File tree Expand file tree Collapse file tree 7 files changed +109
-0
lines changed
vpatch-CVE-2026-20127-dca-disclosure
appsec-rules/crowdsecurity
collections/crowdsecurity Expand file tree Collapse file tree 7 files changed +109
-0
lines changed Original file line number Diff line number Diff line change 1+ id : CVE-2026-20127-dca-disclosure
2+ info :
3+ name : CVE-2026-20127-dca-disclosure
4+ author : crowdsec
5+ severity : critical
6+ description : Cisco SD-WAN vManage unauthenticated DCA credential disclosure testing
7+ tags : appsec-testing
8+ http :
9+ - method : GET
10+ path :
11+ - " {{BaseURL}}/reports/data/opt/data/containers/config/data-collection-agent/.dca"
12+ cookie-reuse : true
13+ matchers :
14+ - type : status
15+ status :
16+ - 403
Original file line number Diff line number Diff line change 1+ appsec-rules :
2+ - ./appsec-rules/crowdsecurity/base-config.yaml
3+ - ./appsec-rules/crowdsecurity/vpatch-CVE-2026-20127-dca-disclosure.yaml
4+ nuclei_template : CVE-2026-20127-dca-disclosure.yaml
Original file line number Diff line number Diff line change 1+ id : CVE-2026-20127
2+ info :
3+ name : CVE-2026-20127
4+ author : crowdsec
5+ severity : critical
6+ description : Cisco SD-WAN vManage path traversal WAR upload RCE testing
7+ tags : appsec-testing
8+ http :
9+ - raw :
10+ - |
11+ POST /dataservice/smartLicensing/uploadAck HTTP/1.1
12+ Host: {{Hostname}}
13+ Content-Type: multipart/form-data; boundary=----WebKitFormBoundary7MA4YWxkTrZu0gW
14+
15+ ------WebKitFormBoundary7MA4YWxkTrZu0gW
16+ Content-Disposition: form-data; name="file"; filename="../../../../../../../../../../../var/lib/wildfly/standalone/deployments/cmd.gz.war"
17+ Content-Type: application/java-archive
18+
19+ PK
20+ ------WebKitFormBoundary7MA4YWxkTrZu0gW--
21+ cookie-reuse : true
22+ matchers :
23+ - type : status
24+ status :
25+ - 403
Original file line number Diff line number Diff line change 1+ appsec-rules :
2+ - ./appsec-rules/crowdsecurity/base-config.yaml
3+ - ./appsec-rules/crowdsecurity/vpatch-CVE-2026-20127.yaml
4+ nuclei_template : CVE-2026-20127.yaml
Original file line number Diff line number Diff line change 1+ name : crowdsecurity/vpatch-CVE-2026-20127-dca-disclosure
2+ description : ' Detects unauthenticated access to the DCA credential file in Cisco Catalyst SD-WAN Manager (CVE-2026-20127)'
3+ rules :
4+ - and :
5+ - zones :
6+ - URI
7+ transform :
8+ - lowercase
9+ - urldecode
10+ - normalizepath
11+ match :
12+ type : contains
13+ value : ' /reports/data/opt/data/containers/config/data-collection-agent/.dca'
14+
15+ labels :
16+ type : exploit
17+ service : http
18+ confidence : 3
19+ spoofable : 0
20+ behavior : ' http:exploit'
21+ label : ' Cisco SD-WAN vManage - Credentials Disclosure'
22+ classification :
23+ - cve.CVE-2026-20127
24+ - attack.T1190
25+ - cwe.CWE-552
Original file line number Diff line number Diff line change 1+ name : crowdsecurity/vpatch-CVE-2026-20127
2+ description : ' Detects path traversal file upload exploitation in Cisco Catalyst SD-WAN Manager (CVE-2026-20127)'
3+ rules :
4+ - and :
5+ - zones :
6+ - URI
7+ transform :
8+ - lowercase
9+ - urldecode
10+ match :
11+ type : contains
12+ value : ' /dataservice/smartlicensing/uploadack'
13+ - zones :
14+ - FILENAMES
15+ transform :
16+ - lowercase
17+ - urldecode
18+ match :
19+ type : contains
20+ value : ' ..'
21+
22+ labels :
23+ type : exploit
24+ service : http
25+ confidence : 3
26+ spoofable : 0
27+ behavior : ' http:exploit'
28+ label : ' Cisco SD-WAN vManage - RCE'
29+ classification :
30+ - cve.CVE-2026-20127
31+ - attack.T1190
32+ - cwe.CWE-22
33+ - cwe.CWE-434
Original file line number Diff line number Diff line change @@ -168,6 +168,8 @@ appsec-rules:
168168- crowdsecurity/vpatch-CVE-2025-66039
169169- crowdsecurity/vpatch-CVE-2025-61678
170170- crowdsecurity/vpatch-CVE-2025-4689
171+ - crowdsecurity/vpatch-CVE-2026-20127
172+ - crowdsecurity/vpatch-CVE-2026-20127-dca-disclosure
171173author : crowdsecurity
172174contexts :
173175- crowdsecurity/appsec_base
You can’t perform that action at this time.
0 commit comments