Skip to content

Commit

Permalink
Sync from PR#881
Browse files Browse the repository at this point in the history
New rule: body_cve_2023_5631.yml by @aidenmitchell
#881
Source SHA 9123fec
Triggered by @aidenmitchell
  • Loading branch information
Sublime Rule Testing Bot committed Oct 25, 2023
1 parent 893311e commit f8375e5
Showing 1 changed file with 26 additions and 0 deletions.
26 changes: 26 additions & 0 deletions detection-rules/body_cve_2023_5631.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,26 @@
name: "Body: CVE-2023-5631 - Roundcube Webmail XSS via crafted SVG"
description: "Body HTML contains an exploit for CVE-2023-5631, a vulnerability in Roundcube Webmail that allows stored XSS via an HTML e-mail message with a crafted SVG document."
references:
- "https://www.welivesecurity.com/en/eset-research/winter-vivern-exploits-zero-day-vulnerability-roundcube-webmail-servers/"
- "https://nvd.nist.gov/vuln/detail/CVE-2023-5631"
type: "rule"
severity: "critical"
source: |
type.inbound
and length(attachments) == 0
and strings.ilike(body.html.raw, '*use href="data:image/svg+xml;base64,PHN2Zy*#*')
and not profile.by_sender().solicited
attack_types:
- "Malware/Ransomware"
tactics_and_techniques:
- "Evasion"
- "Exploit"
- "HTML smuggling"
- "Scripting"
detection_methods:
- "Content analysis"
- "HTML analysis"
- "Sender analysis"
id: "8405d61b-4330-534e-b64c-f98ee15d8767"
testing_pr: 881
testing_sha: 9123fec1b8179a7f37f69e16c37acbee7eeb8b41

0 comments on commit f8375e5

Please sign in to comment.