Conversation
|
Hello @buixor and thank you for your contribution! ❗ It seems that the following scenarios are not part of the 'crowdsecurity/appsec-virtual-patching' collection: 🔴 crowdsecurity/vpatch-CVE-2025-40553 🔴 |
|
Hello @buixor and thank you for your contribution! I'm a bot that helps maintainers to validate scenarios and ensure they include all the required information. The following items have errors: crowdsecurity/crs-exclusion-plugin-cpanel:
crowdsecurity/crs-exclusion-plugin-dokuwiki:
crowdsecurity/crs-exclusion-plugin-drupal:
crowdsecurity/crs-exclusion-plugin-nextcloud:
crowdsecurity/crs-exclusion-plugin-phpbb:
crowdsecurity/crs-exclusion-plugin-phpmyadmin:
crowdsecurity/crs-exclusion-plugin-wordpress:
crowdsecurity/crs-exclusion-plugin-xenforo:
Mitre ATT&CKInformation about mitre attack can be found here.
Expected format is (where labels:
classification:
- attack.TXXXXCVEsIf your scenario covers a specific CVE (Common Vulnerabilities and Exposures), please add it. Expected format is (where labels:
classification:
- cve.CVE-XXX-XXXBehaviorsPlease identify the behavior(s) your scenario is targeting. You can find the list of available behaviors here. Expected format is (where labels:
behavior: <behavior>See the labels documentation for more information. |
Add virtual patch for CVE-2025-40553 — SolarWinds Web Help Desk Pre-Auth RCE via Jabsorb Deserialization
This PR adds a virtual patch rule and automated test for CVE-2025-40553, part of a pre-auth RCE chain (CVE-2025-40552/40553/40554) in SolarWinds Web Help Desk, disclosed by watchTowr on 2026-02-25.
Vulnerability summary: An unauthenticated attacker can POST a jabsorb deserialization payload to the AjaxProxy endpoint (/helpdesk/WebObjects/Helpdesk.woa/ajax/) using the wopage.takeValueForKey method with a javaClass gadget to achieve remote code execution.
Files added:
appsec-rules/crowdsecurity/vpatch-CVE-2025-40553.yaml — detection rule
.appsec-tests/vpatch-CVE-2025-40553/config.yaml — test configuration
.appsec-tests/vpatch-CVE-2025-40553/CVE-2025-40553.yaml — nuclei test template (validated, returns 403)
References:
https://labs.watchtowr.com/buy-a-help-desk-bundle-a-remote-access-solution-solarwinds-web-help-desk-pre-auth-rce-chain-s/
CWE-502 (Deserialization of Untrusted Data)