Add vpatch-CVE-2022-0434 rule and test #1585
Open
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This rule targets the unauthenticated SQL injection vulnerability in the WordPress Page Views Count plugin (CVE-2022-0434). The attack is performed via the
post_idsparameter in a REST endpoint, as shown in the nuclei template./?rest_route=/pvc/v1/increase/, using bothlowercaseandurldecodetransforms to ensure normalization and case insensitivity.post_idsargument for the SQL injection pattern, specifically looking for the substringunion select, which is a common indicator of SQL injection attempts. Again,lowercaseandurldecodeare applied for normalization.The test config and nuclei test template are adapted to only check for a 403 response, as required. All
value:fields are lowercase, and the transforms ensure case insensitivity. The rule usescontainsfor matching, as per best practices.