Skip to content
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
18 changes: 18 additions & 0 deletions .appsec-tests/vpatch-CVE-2024-3605/CVE-2024-3605.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,18 @@
## autogenerated on 2026-03-30 12:56:55
id: CVE-2024-3605
info:
name: CVE-2024-3605
author: crowdsec
severity: info
description: CVE-2024-3605 testing
tags: appsec-testing
http:
- raw:
- |
GET /wp-json/wphb/v1/rooms/search-rooms?check_in_date=2025-01-01&check_out_date=2025-01-10&adults=4&max_child=0&paged=1&room_type=1%22%29%20OR%20SLEEP%280.03%29--%20- HTTP/1.1
Host: {{Hostname}}
cookie-reuse: true
matchers:
- type: status
status:
- 403
5 changes: 5 additions & 0 deletions .appsec-tests/vpatch-CVE-2024-3605/config.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
## autogenerated on 2026-03-30 12:56:55
appsec-rules:
- ./appsec-rules/crowdsecurity/base-config.yaml
- ./appsec-rules/crowdsecurity/vpatch-CVE-2024-3605.yaml
nuclei_template: CVE-2024-3605.yaml
35 changes: 35 additions & 0 deletions appsec-rules/crowdsecurity/vpatch-CVE-2024-3605.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,35 @@
## autogenerated on 2026-03-30 12:56:55
name: crowdsecurity/vpatch-CVE-2024-3605
description: 'Detects SQL injection attempts in WP Hotel Booking plugin via the room_type parameter in the search-rooms API endpoint.'
rules:
- and:
- zones:
- URI
transform:
- lowercase
- urldecode
match:
type: contains
value: /wp-json/wphb/v1/rooms/search-rooms
- zones:
- ARGS
variables:
- room_type
transform:
- lowercase
- urldecode
match:
type: contains
value: '"'

labels:
type: exploit
service: http
confidence: 3
spoofable: 0
behavior: 'http:exploit'
label: 'WP Hotel Booking - SQLI'
classification:
- cve.CVE-2024-3605
- attack.T1190
- cwe.CWE-89
7 changes: 4 additions & 3 deletions collections/crowdsecurity/appsec-virtual-patching.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -71,6 +71,7 @@ appsec-rules:
- crowdsecurity/vpatch-CVE-2022-41082
- crowdsecurity/vpatch-CVE-2019-18935
- crowdsecurity/vpatch-CVE-2024-8190
- crowdsecurity/vpatch-CVE-2024-3605
- crowdsecurity/vpatch-CVE-2024-28987
- crowdsecurity/vpatch-CVE-2024-38856
- crowdsecurity/vpatch-CVE-2018-20062
Expand Down Expand Up @@ -178,17 +179,17 @@ appsec-rules:
- crowdsecurity/vpatch-CVE-2025-15503
- crowdsecurity/vpatch-CVE-2025-13956
author: crowdsecurity
tags:
- waf
contexts:
- crowdsecurity/appsec_base
description: a generic virtual patching collection, suitable for most web servers.
labels:
label: "WAF - Virtual Patching"
label: WAF - Virtual Patching
name: crowdsecurity/appsec-virtual-patching
parsers:
- crowdsecurity/appsec-logs
scenarios:
- crowdsecurity/appsec-vpatch
- crowdsecurity/appsec-native
- crowdsecurity/appsec-generic-test
tags:
- waf
Loading