From d781c4738562d05f75127911fc7b643bbc016552 Mon Sep 17 00:00:00 2001 From: crowdsec-automation <63358111+crowdsec-automation@users.noreply.github.com> Date: Mon, 30 Mar 2026 14:56:58 +0200 Subject: [PATCH 1/4] Add vpatch-CVE-2024-3605 rule --- .../crowdsecurity/vpatch-CVE-2024-3605.yaml | 35 +++++++++++++++++++ 1 file changed, 35 insertions(+) create mode 100644 appsec-rules/crowdsecurity/vpatch-CVE-2024-3605.yaml diff --git a/appsec-rules/crowdsecurity/vpatch-CVE-2024-3605.yaml b/appsec-rules/crowdsecurity/vpatch-CVE-2024-3605.yaml new file mode 100644 index 00000000000..4ca1c8f74e3 --- /dev/null +++ b/appsec-rules/crowdsecurity/vpatch-CVE-2024-3605.yaml @@ -0,0 +1,35 @@ +## autogenerated on 2026-03-30 12:56:55 +name: crowdsecurity/vpatch-CVE-2024-3605 +description: 'Detects SQL injection attempts in WP Hotel Booking plugin via the room_type parameter in the search-rooms API endpoint.' +rules: + - and: + - zones: + - URI + transform: + - lowercase + - urldecode + match: + type: contains + value: /wp-json/wphb/v1/rooms/search-rooms + - zones: + - ARGS + variables: + - room_type + transform: + - lowercase + - urldecode + match: + type: contains + value: '"' + +labels: + type: exploit + service: http + confidence: 3 + spoofable: 0 + behavior: 'http:exploit' + label: 'WP Hotel Booking - SQLI' + classification: + - cve.CVE-2024-3605 + - attack.T1190 + - cwe.CWE-89 From f006fbaba87619e69be805971e4e12ecc3a4aa49 Mon Sep 17 00:00:00 2001 From: crowdsec-automation <63358111+crowdsec-automation@users.noreply.github.com> Date: Mon, 30 Mar 2026 14:57:00 +0200 Subject: [PATCH 2/4] Add vpatch-CVE-2024-3605 test config --- .appsec-tests/vpatch-CVE-2024-3605/config.yaml | 5 +++++ 1 file changed, 5 insertions(+) create mode 100644 .appsec-tests/vpatch-CVE-2024-3605/config.yaml diff --git a/.appsec-tests/vpatch-CVE-2024-3605/config.yaml b/.appsec-tests/vpatch-CVE-2024-3605/config.yaml new file mode 100644 index 00000000000..320d2fc8d05 --- /dev/null +++ b/.appsec-tests/vpatch-CVE-2024-3605/config.yaml @@ -0,0 +1,5 @@ +## autogenerated on 2026-03-30 12:56:55 +appsec-rules: + - ./appsec-rules/crowdsecurity/base-config.yaml + - ./appsec-rules/crowdsecurity/vpatch-CVE-2024-3605.yaml +nuclei_template: CVE-2024-3605.yaml From f2e5bee036c351eced07866d1825d0465a568196 Mon Sep 17 00:00:00 2001 From: crowdsec-automation <63358111+crowdsec-automation@users.noreply.github.com> Date: Mon, 30 Mar 2026 14:57:02 +0200 Subject: [PATCH 3/4] Add CVE-2024-3605.yaml test --- .../vpatch-CVE-2024-3605/CVE-2024-3605.yaml | 18 ++++++++++++++++++ 1 file changed, 18 insertions(+) create mode 100644 .appsec-tests/vpatch-CVE-2024-3605/CVE-2024-3605.yaml diff --git a/.appsec-tests/vpatch-CVE-2024-3605/CVE-2024-3605.yaml b/.appsec-tests/vpatch-CVE-2024-3605/CVE-2024-3605.yaml new file mode 100644 index 00000000000..befd7f9cc91 --- /dev/null +++ b/.appsec-tests/vpatch-CVE-2024-3605/CVE-2024-3605.yaml @@ -0,0 +1,18 @@ +## autogenerated on 2026-03-30 12:56:55 +id: CVE-2024-3605 +info: + name: CVE-2024-3605 + author: crowdsec + severity: info + description: CVE-2024-3605 testing + tags: appsec-testing +http: + - raw: + - | + GET /wp-json/wphb/v1/rooms/search-rooms?check_in_date=2025-01-01&check_out_date=2025-01-10&adults=4&max_child=0&paged=1&room_type=1%22%29%20OR%20SLEEP%280.03%29--%20- HTTP/1.1 + Host: {{Hostname}} + cookie-reuse: true + matchers: + - type: status + status: + - 403 From 5a4a519d6269862e1718318f1edbfbd2d9252083 Mon Sep 17 00:00:00 2001 From: crowdsec-automation <63358111+crowdsec-automation@users.noreply.github.com> Date: Mon, 30 Mar 2026 14:57:03 +0200 Subject: [PATCH 4/4] Add vpatch-CVE-2024-3605 rule to vpatch collection --- collections/crowdsecurity/appsec-virtual-patching.yaml | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/collections/crowdsecurity/appsec-virtual-patching.yaml b/collections/crowdsecurity/appsec-virtual-patching.yaml index b14c454ae77..8de14ce3129 100644 --- a/collections/crowdsecurity/appsec-virtual-patching.yaml +++ b/collections/crowdsecurity/appsec-virtual-patching.yaml @@ -71,6 +71,7 @@ appsec-rules: - crowdsecurity/vpatch-CVE-2022-41082 - crowdsecurity/vpatch-CVE-2019-18935 - crowdsecurity/vpatch-CVE-2024-8190 +- crowdsecurity/vpatch-CVE-2024-3605 - crowdsecurity/vpatch-CVE-2024-28987 - crowdsecurity/vpatch-CVE-2024-38856 - crowdsecurity/vpatch-CVE-2018-20062 @@ -178,13 +179,11 @@ appsec-rules: - crowdsecurity/vpatch-CVE-2025-15503 - crowdsecurity/vpatch-CVE-2025-13956 author: crowdsecurity -tags: - - waf contexts: - crowdsecurity/appsec_base description: a generic virtual patching collection, suitable for most web servers. labels: - label: "WAF - Virtual Patching" + label: WAF - Virtual Patching name: crowdsecurity/appsec-virtual-patching parsers: - crowdsecurity/appsec-logs @@ -192,3 +191,5 @@ scenarios: - crowdsecurity/appsec-vpatch - crowdsecurity/appsec-native - crowdsecurity/appsec-generic-test +tags: +- waf