Skip to content

Commit 7adc1fd

Browse files
authored
Merge branch 'master' into patch-3
2 parents 56e6cfa + b528594 commit 7adc1fd

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

41 files changed

+3636
-271
lines changed

.appsec-tests/generic-wordpress-uploads-listing/generic-wordpress-uploads-listing.yaml

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,12 @@ http:
2222
- |
2323
GET /wp-content/uploads/2024/10/fp-check.jpg HTTP/1.1
2424
Host: {{Hostname}}
25+
- |
26+
OPTIONS /wp-content/uploads/ HTTP/1.1
27+
Host: {{Hostname}}
28+
- |
29+
OPTIONS /wp-content/uploads/2024/10/ HTTP/1.1
30+
Host: {{Hostname}}
2531
matchers:
2632
- type: dsl
2733
condition: and
@@ -31,4 +37,6 @@ http:
3137
- "status_code_3 == 403"
3238
- "status_code_4 == 403"
3339
- "status_code_5 == 404"
40+
- "status_code_6 == 405"
41+
- "status_code_7 == 405"
3442

Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,21 @@
1+
## autogenerated on 2026-02-18 14:28:33
2+
id: CVE-2024-8911
3+
info:
4+
name: CVE-2024-8911
5+
author: crowdsec
6+
severity: info
7+
description: CVE-2024-8911 testing
8+
tags: appsec-testing
9+
http:
10+
- raw:
11+
- |
12+
POST /wp-admin/admin-ajax.php HTTP/1.1
13+
Host: {{Hostname}}
14+
Content-Type: application/x-www-form-urlencoded
15+
16+
action=latepoint_route_call&route_name=customer_cabinet__change_password&params=password_reset_token%5bOR%5d%5b%20IS%20NULL%20or%20not%20(select%20sleep(8)))%20limit%201%3b--%20-%5d%3d{{randstr}}%26password%3d{{randstr}}&return_format=json
17+
cookie-reuse: true
18+
matchers:
19+
- type: status
20+
status:
21+
- 403
Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
## autogenerated on 2026-02-18 14:28:33
2+
appsec-rules:
3+
- ./appsec-rules/crowdsecurity/base-config.yaml
4+
- ./appsec-rules/crowdsecurity/vpatch-CVE-2024-8911.yaml
5+
nuclei_template: CVE-2024-8911.yaml
Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,21 @@
1+
## autogenerated on 2026-02-18 14:29:25
2+
id: CVE-2024-8943
3+
info:
4+
name: CVE-2024-8943
5+
author: crowdsec
6+
severity: info
7+
description: CVE-2024-8943 testing
8+
tags: appsec-testing
9+
http:
10+
- raw:
11+
- |
12+
POST /wp-admin/admin-ajax.php HTTP/1.1
13+
Host: {{Hostname}}
14+
Content-Type: application/x-www-form-urlencoded
15+
16+
action=latepoint_route_call&route_name=steps__load_step&params=current_step_code%3dcustomer%26step_direction%3dnext%26customer%5bid%5d%3d1%26customer%5bemail%5d%3dtest%40example.com%26customer%5bpassword%5d%3dpassword123%26customer%5bpassword_confirmation%5d%3dpassword123%26customer%5bfirst_name%5d%3dtest%26customer%5blast_name%5d%3duser&layout=none&return_format=json
17+
cookie-reuse: true
18+
matchers:
19+
- type: status
20+
status:
21+
- 403
Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
## autogenerated on 2026-02-18 14:29:25
2+
appsec-rules:
3+
- ./appsec-rules/crowdsecurity/base-config.yaml
4+
- ./appsec-rules/crowdsecurity/vpatch-CVE-2024-8943.yaml
5+
nuclei_template: CVE-2024-8943.yaml
Lines changed: 26 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,26 @@
1+
## autogenerated on 2025-12-29 15:17:08
2+
id: CVE-2025-37164
3+
info:
4+
name: CVE-2025-37164
5+
author: crowdsec
6+
severity: info
7+
description: CVE-2025-37164 testing
8+
tags: appsec-testing
9+
http:
10+
- raw:
11+
- |
12+
PUT /rest/id-pools/executeCommand HTTP/1.1
13+
Host: {{Hostname}}
14+
Content-Type: application/json
15+
X-API-Version: 3800
16+
Accept-Encoding: gzip
17+
18+
{
19+
"cmd":"nc foobar.com",
20+
"result":0
21+
}
22+
cookie-reuse: true
23+
matchers:
24+
- type: status
25+
status:
26+
- 403
Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
## autogenerated on 2025-12-29 15:17:08
2+
appsec-rules:
3+
- ./appsec-rules/crowdsecurity/base-config.yaml
4+
- ./appsec-rules/crowdsecurity/vpatch-CVE-2025-37164.yaml
5+
nuclei_template: CVE-2025-37164.yaml
Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
## autogenerated on 2026-02-16 09:44:57
2+
id: CVE-2025-56520
3+
info:
4+
name: CVE-2025-56520
5+
author: crowdsec
6+
severity: info
7+
description: CVE-2025-56520 testing
8+
tags: appsec-testing
9+
http:
10+
- raw:
11+
- |
12+
GET /console/api/remote-files/http%3A%2F%2Fexample.com%2Ftest HTTP/1.1
13+
Host: {{Hostname}}
14+
cookie-reuse: true
15+
matchers:
16+
- type: status
17+
status:
18+
- 403
Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
## autogenerated on 2026-02-16 09:44:57
2+
appsec-rules:
3+
- ./appsec-rules/crowdsecurity/base-config.yaml
4+
- ./appsec-rules/crowdsecurity/vpatch-CVE-2025-56520.yaml
5+
nuclei_template: CVE-2025-56520.yaml
Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,21 @@
1+
## autogenerated on 2026-02-18 14:26:13
2+
id: CVE-2026-23744
3+
info:
4+
name: CVE-2026-23744
5+
author: crowdsec
6+
severity: info
7+
description: CVE-2026-23744 testing
8+
tags: appsec-testing
9+
http:
10+
- raw:
11+
- |
12+
POST /api/mcp/connect HTTP/1.1
13+
Host: {{Hostname}}
14+
Content-Type: application/json
15+
16+
{"serverConfig":{"timeout":10000,"command":"curl","args":["https://foobar.com"],"env":{}},"serverId":"mymcp"}
17+
cookie-reuse: true
18+
matchers:
19+
- type: status
20+
status:
21+
- 403

0 commit comments

Comments
 (0)