Add vpatch-CVE-2023-38646 rule and test#1759
Add vpatch-CVE-2023-38646 rule and test#1759crowdsec-automation wants to merge 4 commits intomasterfrom
Conversation
|
Hello @crowdsec-automation and thank you for your contribution! ❗ It seems that the following scenarios are not part of the 'crowdsecurity/appsec-virtual-patching' collection: 🔴 crowdsecurity/vpatch-CVE-2023-38646 🔴 |
|
Hello @crowdsec-automation and thank you for your contribution! I'm a bot that helps maintainers to validate scenarios and ensure they include all the required information. The following items have errors: crowdsecurity/crs-exclusion-plugin-cpanel:
crowdsecurity/crs-exclusion-plugin-dokuwiki:
crowdsecurity/crs-exclusion-plugin-drupal:
crowdsecurity/crs-exclusion-plugin-nextcloud:
crowdsecurity/crs-exclusion-plugin-phpbb:
crowdsecurity/crs-exclusion-plugin-phpmyadmin:
crowdsecurity/crs-exclusion-plugin-wordpress:
crowdsecurity/crs-exclusion-plugin-xenforo:
Mitre ATT&CKInformation about mitre attack can be found here.
Expected format is (where labels:
classification:
- attack.TXXXXCVEsIf your scenario covers a specific CVE (Common Vulnerabilities and Exposures), please add it. Expected format is (where labels:
classification:
- cve.CVE-XXX-XXXBehaviorsPlease identify the behavior(s) your scenario is targeting. You can find the list of available behaviors here. Expected format is (where labels:
behavior: <behavior>See the labels documentation for more information. |
This rule targets the Metabase pre-auth RCE vulnerability (CVE-2023-38646) by detecting POST requests to the
/api/setup/validateendpoint with a malicious H2 databasesubnameparameter. The attack leverages theTRACE_LEVEL_SYSTEM_OUT=3;INIT=RUNSCRIPTsequence to trigger code execution via the H2 JDBC driver./api/setup/validateusing a case-insensitive comparison.trace_level_system_out=3;init=runscript, which is a reliable indicator of the exploit attempt, regardless of JSON structure or whitespace.RAW_BODYensures detection even if the JSON structure varies or is nested.labelssection includes the correct CVE, ATT&CK, and CWE references, and the label follows the required format.All
value:fields are lowercase,lowercasetransform is applied, andcontainsis used for pattern matching to minimize false positives and negatives. No regex or capital letters are present in match values.