diff --git a/.appsec-tests/vpatch-CVE-2023-24000/CVE-2023-24000.yaml b/.appsec-tests/vpatch-CVE-2023-24000/CVE-2023-24000.yaml new file mode 100644 index 00000000000..ba53c242ea6 --- /dev/null +++ b/.appsec-tests/vpatch-CVE-2023-24000/CVE-2023-24000.yaml @@ -0,0 +1,18 @@ +## autogenerated on 2026-03-30 12:50:01 +id: CVE-2023-24000 +info: + name: CVE-2023-24000 + author: crowdsec + severity: info + description: CVE-2023-24000 testing + tags: appsec-testing +http: + - raw: + - | + GET /wp-json/wp/v2/gamipress-logs?trigger_type[]=test')%20AND%20(SELECT%201%20FROM%20(SELECT(SLEEP(6)))x)%20AND%20('a'='a HTTP/1.1 + Host: {{Hostname}} + cookie-reuse: true + matchers: + - type: status + status: + - 403 diff --git a/.appsec-tests/vpatch-CVE-2023-24000/config.yaml b/.appsec-tests/vpatch-CVE-2023-24000/config.yaml new file mode 100644 index 00000000000..fad3c1373fa --- /dev/null +++ b/.appsec-tests/vpatch-CVE-2023-24000/config.yaml @@ -0,0 +1,5 @@ +## autogenerated on 2026-03-30 12:50:01 +appsec-rules: + - ./appsec-rules/crowdsecurity/base-config.yaml + - ./appsec-rules/crowdsecurity/vpatch-CVE-2023-24000.yaml +nuclei_template: CVE-2023-24000.yaml diff --git a/appsec-rules/crowdsecurity/vpatch-CVE-2023-24000.yaml b/appsec-rules/crowdsecurity/vpatch-CVE-2023-24000.yaml new file mode 100644 index 00000000000..1ad230d2975 --- /dev/null +++ b/appsec-rules/crowdsecurity/vpatch-CVE-2023-24000.yaml @@ -0,0 +1,35 @@ +## autogenerated on 2026-03-30 12:50:01 +name: crowdsecurity/vpatch-CVE-2023-24000 +description: 'Detects SQL injection attempts in WordPress GamiPress plugin via trigger_type[] parameter.' +rules: + - and: + - zones: + - URI + transform: + - lowercase + - urldecode + match: + type: contains + value: /wp-json/wp/v2/gamipress-logs + - zones: + - ARGS + variables: + - trigger_type[] + transform: + - lowercase + - urldecode + match: + type: regex + value: "[^a-z0-9_-]" + +labels: + type: exploit + service: http + confidence: 3 + spoofable: 0 + behavior: 'http:exploit' + label: 'GamiPress - SQLI' + classification: + - cve.CVE-2023-24000 + - attack.T1190 + - cwe.CWE-89 diff --git a/collections/crowdsecurity/appsec-virtual-patching.yaml b/collections/crowdsecurity/appsec-virtual-patching.yaml index b14c454ae77..54b0f09e866 100644 --- a/collections/crowdsecurity/appsec-virtual-patching.yaml +++ b/collections/crowdsecurity/appsec-virtual-patching.yaml @@ -45,6 +45,7 @@ appsec-rules: - crowdsecurity/vpatch-CVE-2024-5057 - crowdsecurity/vpatch-CVE-2023-35078 - crowdsecurity/vpatch-CVE-2023-35082 +- crowdsecurity/vpatch-CVE-2023-24000 - crowdsecurity/vpatch-CVE-2022-22954 - crowdsecurity/vpatch-CVE-2024-1212 - crowdsecurity/vpatch-symfony-profiler @@ -178,13 +179,11 @@ appsec-rules: - crowdsecurity/vpatch-CVE-2025-15503 - crowdsecurity/vpatch-CVE-2025-13956 author: crowdsecurity -tags: - - waf contexts: - crowdsecurity/appsec_base description: a generic virtual patching collection, suitable for most web servers. labels: - label: "WAF - Virtual Patching" + label: WAF - Virtual Patching name: crowdsecurity/appsec-virtual-patching parsers: - crowdsecurity/appsec-logs @@ -192,3 +191,5 @@ scenarios: - crowdsecurity/appsec-vpatch - crowdsecurity/appsec-native - crowdsecurity/appsec-generic-test +tags: +- waf diff --git a/collections/crowdsecurity/appsec-wordpress.yaml b/collections/crowdsecurity/appsec-wordpress.yaml index 75e705eb0ae..53546bd9744 100644 --- a/collections/crowdsecurity/appsec-wordpress.yaml +++ b/collections/crowdsecurity/appsec-wordpress.yaml @@ -6,6 +6,7 @@ appsec-rules: - crowdsecurity/vpatch-CVE-2023-2009 - crowdsecurity/vpatch-CVE-2023-23488 - crowdsecurity/vpatch-CVE-2023-23489 + - crowdsecurity/vpatch-CVE-2023-24000 - crowdsecurity/vpatch-CVE-2023-4634 - crowdsecurity/vpatch-CVE-2023-6360 - crowdsecurity/vpatch-CVE-2023-6567