Skip to content

Commit 040b6e7

Browse files
Add vpatch-CVE-2024-5057 rule and test (#1641)
* Add vpatch-CVE-2024-5057 rule * Add vpatch-CVE-2024-5057 test config * Add CVE-2024-5057.yaml test * Add vpatch-CVE-2024-5057 rule to vpatch collection * Update vpatch-CVE-2024-5057.yaml --------- Co-authored-by: Thibault "bui" Koechlin <thibault@crowdsec.net>
1 parent a61df1e commit 040b6e7

File tree

4 files changed

+69
-0
lines changed

4 files changed

+69
-0
lines changed
Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
## autogenerated on 2026-01-14 14:58:55
2+
id: CVE-2024-5057
3+
info:
4+
name: CVE-2024-5057
5+
author: crowdsec
6+
severity: info
7+
description: CVE-2024-5057 testing
8+
tags: appsec-testing
9+
http:
10+
- raw:
11+
- |
12+
GET /wp-admin/admin-ajax.php?action=edd_download_search&s=a')/**/AND/**/SLEEP(6)%23 HTTP/1.1
13+
Host: {{Hostname}}
14+
cookie-reuse: true
15+
matchers:
16+
- type: status
17+
status:
18+
- 403
Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
## autogenerated on 2026-01-14 14:58:55
2+
appsec-rules:
3+
- ./appsec-rules/crowdsecurity/base-config.yaml
4+
- ./appsec-rules/crowdsecurity/vpatch-CVE-2024-5057.yaml
5+
nuclei_template: CVE-2024-5057.yaml
Lines changed: 45 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,45 @@
1+
## autogenerated on 2026-01-14 14:58:55
2+
name: crowdsecurity/vpatch-CVE-2024-5057
3+
description: 'Detects SQL injection vulnerability in WordPress Easy Digital Downloads <= 3.2.12 via the edd_download_search action.'
4+
rules:
5+
- and:
6+
- zones:
7+
- URI
8+
transform:
9+
- lowercase
10+
- urldecode
11+
match:
12+
type: contains
13+
value: /wp-admin/admin-ajax.php
14+
- zones:
15+
- ARGS
16+
variables:
17+
- action
18+
transform:
19+
- lowercase
20+
- urldecode
21+
match:
22+
type: equals
23+
value: edd_download_search
24+
- zones:
25+
- ARGS
26+
variables:
27+
- s
28+
transform:
29+
- lowercase
30+
- urldecode
31+
match:
32+
type: contains
33+
value: "'"
34+
35+
labels:
36+
type: exploit
37+
service: http
38+
confidence: 3
39+
spoofable: 0
40+
behavior: 'http:exploit'
41+
label: 'Easy Digital Downloads - SQLI'
42+
classification:
43+
- cve.CVE-2024-5057
44+
- attack.T1190
45+
- cwe.CWE-89

collections/crowdsecurity/appsec-virtual-patching.yaml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -38,6 +38,7 @@ appsec-rules:
3838
- crowdsecurity/vpatch-CVE-2023-46805
3939
- crowdsecurity/vpatch-CVE-2024-23897
4040
- crowdsecurity/vpatch-CVE-2023-22527
41+
- crowdsecurity/vpatch-CVE-2024-5057
4142
- crowdsecurity/vpatch-CVE-2023-35078
4243
- crowdsecurity/vpatch-CVE-2023-35082
4344
- crowdsecurity/vpatch-CVE-2022-22954

0 commit comments

Comments
 (0)