29+
spoofable: 0
30+
behavior: 'http:exploit'
31+
label: 'GamiPress - SQLI'
32+
classification:
33+
- cve.CVE-2023-24000
34+
- attack.T1190
35+
- cwe.CWE-89

blockers.json

Lines changed: 48 additions & 48 deletions
Large diffs are not rendered by default.

collections/crowdsecurity/appsec-virtual-patching.yaml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -48,6 +48,7 @@ appsec-rules:
4848
- crowdsecurity/vpatch-CVE-2024-5057
4949
- crowdsecurity/vpatch-CVE-2023-35078
5050
- crowdsecurity/vpatch-CVE-2023-35082
51+
- crowdsecurity/vpatch-CVE-2023-24000
5152
- crowdsecurity/vpatch-CVE-2022-22954
5253
- crowdsecurity/vpatch-CVE-2024-1212
5354
- crowdsecurity/vpatch-symfony-profiler

collections/crowdsecurity/appsec-wordpress.yaml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@ appsec-rules:
66
- crowdsecurity/vpatch-CVE-2023-2009
77
- crowdsecurity/vpatch-CVE-2023-23488
88
- crowdsecurity/vpatch-CVE-2023-23489
9+
- crowdsecurity/vpatch-CVE-2023-24000
910
- crowdsecurity/vpatch-CVE-2023-4634
1011
- crowdsecurity/vpatch-CVE-2023-6360
1112
- crowdsecurity/vpatch-CVE-2023-6567

taxonomy/scenarios.json

Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1533,6 +1533,28 @@
15331533
"CWE-266"
15341534
]
15351535
},
1536+
"crowdsecurity/vpatch-CVE-2023-24000": {
1537+
"name": "crowdsecurity/vpatch-CVE-2023-24000",
1538+
"description": "Detects SQL injection attempts in WordPress GamiPress plugin via trigger_type[] parameter.",
1539+
"label": "GamiPress - SQLI",
1540+
"behaviors": [
1541+
"http:exploit"
1542+
],
1543+
"mitre_attacks": [
1544+
"TA0001:T1190"
1545+
],
1546+
"confidence": 3,
1547+
"spoofable": 0,
1548+
"cti": true,
1549+
"service": "http",
1550+
"created_at": "2026-04-15T15:30:00",
1551+
"cves": [
1552+
"CVE-2023-24000"
1553+
],
1554+
"cwes": [
1555+
"CWE-89"
1556+
]
1557+
},
15361558
"crowdsecurity/vpatch-CVE-2023-24489": {
15371559
"name": "crowdsecurity/vpatch-CVE-2023-24489",
15381560
"description": "Citrix ShareFile RCE (CVE-2023-24489)",

0 commit comments

Comments
 (0)