Skip to content

Add vpatch-CVE-2023-24000 rule and test#1739

Merged
buixor merged 9 commits intomasterfrom
1774875002-vpatch-CVE-2023-24000
Apr 15, 2026
Merged

Add vpatch-CVE-2023-24000 rule and test#1739
buixor merged 9 commits intomasterfrom
1774875002-vpatch-CVE-2023-24000

Conversation

@crowdsec-automation
Copy link
Copy Markdown
Contributor

@crowdsec-automation crowdsec-automation commented Mar 30, 2026

Description

This PR adds a new vpatch rule for CVE-2023-24000 (WordPress GamiPress SQL injection via trigger_type[] parameter) along with its corresponding test configuration. The rule is included in the crowdsecurity/appsec-wordpress collection.

The rule:

  • Matches requests to the vulnerable endpoint by checking if the URI contains /wp-json/wp/v2/gamipress-logs (with lowercase and urldecode transforms for normalization).
  • Inspects the trigger_type[] argument using a negative regex [^a-z0-9_-], which matches any value containing characters outside of lowercase alphanumeric, underscore, and hyphen — catching SQL injection payloads while allowing normal trigger type values.
  • The transforms ensure case-insensitive and encoded payloads are detected.
  • The labels section includes the correct CVE, ATT&CK, and CWE references.
  • The test config is adapted to expect a 403 response, as required for CrowdSec WAF rule validation.
  • The rule is added to the crowdsecurity/appsec-wordpress collection.

Checklist

  • I have read the contributing guide
  • I have tested my changes locally
  • For new parsers or scenarios, tests have been added
  • I have run the hub linter and no issues were reported (see contributing guide)
  • Automated tests are passing
  • AI was used to generate any/all content of this PR

@github-actions
Copy link
Copy Markdown

Hello @crowdsec-automation and thank you for your contribution!

❗ It seems that the following scenarios are not part of the 'crowdsecurity/appsec-virtual-patching' collection:

🔴 crowdsecurity/vpatch-CVE-2023-24000 🔴

@github-actions
Copy link
Copy Markdown

Hello @crowdsec-automation and thank you for your contribution!

I'm a bot that helps maintainers to validate scenarios and ensure they include all the required information.
I've found some errors in your scenarios, please fix them and re-submit your PR, or ask for help if you need it.

The following items have errors:

crowdsecurity/crs-exclusion-plugin-cpanel:

  • labels not found

crowdsecurity/crs-exclusion-plugin-dokuwiki:

  • labels not found

crowdsecurity/crs-exclusion-plugin-drupal:

  • labels not found

crowdsecurity/crs-exclusion-plugin-nextcloud:

  • labels not found

crowdsecurity/crs-exclusion-plugin-phpbb:

  • labels not found

crowdsecurity/crs-exclusion-plugin-phpmyadmin:

  • labels not found

crowdsecurity/crs-exclusion-plugin-wordpress:

  • labels not found

crowdsecurity/crs-exclusion-plugin-xenforo:

  • labels not found

Mitre ATT&CK

Information about mitre attack can be found here.
As an example, some common mitre attack techniques:

  • T1110 for bruteforce attacks
  • T1595 and T1190 for exploitation of public vulnerabilities
  • T1595 for generic scanning of exposed applications

Expected format is (where XXXX is the technique ID):

labels:
  classification:
    - attack.TXXXX

CVEs

If your scenario covers a specific CVE (Common Vulnerabilities and Exposures), please add it.

Expected format is (where CVE-XXX-XXX is the CVE ID):

labels:
  classification:
    - cve.CVE-XXX-XXX

Behaviors

Please identify the behavior(s) your scenario is targeting. You can find the list of available behaviors here.

Expected format is (where <behavior> is the behavior you want to target):

labels:
  behavior: <behavior>

See the labels documentation for more information.

Comment thread appsec-rules/crowdsecurity/vpatch-CVE-2023-24000.yaml Outdated
Copilot AI requested a review from buixor March 30, 2026 13:03
@buixor
Copy link
Copy Markdown
Contributor

buixor commented Apr 1, 2026

@copilot move the rule to the wordpress vpatch collection

Copy link
Copy Markdown
Contributor

Copilot AI commented Apr 1, 2026

@copilot move the rule to the wordpress vpatch collection

Added crowdsecurity/vpatch-CVE-2023-24000 to the crowdsecurity/appsec-wordpress collection in commit a180b76.

@github-actions
Copy link
Copy Markdown

Hello @buixor and thank you for your contribution!

❗ It seems that the following scenarios are not part of the 'crowdsecurity/appsec-virtual-patching' collection:

🔴 crowdsecurity/vpatch-CVE-2023-6623 🔴
🔴 crowdsecurity/vpatch-CVE-2023-6567 🔴
🔴 crowdsecurity/vpatch-CVE-2023-4634 🔴
🔴 crowdsecurity/vpatch-CVE-2023-3197 🔴
🔴 crowdsecurity/vpatch-CVE-2023-6360 🔴
🔴 crowdsecurity/vpatch-CVE-2024-1071 🔴
🔴 crowdsecurity/vpatch-CVE-2023-0600 🔴
🔴 crowdsecurity/vpatch-CVE-2023-23488 🔴
🔴 crowdsecurity/vpatch-CVE-2023-23489 🔴
🔴 crowdsecurity/vpatch-CVE-2022-3254 🔴
🔴 crowdsecurity/vpatch-CVE-2023-2009 🔴
🔴 crowdsecurity/vpatch-CVE-2023-0900 🔴
🔴 crowdsecurity/vpatch-CVE-2025-40552 🔴
🔴 crowdsecurity/vpatch-CVE-2024-1061 🔴

@github-actions
Copy link
Copy Markdown

Hello @buixor and thank you for your contribution!

