Skip to content

Commit c783ae5

Browse files
authored
Merge branch 'master' into 1776258921-vpatch-CVE-2026-1357
2 parents 24f9eac + ed6b89c commit c783ae5

9 files changed

Lines changed: 67 additions & 7 deletions

File tree

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
## autogenerated on 2026-03-30 12:50:01
2+
id: CVE-2023-24000
3+
info:
4+
name: CVE-2023-24000
5+
author: crowdsec
6+
severity: info
7+
description: CVE-2023-24000 testing
8+
tags: appsec-testing
9+
http:
10+
- raw:
11+
- |
12+
GET /wp-json/wp/v2/gamipress-logs?trigger_type[]=test')%20AND%20(SELECT%201%20FROM%20(SELECT(SLEEP(6)))x)%20AND%20('a'='a HTTP/1.1
13+
Host: {{Hostname}}
14+
cookie-reuse: true
15+
matchers:
16+
- type: status
17+
status:
18+
- 403
Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
## autogenerated on 2026-03-30 12:50:01
2+
appsec-rules:
3+
- ./appsec-rules/crowdsecurity/base-config.yaml
4+
- ./appsec-rules/crowdsecurity/vpatch-CVE-2023-24000.yaml
5+
nuclei_template: CVE-2023-24000.yaml

.github/workflows/lint.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -33,9 +33,9 @@ jobs:
3333
go-version-file: waf-check/go.mod
3434

3535
- name: golangci-lint
36-
uses: golangci/golangci-lint-action@4afd733a84b1f43292c63897423277bb7f4313a9 # v8.0.0
36+
uses: golangci/golangci-lint-action@1e7e51e771db61008b38414a730f564565cf7c20 # v9.2.0
3737
with:
38-
version: v2.5
38+
version: v2.10
3939
args: --issues-exit-code=1 --timeout 10m
4040
only-new-issues: false
4141
working-directory: waf-check

.github/workflows/test_appsec_rules.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ jobs:
3131
uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0
3232
- uses: actions/setup-go@44694675825211faa026b3c33043df3e48a5fa00 # v6.0.0
3333
with:
34-
go-version: '1.25'
34+
go-version: '1.26'
3535
- name: Install requirements
3636
run: |
3737
sudo apt update
Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,35 @@
1+
## autogenerated on 2026-03-30 12:50:01
2+
name: crowdsecurity/vpatch-CVE-2023-24000
3+
description: 'Detects SQL injection attempts in WordPress GamiPress plugin via trigger_type[] parameter.'
4+
rules:
5+
- and:
6+
- zones:
7+
- URI
8+
transform:
9+
- lowercase
10+
- urldecode
11+
match:
12+
type: contains
13+
value: /wp-json/wp/v2/gamipress-logs
14+
- zones:
15+
- ARGS
16+
variables:
17+
- trigger_type[]
18+
transform:
19+
- lowercase
20+
- urldecode
21+
match:
22+
type: regex
23+
value: "[^a-z0-9_-]"
24+
25+
labels:
26+
type: exploit
27+
service: http
28+
confidence: 3
29+
spoofable: 0
30+
behavior: 'http:exploit'
31+
label: 'GamiPress - SQLI'
32+
classification:
33+
- cve.CVE-2023-24000
34+
- attack.T1190
35+
- cwe.CWE-89

collections/crowdsecurity/appsec-virtual-patching.yaml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -47,6 +47,7 @@ appsec-rules:
4747
- crowdsecurity/vpatch-CVE-2024-5057
4848
- crowdsecurity/vpatch-CVE-2023-35078
4949
- crowdsecurity/vpatch-CVE-2023-35082
50+
- crowdsecurity/vpatch-CVE-2023-24000
5051
- crowdsecurity/vpatch-CVE-2022-22954
5152
- crowdsecurity/vpatch-CVE-2024-1212
5253
- crowdsecurity/vpatch-symfony-profiler

collections/crowdsecurity/appsec-wordpress.yaml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@ appsec-rules:
66
- crowdsecurity/vpatch-CVE-2023-2009
77
- crowdsecurity/vpatch-CVE-2023-23488
88
- crowdsecurity/vpatch-CVE-2023-23489
9+
- crowdsecurity/vpatch-CVE-2023-24000
910
- crowdsecurity/vpatch-CVE-2023-4634
1011
- crowdsecurity/vpatch-CVE-2023-6360
1112
- crowdsecurity/vpatch-CVE-2023-6567

waf-check/go.mod

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
module waf-check
22

3-
go 1.25
3+
go 1.26
44

55
require gopkg.in/yaml.v2 v2.4.0

waf-check/request.go

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -52,12 +52,12 @@ func (r *Request) Curl() string {
5252
curlCmd.WriteString("curl -X " + r.Method)
5353

5454
for key, value := range r.Headers {
55-
curlCmd.WriteString(fmt.Sprintf(" -H '%s: %s'", key, value))
55+
fmt.Fprintf(&curlCmd, " -H '%s: %s'", key, value)
5656
}
5757
if r.Method == http.MethodPost || r.Method == http.MethodPut {
58-
curlCmd.WriteString(fmt.Sprintf(" -d '%s'", r.Data))
58+
fmt.Fprintf(&curlCmd, " -d '%s'", r.Data)
5959
}
60-
curlCmd.WriteString(fmt.Sprintf(" '%s'", r.FullURL))
60+
fmt.Fprintf(&curlCmd, " '%s'", r.FullURL)
6161

6262
return curlCmd.String()
6363
}

0 commit comments

Comments
 (0)