File tree Expand file tree Collapse file tree 3 files changed +59
-0
lines changed
.appsec-tests/vpatch-CVE-2025-40552
appsec-rules/crowdsecurity Expand file tree Collapse file tree 3 files changed +59
-0
lines changed Original file line number Diff line number Diff line change 1+ id : CVE-2025-40552
2+ info :
3+ name : CVE-2025-40552
4+ author : crowdsec
5+ severity : info
6+ description : CVE-2025-40552 testing
7+ tags : appsec-testing
8+ http :
9+ - raw :
10+ - |
11+ GET /helpdesk/WebObjects/Helpdesk.woa/wo/1.2 HTTP/1.1
12+ Host: {{Hostname}}
13+ Content-Type: application/x-www-form-urlencoded
14+
15+ wopage=JavaSystemProperties
16+
17+ cookie-reuse : true
18+ matchers :
19+ - type : status
20+ status :
21+ - 403
Original file line number Diff line number Diff line change 1+ appsec-rules :
2+ - ./appsec-rules/crowdsecurity/base-config.yaml
3+ - ./appsec-rules/crowdsecurity/vpatch-CVE-2025-40552.yaml
4+ nuclei_template : CVE-2025-40552.yaml
Original file line number Diff line number Diff line change 1+ name : crowdsecurity/vpatch-CVE-2025-40552
2+ description : ' Detects authentication bypass in SolarWinds Web Help Desk via WebObjects wopage parameter access to sensitive pages'
3+ rules :
4+ - and :
5+ - zones :
6+ - URI
7+ transform :
8+ - lowercase
9+ - urldecode
10+ match :
11+ type : contains
12+ value : ' /helpdesk/webobjects/helpdesk.woa/wo/'
13+ - zones :
14+ - BODY_ARGS
15+ variables :
16+ - wopage
17+ transform :
18+ - lowercase
19+ - urldecode
20+ match :
21+ type : regex
22+ value : ' .+'
23+
24+ labels :
25+ type : exploit
26+ service : http
27+ confidence : 3
28+ spoofable : 0
29+ behavior : ' http:exploit'
30+ label : ' SolarWinds Web Help Desk - Authentication Bypass'
31+ classification :
32+ - cve.CVE-2025-40552
33+ - attack.T1190
34+ - cwe.CWE-287
You can’t perform that action at this time.
0 commit comments