-
Notifications
You must be signed in to change notification settings - Fork 188
Add vpatch-CVE-2018-1207 rule and test #1492
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Conversation
Hello @crowdsec-automation and thank you for your contribution! ❗ It seems that the following scenarios are not part of the 'crowdsecurity/appsec-virtual-patching' collection: 🔴 crowdsecurity/vpatch-CVE-2018-1207 🔴 |
Hello @crowdsec-automation, Scenarios/AppSec Rule are compliant with the taxonomy, thank you for your contribution! |
Hello @buixor, ✅ The new VPATCH Rule is compliant, thank you for your contribution! |
Hello @buixor, Scenarios/AppSec Rule are compliant with the taxonomy, thank you for your contribution! |
Hello @buixor and thank you for your contribution! ❗ It seems that the following scenarios are not part of the 'crowdsecurity/appsec-virtual-patching' collection: 🔴 crowdsecurity/vpatch-CVE-2023-0600 🔴 |
Hello @buixor, Scenarios/AppSec Rule are compliant with the taxonomy, thank you for your contribution! |
Hello @buixor and thank you for your contribution! ❗ It seems that the following scenarios are not part of the 'crowdsecurity/appsec-virtual-patching' collection: 🔴 crowdsecurity/vpatch-CVE-2023-0600 🔴 |
Hello @buixor, Scenarios/AppSec Rule are compliant with the taxonomy, thank you for your contribution! |
This rule detects exploitation attempts for CVE-2018-1207, a remote code injection vulnerability in Dell iDRAC7/8 devices. The attack is performed by passing the
LD_DEBUG
environment variable as a CGI parameter to/cgi-bin/login
. The rule matches requests where the URI contains/cgi-bin/login
(case-insensitive) and where any argument name containsld_debug
(case-insensitive). This approach is robust and minimizes false positives by focusing on the specific attack vector. The test configuration ensures the rule is loaded, and the nuclei test checks for a 403 response, indicating the WAF blocked the exploit attempt.Validation checklist:
value:
fields are lowercase.transform
includeslowercase
where applicable.match.value
contains capital letters.contains
instead ofregex
where applicable.