Skip to content

Commit ccca125

Browse files
crowdsec-automationCopilotbuixor
authored
Add vpatch-CVE-2023-3197 rule and test (#1738)
* Add vpatch-CVE-2023-3197 rule * Add vpatch-CVE-2023-3197 test config * Add CVE-2023-3197.yaml test * Add vpatch-CVE-2023-3197 rule to vpatch collection * Fix id parameter match to use regex for non a-z0-9 characters Agent-Logs-Url: https://github.com/crowdsecurity/hub/sessions/97af246c-3508-4526-bc57-e58fdcad9fbc Co-authored-by: buixor <990714+buixor@users.noreply.github.com> * Move vpatch-CVE-2023-3197 to wordpress appsec collection Agent-Logs-Url: https://github.com/crowdsecurity/hub/sessions/a074b18e-c43e-471c-bc0d-cd618d811c83 Co-authored-by: buixor <990714+buixor@users.noreply.github.com> --------- Co-authored-by: copilot-swe-agent[bot] <198982749+Copilot@users.noreply.github.com> Co-authored-by: buixor <990714+buixor@users.noreply.github.com> Co-authored-by: Thibault "bui" Koechlin <thibault@crowdsec.net>
1 parent 68d6d6d commit ccca125

4 files changed

Lines changed: 60 additions & 0 deletions

File tree

Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,19 @@
1+
## autogenerated on 2026-03-30 12:46:51
2+
id: CVE-2023-3197
3+
info:
4+
name: CVE-2023-3197
5+
author: crowdsec
6+
severity: info
7+
description: CVE-2023-3197 testing
8+
tags: appsec-testing
9+
http:
10+
- raw:
11+
- |
12+
GET /wp-json/api/flutter_multi_vendor/product-categories?id=1%20AND%20(SELECT%201%20FROM%20(SELECT%20SLEEP(6))a) HTTP/1.1
13+
Host: {{Hostname}}
14+
Accept: application/json
15+
cookie-reuse: true
16+
matchers:
17+
- type: status
18+
status:
19+
- 403
Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
## autogenerated on 2026-03-30 12:46:51
2+
appsec-rules:
3+
- ./appsec-rules/crowdsecurity/base-config.yaml
4+
- ./appsec-rules/crowdsecurity/vpatch-CVE-2023-3197.yaml
5+
nuclei_template: CVE-2023-3197.yaml
Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,35 @@
1+
## autogenerated on 2026-03-30 12:46:51
2+
name: crowdsecurity/vpatch-CVE-2023-3197
3+
description: 'Detects unauthenticated SQL injection in WordPress MStore API plugin via id parameter.'
4+
rules:
5+
- and:
6+
- zones:
7+
- URI
8+
transform:
9+
- lowercase
10+
- urldecode
11+
match:
12+
type: contains
13+
value: /wp-json/api/flutter_multi_vendor/product-categories
14+
- zones:
15+
- ARGS
16+
variables:
17+
- id
18+
transform:
19+
- lowercase
20+
- urldecode
21+
match:
22+
type: regex
23+
value: '[^a-z0-9]'
24+
25+
labels:
26+
type: exploit
27+
service: http
28+
confidence: 3
29+
spoofable: 0
30+
behavior: 'http:exploit'
31+
label: 'WordPress MStore API - SQLI'
32+
classification:
33+
- cve.CVE-2023-3197
34+
- attack.T1190
35+
- cwe.CWE-89

collections/crowdsecurity/appsec-wordpress.yaml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,7 @@ appsec-rules:
1616
- crowdsecurity/vpatch-CVE-2024-6205
1717
- crowdsecurity/vpatch-CVE-2022-3254
1818
- crowdsecurity/generic-wordpress-uploads-listing
19+
- crowdsecurity/vpatch-CVE-2023-3197
1920
appsec-configs:
2021
- crowdsecurity/virtual-patching
2122
parsers:

0 commit comments

Comments
 (0)