diff --git a/.appsec-tests/vpatch-CVE-2022-3254/CVE-2022-3254.yaml b/.appsec-tests/vpatch-CVE-2022-3254/CVE-2022-3254.yaml new file mode 100644 index 00000000000..01b9308a6eb --- /dev/null +++ b/.appsec-tests/vpatch-CVE-2022-3254/CVE-2022-3254.yaml @@ -0,0 +1,19 @@ +## autogenerated on 2026-03-30 12:39:17 +id: CVE-2022-3254 +info: + name: CVE-2022-3254 + author: crowdsec + severity: info + description: CVE-2022-3254 testing + tags: appsec-testing +http: + - raw: + - | + GET /wp-admin/admin-ajax.php?action=awpcp-get-regions-options&context=search&parent_type=country&parent=test`+FROM+wp_users+WHERE+1=0+UNION+SELECT+VERSION();--+- HTTP/1.1 + Host: {{Hostname}} + Accept: application/json, text/javascript, */*; q=0.01 + cookie-reuse: true + matchers: + - type: status + status: + - 403 diff --git a/.appsec-tests/vpatch-CVE-2022-3254/config.yaml b/.appsec-tests/vpatch-CVE-2022-3254/config.yaml new file mode 100644 index 00000000000..b495055e4ad --- /dev/null +++ b/.appsec-tests/vpatch-CVE-2022-3254/config.yaml @@ -0,0 +1,5 @@ +## autogenerated on 2026-03-30 12:39:17 +appsec-rules: + - ./appsec-rules/crowdsecurity/base-config.yaml + - ./appsec-rules/crowdsecurity/vpatch-CVE-2022-3254.yaml +nuclei_template: CVE-2022-3254.yaml diff --git a/appsec-rules/crowdsecurity/vpatch-CVE-2022-3254.yaml b/appsec-rules/crowdsecurity/vpatch-CVE-2022-3254.yaml new file mode 100644 index 00000000000..88174ce2f7a --- /dev/null +++ b/appsec-rules/crowdsecurity/vpatch-CVE-2022-3254.yaml @@ -0,0 +1,45 @@ +## autogenerated on 2026-03-30 12:39:17 +name: crowdsecurity/vpatch-CVE-2022-3254 +description: 'Detects unauthenticated SQL injection in AWP Classifieds via admin-ajax.php action awpcp-get-regions-options.' +rules: + - and: + - zones: + - URI + transform: + - lowercase + - urldecode + match: + type: contains + value: /wp-admin/admin-ajax.php + - zones: + - ARGS + variables: + - parent + transform: + - lowercase + - urldecode + match: + type: regex + value: "[^a-z0-9]" + - zones: + - ARGS + variables: + - action + transform: + - lowercase + - urldecode + match: + type: equals + value: awpcp-get-regions-options + +labels: + type: exploit + service: http + confidence: 3 + spoofable: 0 + behavior: 'http:exploit' + label: 'AWP Classifieds - SQLI' + classification: + - cve.CVE-2022-3254 + - attack.T1190 + - cwe.CWE-89 diff --git a/collections/crowdsecurity/appsec-wordpress.yaml b/collections/crowdsecurity/appsec-wordpress.yaml index 75e705eb0ae..9851e1ac01f 100644 --- a/collections/crowdsecurity/appsec-wordpress.yaml +++ b/collections/crowdsecurity/appsec-wordpress.yaml @@ -14,6 +14,7 @@ appsec-rules: - crowdsecurity/vpatch-CVE-2024-1071 - crowdsecurity/generic-wordpress-uploads-php - crowdsecurity/vpatch-CVE-2024-6205 + - crowdsecurity/vpatch-CVE-2022-3254 - crowdsecurity/generic-wordpress-uploads-listing appsec-configs: - crowdsecurity/virtual-patching