Skip to content

Commit 3e5c600

Browse files
Add vpatch-CVE-2025-47188 rule and test (#1619)
* Add vpatch-CVE-2025-47188 rule * Add vpatch-CVE-2025-47188 test config * Add CVE-2025-47188.yaml test * Add vpatch-CVE-2025-47188 rule to vpatch collection * fix nuclei template * ci --------- Co-authored-by: Thibault Koechlin <orixxx@gmail.com> Co-authored-by: Thibault "bui" Koechlin <thibault@crowdsec.net>
1 parent da39de5 commit 3e5c600

File tree

4 files changed

+72
-0
lines changed

4 files changed

+72
-0
lines changed
Lines changed: 26 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,26 @@
1+
## autogenerated on 2025-12-29 14:06:31
2+
id: CVE-2025-47188
3+
info:
4+
name: CVE-2025-47188
5+
author: crowdsec
6+
severity: info
7+
description: CVE-2025-47188 testing
8+
tags: appsec-testing
9+
http:
10+
- raw:
11+
- |
12+
POST /cgi-bin/webconfig?page=upload_ringtone&action=submit&section=1&conn=0 HTTP/1.1
13+
Host: {{Hostname}}
14+
Content-Type: multipart/form-data; boundary=----0ba2fc3a8c91370bd74c5f7ab65fda3f
15+
16+
------0ba2fc3a8c91370bd74c5f7ab65fda3f
17+
Content-Disposition: form-data; name="upload_ringtone/newfile"; filename="fake$(sh ${HOME}userdata${HOME}ringtone${HOME}877123.txt).wav"
18+
19+
This is an invalid WAV file
20+
------0ba2fc3a8c91370bd74c5f7ab65fda3f--
21+
22+
cookie-reuse: true
23+
matchers:
24+
- type: status
25+
status:
26+
- 403
Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
## autogenerated on 2025-12-29 14:06:31
2+
appsec-rules:
3+
- ./appsec-rules/crowdsecurity/base-config.yaml
4+
- ./appsec-rules/crowdsecurity/vpatch-CVE-2025-47188.yaml
5+
nuclei_template: CVE-2025-47188.yaml
Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,40 @@
1+
## autogenerated on 2025-12-29 14:06:31
2+
name: crowdsecurity/vpatch-CVE-2025-47188
3+
description: 'Detects OS command injection in Mitel 6000 series SIP Phones via ringtone upload functionality.'
4+
rules:
5+
- and:
6+
- zones:
7+
- URI
8+
transform:
9+
- lowercase
10+
match:
11+
type: contains
12+
value: /cgi-bin/webconfig
13+
- zones:
14+
- ARGS
15+
variables:
16+
- page
17+
transform:
18+
- lowercase
19+
match:
20+
type: equals
21+
value: upload_ringtone
22+
- zones:
23+
- FILENAMES
24+
transform:
25+
- lowercase
26+
match:
27+
type: contains
28+
value: '$('
29+
30+
labels:
31+
type: exploit
32+
service: http
33+
confidence: 3
34+
spoofable: 0
35+
behavior: 'http:exploit'
36+
label: 'Mitel 6000 - RCE'
37+
classification:
38+
- cve.CVE-2025-47188
39+
- attack.T1190
40+
- cwe.CWE-78

collections/crowdsecurity/appsec-virtual-patching.yaml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -146,6 +146,7 @@ appsec-rules:
146146
- crowdsecurity/vpatch-CVE-2025-9316
147147
- crowdsecurity/vpatch-CVE-2025-11700
148148
- crowdsecurity/vpatch-CVE-2025-13315
149+
- crowdsecurity/vpatch-CVE-2025-47188
149150
author: crowdsecurity
150151
contexts:
151152
- crowdsecurity/appsec_base

0 commit comments

Comments
 (0)