Skip to content

Commit

Permalink
Sync from PR#604
Browse files Browse the repository at this point in the history
Adding PDF scanning to LinkedIn open redirect rule by @aidenmitchell
#604
Source SHA 5e96073
Triggered by @jkamdjou
  • Loading branch information
Sublime Rule Testing Bot committed Aug 4, 2023
1 parent 4042072 commit 3978fba
Showing 1 changed file with 15 additions and 0 deletions.
15 changes: 15 additions & 0 deletions detection-rules/open_redirect_linkedin.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,15 @@
name: "Open redirect: Linkedin"
description: "Detects emails containing links using Linkedin '/slink?code=xxxxx' open redirect where the email has not come from Linkedin.com"
references:
- "https://krebsonsecurity.com/2022/02/how-phishers-are-slinking-their-links-into-linkedin/"
type: "rule"
authors:
- twitter: "xNymia"
severity: "medium"
source: "type.inbound\nand (\n (\n sender.email.domain.root_domain != \"linkedin.com\"\n and any(body.links, .href_url.domain.root_domain == 'linkedin.com' and .href_url.path == '/slink')\n and any(body.links, strings.ilike(.href_url.query_params, 'code=*'))\n )\n or any(attachments, .file_type == \"pdf\"\n and any(file.explode(.), \n any(.scan.url.urls, .domain.root_domain == 'linkedin.com' and .path == '/slink')\n and any(.scan.url.urls, strings.ilike(.query_params, 'code=*'))\n )\n )\n)\n"
tags:
- "Open redirect"
- "Suspicious link"
id: "5ad2ffae-fca7-58ff-90bd-8efbd98c0a72"
testing_pr: 604
testing_sha: 5e9607399c93fbce8b756095bd9c450318638ef4

0 comments on commit 3978fba

Please sign in to comment.