diff --git a/.appsec-tests/vpatch-CVE-2021-24786/CVE-2021-24786.yaml b/.appsec-tests/vpatch-CVE-2021-24786/CVE-2021-24786.yaml new file mode 100644 index 00000000000..973eed5ee4f --- /dev/null +++ b/.appsec-tests/vpatch-CVE-2021-24786/CVE-2021-24786.yaml @@ -0,0 +1,18 @@ +## autogenerated on 2026-03-30 12:38:33 +id: CVE-2021-24786 +info: + name: CVE-2021-24786 + author: crowdsec + severity: info + description: CVE-2021-24786 testing + tags: appsec-testing +http: + - raw: + - | + GET /wp-admin/edit.php?post_type=dlm_download&page=download-monitor-logs&orderby=download_date`+and+(select+sleep(8))+and+`user_id=user_id HTTP/1.1 + Host: {{Hostname}} + cookie-reuse: true + matchers: + - type: status + status: + - 403 diff --git a/.appsec-tests/vpatch-CVE-2021-24786/config.yaml b/.appsec-tests/vpatch-CVE-2021-24786/config.yaml new file mode 100644 index 00000000000..dd89b877132 --- /dev/null +++ b/.appsec-tests/vpatch-CVE-2021-24786/config.yaml @@ -0,0 +1,5 @@ +## autogenerated on 2026-03-30 12:38:33 +appsec-rules: + - ./appsec-rules/crowdsecurity/base-config.yaml + - ./appsec-rules/crowdsecurity/vpatch-CVE-2021-24786.yaml +nuclei_template: CVE-2021-24786.yaml diff --git a/appsec-rules/crowdsecurity/vpatch-CVE-2021-24786.yaml b/appsec-rules/crowdsecurity/vpatch-CVE-2021-24786.yaml new file mode 100644 index 00000000000..7ad9c4d9bda --- /dev/null +++ b/appsec-rules/crowdsecurity/vpatch-CVE-2021-24786.yaml @@ -0,0 +1,35 @@ +## autogenerated on 2026-03-30 12:38:33 +name: crowdsecurity/vpatch-CVE-2021-24786 +description: 'Detects SQL injection in Download Monitor plugin for WordPress via orderby parameter (CVE-2021-24786)' +rules: + - and: + - zones: + - URI + transform: + - lowercase + - urldecode + match: + type: contains + value: /wp-admin/edit.php + - zones: + - ARGS + variables: + - orderby + transform: + - lowercase + - urldecode + match: + type: regex + value: "[^a-z0-9]" + +labels: + type: exploit + service: http + confidence: 3 + spoofable: 0 + behavior: 'http:exploit' + label: 'Download Monitor - SQLI' + classification: + - cve.CVE-2021-24786 + - attack.T1190 + - cwe.CWE-89 diff --git a/collections/crowdsecurity/appsec-virtual-patching.yaml b/collections/crowdsecurity/appsec-virtual-patching.yaml index 7ccf9a8bf03..5ffa7d3d9d5 100644 --- a/collections/crowdsecurity/appsec-virtual-patching.yaml +++ b/collections/crowdsecurity/appsec-virtual-patching.yaml @@ -99,6 +99,7 @@ appsec-rules: - crowdsecurity/vpatch-CVE-2020-9054 - crowdsecurity/vpatch-CVE-2024-27564 - crowdsecurity/vpatch-CVE-2021-44529 +- crowdsecurity/vpatch-CVE-2021-24786 - crowdsecurity/vpatch-CVE-2024-57727 - crowdsecurity/vpatch-CVE-2024-27292 - crowdsecurity/vpatch-CVE-2025-24893