Skip to content

Conversation

@buixor
Copy link
Contributor

@buixor buixor commented Mar 13, 2025

The detection rule for CVE-2024-13161 targets the specific endpoint /WSVulnerabilityCore/VulCore.asmx and checks for the presence of a UNC path in the wildcard XML element within the SOAP request body. This path is indicative of an NTLM credential coercion attack, where an attacker specifies a remote UNC path to trigger NTLM authentication. The rule uses a regex match to detect any UNC path that includes a temporary directory and a .txt file, which aligns with the attack vector described in the vulnerability. The rule is designed to be case insensitive and to specifically match the structure of the attack, minimizing false positives while ensuring effective detection.

@github-actions
Copy link

Hello @buixor,

✅ The new VPATCH Rule is compliant, thank you for your contribution!

@github-actions
Copy link

Hello @buixor,

Scenarios/AppSec Rule are compliant with the taxonomy, thank you for your contribution!

@buixor buixor closed this Mar 13, 2025
@buixor buixor deleted the 1741886509-CVE-2024-13161 branch March 13, 2025 17:31
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants