Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
18 changes: 18 additions & 0 deletions .appsec-tests/vpatch-CVE-2023-24000/CVE-2023-24000.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,18 @@
## autogenerated on 2026-03-30 12:50:01
id: CVE-2023-24000
info:
name: CVE-2023-24000
author: crowdsec
severity: info
description: CVE-2023-24000 testing
tags: appsec-testing
http:
- raw:
- |
GET /wp-json/wp/v2/gamipress-logs?trigger_type[]=test')%20AND%20(SELECT%201%20FROM%20(SELECT(SLEEP(6)))x)%20AND%20('a'='a HTTP/1.1
Host: {{Hostname}}
cookie-reuse: true
matchers:
- type: status
status:
- 403
5 changes: 5 additions & 0 deletions .appsec-tests/vpatch-CVE-2023-24000/config.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
## autogenerated on 2026-03-30 12:50:01
appsec-rules:
- ./appsec-rules/crowdsecurity/base-config.yaml
- ./appsec-rules/crowdsecurity/vpatch-CVE-2023-24000.yaml
nuclei_template: CVE-2023-24000.yaml
35 changes: 35 additions & 0 deletions appsec-rules/crowdsecurity/vpatch-CVE-2023-24000.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,35 @@
## autogenerated on 2026-03-30 12:50:01
name: crowdsecurity/vpatch-CVE-2023-24000
description: 'Detects SQL injection attempts in WordPress GamiPress plugin via trigger_type[] parameter.'
rules:
- and:
- zones:
- URI
transform:
- lowercase
- urldecode
match:
type: contains
value: /wp-json/wp/v2/gamipress-logs
- zones:
- ARGS
variables:
- trigger_type[]
transform:
- lowercase
- urldecode
match:
type: regex
value: "[^a-z0-9_-]"

labels:
type: exploit
service: http
confidence: 3
spoofable: 0
behavior: 'http:exploit'
label: 'GamiPress - SQLI'
classification:
- cve.CVE-2023-24000
- attack.T1190
- cwe.CWE-89
7 changes: 4 additions & 3 deletions collections/crowdsecurity/appsec-virtual-patching.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -45,6 +45,7 @@ appsec-rules:
- crowdsecurity/vpatch-CVE-2024-5057
- crowdsecurity/vpatch-CVE-2023-35078
- crowdsecurity/vpatch-CVE-2023-35082
- crowdsecurity/vpatch-CVE-2023-24000
- crowdsecurity/vpatch-CVE-2022-22954
- crowdsecurity/vpatch-CVE-2024-1212
- crowdsecurity/vpatch-symfony-profiler
Expand Down Expand Up @@ -178,17 +179,17 @@ appsec-rules:
- crowdsecurity/vpatch-CVE-2025-15503
- crowdsecurity/vpatch-CVE-2025-13956
author: crowdsecurity
tags:
- waf
contexts:
- crowdsecurity/appsec_base
description: a generic virtual patching collection, suitable for most web servers.
labels:
label: "WAF - Virtual Patching"
label: WAF - Virtual Patching
name: crowdsecurity/appsec-virtual-patching
parsers:
- crowdsecurity/appsec-logs
scenarios:
- crowdsecurity/appsec-vpatch
- crowdsecurity/appsec-native
- crowdsecurity/appsec-generic-test
tags:
- waf
1 change: 1 addition & 0 deletions collections/crowdsecurity/appsec-wordpress.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -6,6 +6,7 @@ appsec-rules:
- crowdsecurity/vpatch-CVE-2023-2009
- crowdsecurity/vpatch-CVE-2023-23488
- crowdsecurity/vpatch-CVE-2023-23489
- crowdsecurity/vpatch-CVE-2023-24000
- crowdsecurity/vpatch-CVE-2023-4634
- crowdsecurity/vpatch-CVE-2023-6360
- crowdsecurity/vpatch-CVE-2023-6567
Expand Down