I'm a bot that helps maintainers to validate scenarios and ensure they include all the required information.
I've found some errors in your scenarios, please fix them and re-submit your PR, or ask for help if you need it.

The following items have errors:

crowdsecurity/crs-exclusion-plugin-cpanel:

  • labels not found

crowdsecurity/crs-exclusion-plugin-dokuwiki:

  • labels not found

crowdsecurity/crs-exclusion-plugin-drupal:

  • labels not found

crowdsecurity/crs-exclusion-plugin-nextcloud:

  • labels not found

crowdsecurity/crs-exclusion-plugin-phpbb:

  • labels not found

crowdsecurity/crs-exclusion-plugin-phpmyadmin:

  • labels not found

crowdsecurity/crs-exclusion-plugin-wordpress:

  • labels not found

crowdsecurity/crs-exclusion-plugin-xenforo:

  • labels not found

Mitre ATT&CK

Information about mitre attack can be found here.
As an example, some common mitre attack techniques:

  • T1110 for bruteforce attacks
  • T1595 and T1190 for exploitation of public vulnerabilities
  • T1595 for generic scanning of exposed applications

Expected format is (where XXXX is the technique ID):

labels:
  classification:
    - attack.TXXXX

CVEs

If your scenario covers a specific CVE (Common Vulnerabilities and Exposures), please add it.

Expected format is (where CVE-XXX-XXX is the CVE ID):

labels:
  classification:
    - cve.CVE-XXX-XXX

Behaviors

Please identify the behavior(s) your scenario is targeting. You can find the list of available behaviors here.

Expected format is (where <behavior> is the behavior you want to target):

labels:
  behavior: <behavior>

See the labels documentation for more information.

@github-actions
Copy link
Copy Markdown

Hello @buixor and thank you for your contribution!

I'm a bot that helps maintainers to validate scenarios and ensure they include all the required information.
I've found some errors in your scenarios, please fix them and re-submit your PR, or ask for help if you need it.

The following items have errors:

crowdsecurity/crs-exclusion-plugin-cpanel:

  • labels not found

crowdsecurity/crs-exclusion-plugin-dokuwiki:

  • labels not found

crowdsecurity/crs-exclusion-plugin-drupal:

  • labels not found

crowdsecurity/crs-exclusion-plugin-nextcloud:

  • labels not found

crowdsecurity/crs-exclusion-plugin-phpbb:

  • labels not found

crowdsecurity/crs-exclusion-plugin-phpmyadmin:

  • labels not found

crowdsecurity/crs-exclusion-plugin-wordpress:

  • labels not found

crowdsecurity/crs-exclusion-plugin-xenforo:

  • labels not found

Mitre ATT&CK

Information about mitre attack can be found here.
As an example, some common mitre attack techniques:

  • T1110 for bruteforce attacks
  • T1595 and T1190 for exploitation of public vulnerabilities
  • T1595 for generic scanning of exposed applications

Expected format is (where XXXX is the technique ID):

labels:
  classification:
    - attack.TXXXX

CVEs

If your scenario covers a specific CVE (Common Vulnerabilities and Exposures), please add it.

Expected format is (where CVE-XXX-XXX is the CVE ID):

labels:
  classification:
    - cve.CVE-XXX-XXX

Behaviors

Please identify the behavior(s) your scenario is targeting. You can find the list of available behaviors here.

Expected format is (where <behavior> is the behavior you want to target):

labels:
  behavior: <behavior>

See the labels documentation for more information.

@buixor buixor merged commit ed6b89c into master Apr 15, 2026
10 checks passed
@buixor buixor deleted the 1774875002-vpatch-CVE-2023-24000 branch April 15, 2026 15:30
blotus pushed a commit that referenced this pull request Apr 16, 2026
* Add vpatch-CVE-2023-24000 rule

* Add vpatch-CVE-2023-24000 test config

* Add CVE-2023-24000.yaml test

* Add vpatch-CVE-2023-24000 rule to vpatch collection

* Change trigger_type[] match to negative regex [^a-z0-9_-]

Agent-Logs-Url: https://github.com/crowdsecurity/hub/sessions/c3bff159-da7c-41b1-9a0f-2d2ba68d3d2e

Co-authored-by: buixor <990714+buixor@users.noreply.github.com>

* Add vpatch-CVE-2023-24000 to appsec-wordpress collection

Agent-Logs-Url: https://github.com/crowdsecurity/hub/sessions/4876d047-7769-4521-9ff3-6819bfb0e17a

Co-authored-by: buixor <990714+buixor@users.noreply.github.com>

---------

Co-authored-by: copilot-swe-agent[bot] <198982749+Copilot@users.noreply.github.com>
Co-authored-by: buixor <990714+buixor@users.noreply.github.com>
Co-authored-by: Thibault "bui" Koechlin <thibault@crowdsec.net>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants