Skip to content

Commit 379fc33

Browse files
committed
1 parent 2b25905 commit 379fc33

File tree

3 files changed

+59
-0
lines changed

3 files changed

+59
-0
lines changed
Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,21 @@
1+
id: CVE-2025-40552
2+
info:
3+
name: CVE-2025-40552
4+
author: crowdsec
5+
severity: info
6+
description: CVE-2025-40552 testing
7+
tags: appsec-testing
8+
http:
9+
- raw:
10+
- |
11+
GET /helpdesk/WebObjects/Helpdesk.woa/wo/1.2 HTTP/1.1
12+
Host: {{Hostname}}
13+
Content-Type: application/x-www-form-urlencoded
14+
15+
wopage=JavaSystemProperties
16+
17+
cookie-reuse: true
18+
matchers:
19+
- type: status
20+
status:
21+
- 403
Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,4 @@
1+
appsec-rules:
2+
- ./appsec-rules/crowdsecurity/base-config.yaml
3+
- ./appsec-rules/crowdsecurity/vpatch-CVE-2025-40552.yaml
4+
nuclei_template: CVE-2025-40552.yaml
Lines changed: 34 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,34 @@
1+
name: crowdsecurity/vpatch-CVE-2025-40552
2+
description: 'Detects authentication bypass in SolarWinds Web Help Desk via WebObjects wopage parameter access to sensitive pages'
3+
rules:
4+
- and:
5+
- zones:
6+
- URI
7+
transform:
8+
- lowercase
9+
- urldecode
10+
match:
11+
type: contains
12+
value: '/helpdesk/webobjects/helpdesk.woa/wo/'
13+
- zones:
14+
- BODY_ARGS
15+
variables:
16+
- wopage
17+
transform:
18+
- lowercase
19+
- urldecode
20+
match:
21+
type: regex
22+
value: '.+'
23+
24+
labels:
25+
type: exploit
26+
service: http
27+
confidence: 3
28+
spoofable: 0
29+
behavior: 'http:exploit'
30+
label: 'SolarWinds Web Help Desk - Authentication Bypass'
31+
classification:
32+
- cve.CVE-2025-40552
33+
- attack.T1190
34+
- cwe.CWE-287

0 commit comments

Comments
 (0)