Skip to content

Commit 9d1b389

Browse files
authored
add vpatch-WT-2026-0001 (#1656)
1 parent fe2f349 commit 9d1b389

File tree

3 files changed

+65
-0
lines changed

3 files changed

+65
-0
lines changed
Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,4 @@
1+
appsec-rules:
2+
- ./appsec-rules/crowdsecurity/base-config.yaml
3+
- ./appsec-rules/crowdsecurity/vpatch-WT-2026-0001.yaml
4+
nuclei_template: vpatch-WT-2026-0001.yaml
Lines changed: 28 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,28 @@
1+
id: WT-2026-0001
2+
3+
info:
4+
name: SmarterMail Authentication Bypass - Force Reset Password
5+
author: crowdsec
6+
severity: critical
7+
description: |
8+
Detects authentication bypass in SmarterTools SmarterMail via the force-reset-password endpoint.
9+
An unauthenticated attacker can reset the system administrator password by setting IsSysAdmin to true.
10+
reference:
11+
- https://labs.watchtowr.com/attackers-with-decompilers-strike-again-smartertools-smartermail-wt-2026-0001-auth-bypass/
12+
classification:
13+
cwe-id: CWE-287
14+
tags: appsec-testing,smartermail,auth-bypass
15+
16+
http:
17+
- raw:
18+
- |
19+
POST /api/v1/auth/force-reset-password HTTP/1.1
20+
Host: {{Hostname}}
21+
Content-Type: application/json
22+
23+
{"IsSysAdmin":"true","OldPassword":"whatever","Username":"admin","NewPassword":"NewPassword123!@#","ConfirmPassword":"NewPassword123!@#"}
24+
25+
matchers:
26+
- type: status
27+
status:
28+
- 403
Lines changed: 33 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,33 @@
1+
name: crowdsecurity/vpatch-WT-2026-0001
2+
description: 'Detects authentication bypass in SmarterTools SmarterMail via force-reset-password endpoint when IsSysAdmin is true'
3+
rules:
4+
- and:
5+
- zones:
6+
- URI
7+
transform:
8+
- lowercase
9+
- urldecode
10+
match:
11+
type: contains
12+
value: '/api/v1/auth/force-reset-password'
13+
- zones:
14+
- BODY_ARGS
15+
variables:
16+
- json.issysadmin
17+
transform:
18+
- lowercase
19+
match:
20+
type: equals
21+
value: 'true'
22+
23+
labels:
24+
type: exploit
25+
service: http
26+
confidence: 3
27+
spoofable: 0
28+
behavior: 'http:exploit'
29+
label: 'SmarterMail - Authentication Bypass'
30+
classification:
31+
- cve.WT-2026-0001
32+
- attack.T1190
33+
- cwe.CWE-287

0 commit comments

Comments
 (0)