Add vpatch-CVE-2020-5847 rule and test#1757
Add vpatch-CVE-2020-5847 rule and test#1757crowdsec-automation wants to merge 4 commits intomasterfrom
Conversation
|
Hello @crowdsec-automation and thank you for your contribution! ❗ It seems that the following scenarios are not part of the 'crowdsecurity/appsec-virtual-patching' collection: 🔴 crowdsecurity/vpatch-CVE-2020-5847 🔴 |
|
Hello @crowdsec-automation and thank you for your contribution! I'm a bot that helps maintainers to validate scenarios and ensure they include all the required information. The following items have errors: crowdsecurity/crs-exclusion-plugin-cpanel:
crowdsecurity/crs-exclusion-plugin-dokuwiki:
crowdsecurity/crs-exclusion-plugin-drupal:
crowdsecurity/crs-exclusion-plugin-nextcloud:
crowdsecurity/crs-exclusion-plugin-phpbb:
crowdsecurity/crs-exclusion-plugin-phpmyadmin:
crowdsecurity/crs-exclusion-plugin-wordpress:
crowdsecurity/crs-exclusion-plugin-xenforo:
Mitre ATT&CKInformation about mitre attack can be found here.
Expected format is (where labels:
classification:
- attack.TXXXXCVEsIf your scenario covers a specific CVE (Common Vulnerabilities and Exposures), please add it. Expected format is (where labels:
classification:
- cve.CVE-XXX-XXXBehaviorsPlease identify the behavior(s) your scenario is targeting. You can find the list of available behaviors here. Expected format is (where labels:
behavior: <behavior>See the labels documentation for more information. |
This rule targets the UnRaid <=6.80 remote code execution vulnerability (CVE-2020-5847). The attack is performed by sending a GET request to the
/webGui/images/green-on.pngendpoint with a craftedsite[x][text]parameter containing PHP code./webgui/images/green-on.png(case-insensitive, URL-decoded).site[x][text]argument in the query string, looking for the presence of<?php(case-insensitive, URL-decoded), which is indicative of PHP code injection.lowercaseandurldecodein thetransformensures normalization and case-insensitive matching.The test config and nuclei template are adapted to ensure the rule is triggered by the same payload as in the original nuclei template, but only checks for a 403 status code as required. All values are lowercase, and
containsis used for matching as per guidelines.