Add vpatch-CVE-2019-11253 rule and test#1642
Add vpatch-CVE-2019-11253 rule and test#1642crowdsec-automation wants to merge 4 commits intomasterfrom
Conversation
|
Hello @crowdsec-automation and thank you for your contribution! I'm a bot that helps maintainers to validate scenarios and ensure they include all the required information. The following items have errors: crowdsecurity/crs-exclusion-plugin-cpanel:
crowdsecurity/crs-exclusion-plugin-dokuwiki:
crowdsecurity/crs-exclusion-plugin-drupal:
crowdsecurity/crs-exclusion-plugin-nextcloud:
crowdsecurity/crs-exclusion-plugin-phpbb:
crowdsecurity/crs-exclusion-plugin-phpmyadmin:
crowdsecurity/crs-exclusion-plugin-wordpress:
crowdsecurity/crs-exclusion-plugin-xenforo:
Mitre ATT&CKInformation about mitre attack can be found here.
Expected format is (where labels:
classification:
- attack.TXXXXCVEsIf your scenario covers a specific CVE (Common Vulnerabilities and Exposures), please add it. Expected format is (where labels:
classification:
- cve.CVE-XXX-XXXBehaviorsPlease identify the behavior(s) your scenario is targeting. You can find the list of available behaviors here. Expected format is (where labels:
behavior: <behavior>See the labels documentation for more information. |
|
Hello @crowdsec-automation and thank you for your contribution! ❗ It seems that the following scenarios are not part of the 'crowdsecurity/appsec-virtual-patching' collection: 🔴 crowdsecurity/vpatch-CVE-2019-11253 🔴 |
This rule detects attempts to exploit the Kubernetes API Server YAML parsing DoS (Billion Laughs) vulnerability (CVE-2019-11253). The detection logic is as follows:
/apis/authorization.k8s.io/v1/selfsubjectaccessreviews, which is a common target for this attack.Content-Typeheader is set toapplication/yaml, indicating a YAML payload is being sent.lol: &lol, which is a canonical indicator of the "Billion Laughs" YAML entity expansion attack pattern.All
value:fields are lowercase, and thetransformincludeslowercasefor case-insensitive matching. The rule usescontainsfor matching, as the attack pattern is a substring within the payload. This approach minimizes false positives and negatives by focusing on the unique structure of the attack. No regex or unnecessary complexity is used, and the rule is tightly scoped to the relevant endpoint, header, and body content.