diff --git a/.appsec-tests/vpatch-CVE-2025-55747/CVE-2025-55747.yaml b/.appsec-tests/vpatch-CVE-2025-55747/CVE-2025-55747.yaml new file mode 100644 index 00000000000..69c26f39505 --- /dev/null +++ b/.appsec-tests/vpatch-CVE-2025-55747/CVE-2025-55747.yaml @@ -0,0 +1,17 @@ +## autogenerated on 2025-12-17 15:03:16 +id: CVE-2025-55747 +info: + name: CVE-2025-55747 + author: crowdsec + severity: info + description: CVE-2025-55747 testing + tags: appsec-testing +http: + - method: GET + path: + - '{{BaseURL}}/xwiki/webjars/wiki%3Axwiki/..%2F..%2F..%2F..%2F..%2FWEB-INF%2Fxwiki.cfg' + cookie-reuse: true + matchers: + - type: status + status: + - 403 diff --git a/.appsec-tests/vpatch-CVE-2025-55747/config.yaml b/.appsec-tests/vpatch-CVE-2025-55747/config.yaml new file mode 100644 index 00000000000..8391d4bff8f --- /dev/null +++ b/.appsec-tests/vpatch-CVE-2025-55747/config.yaml @@ -0,0 +1,5 @@ +## autogenerated on 2025-12-17 15:03:16 +appsec-rules: + - ./appsec-rules/crowdsecurity/base-config.yaml + - ./appsec-rules/crowdsecurity/vpatch-CVE-2025-55747.yaml +nuclei_template: CVE-2025-55747.yaml diff --git a/appsec-rules/crowdsecurity/vpatch-CVE-2025-55747.yaml b/appsec-rules/crowdsecurity/vpatch-CVE-2025-55747.yaml new file mode 100644 index 00000000000..c99dba15389 --- /dev/null +++ b/appsec-rules/crowdsecurity/vpatch-CVE-2025-55747.yaml @@ -0,0 +1,33 @@ +## autogenerated on 2025-12-17 15:03:16 +name: crowdsecurity/vpatch-CVE-2025-55747 +description: 'Detects XWiki webjars API path traversal leading to information disclosure of configuration files.' +rules: + - and: + - zones: + - URI + transform: + - lowercase + - urldecode + match: + type: contains + value: '/xwiki/webjars/wiki:xwiki' + - zones: + - URI + transform: + - lowercase + - urldecode + match: + type: contains + value: '..' + +labels: + type: exploit + service: http + confidence: 3 + spoofable: 0 + behavior: 'http:exploit' + label: 'XWiki - LFI' + classification: + - cve.CVE-2025-55747 + - attack.T1006 + - cwe.CWE-23 diff --git a/collections/crowdsecurity/appsec-virtual-patching.yaml b/collections/crowdsecurity/appsec-virtual-patching.yaml index 40e67fb33ef..902171ba122 100644 --- a/collections/crowdsecurity/appsec-virtual-patching.yaml +++ b/collections/crowdsecurity/appsec-virtual-patching.yaml @@ -141,6 +141,7 @@ appsec-rules: - crowdsecurity/vpatch-CVE-2020-10987 - crowdsecurity/vpatch-CVE-2025-55182 - crowdsecurity/vpatch-CVE-2024-6235 +- crowdsecurity/vpatch-CVE-2025-55747 - crowdsecurity/vpatch-CVE-2021-34427 - crowdsecurity/vpatch-CVE-2018-13317 - crowdsecurity/vpatch-CVE-2025-9316