Skip to content

Conversation

@crowdsec-automation
Copy link
Contributor

This rule detects unauthenticated session ID generation in N-central's SOAP endpoint, which is the core of CVE-2025-9316. The detection logic is as follows:

  • The first rule block matches requests to the /dms/services/serverui endpoint, which is the SOAP service vulnerable to this issue. The lowercase transform ensures case-insensitive matching.
  • The second rule block inspects the raw body of the request for the presence of the <sessionhello> tag, which is the SOAP action that triggers the session ID generation. Again, lowercase is used for normalization.
  • No specific argument or header is targeted, as the vulnerability is triggered by the combination of endpoint and SOAP body content.
  • The labels section includes the correct CVE, ATT&CK, and CWE references, and the label is formatted as required.
  • The test nuclei template is adapted to expect a 403 response, as per the detection rule's blocking behavior.

Validation checklist:

  • All value: fields are lowercase.
  • All relevant transform include lowercase.
  • No match.value contains capital letters.
  • contains is used for matching instead of regex where applicable.

@github-actions
Copy link

Hello @crowdsec-automation and thank you for your contribution!

❗ It seems that the following scenarios are not part of the 'crowdsecurity/appsec-virtual-patching' collection:

🔴 crowdsecurity/vpatch-CVE-2025-9316 🔴

@github-actions
Copy link

Hello @crowdsec-automation and thank you for your contribution!

I'm a bot that helps maintainers to validate scenarios and ensure they include all the required information.
I've found some errors in your scenarios, please fix them and re-submit your PR, or ask for help if you need it.

The following items have errors:

crowdsecurity/crs-exclusion-plugin-cpanel:

  • labels not found

crowdsecurity/crs-exclusion-plugin-dokuwiki:

  • labels not found

crowdsecurity/crs-exclusion-plugin-drupal:

  • labels not found

crowdsecurity/crs-exclusion-plugin-nextcloud:

  • labels not found

crowdsecurity/crs-exclusion-plugin-phpbb:

  • labels not found

crowdsecurity/crs-exclusion-plugin-phpmyadmin:

  • labels not found

crowdsecurity/crs-exclusion-plugin-wordpress:

  • labels not found

crowdsecurity/crs-exclusion-plugin-xenforo:

  • labels not found

Mitre ATT&CK

Information about mitre attack can be found here.
As an example, some common mitre attack techniques:

  • T1110 for bruteforce attacks
  • T1595 and T1190 for exploitation of public vulnerabilities
  • T1595 for generic scanning of exposed applications

Expected format is (where XXXX is the technique ID):

labels:
  classification:
    - attack.TXXXX

CVEs

If your scenario covers a specific CVE (Common Vulnerabilities and Exposures), please add it.

Expected format is (where CVE-XXX-XXX is the CVE ID):

labels:
  classification:
    - cve.CVE-XXX-XXX

Behaviors

Please identify the behavior(s) your scenario is targeting. You can find the list of available behaviors here.

Expected format is (where <behavior> is the behavior you want to target):

labels:
  behavior: <behavior>

See the labels documentation for more information.

@buixor buixor assigned AlteredCoder and unassigned buixor Dec 17, 2025
@AlteredCoder AlteredCoder merged commit a8012b8 into master Dec 17, 2025
12 checks passed
@AlteredCoder AlteredCoder deleted the 1765983744-vpatch-CVE-2025-9316 branch December 17, 2025 15:19
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants