Rule Update
24-025 (May 21, 2024)
Publish date: May 21, 2024
DESCRIPTION
* indicates a new version of an existing rule
Deep Packet Inspection Rules:
Network Scanner
1008800* - Bypass Network Scanner Traffic
Nextgen Mirth Connect
1012008* - Nextgen Mirth Connect Insecure Deserialization Vulnerability (CVE-2023-43208)
Oracle VirtualBox
1012034* - Oracle VirtualBox Information Disclosure Vulnerability (CVE-2024-21109)
Progress Telerik Reporting
1012039 - Progress Telerik Reporting Insecure Deserialization Vulnerability (CVE-2024-1856 and CVE-2024-1801)
Web Application PHP Based
1011975* - WordPress 'Backup Migration' Plugin Command Injection Vulnerability (CVE-2023-7002)
1011828* - WordPress 'Beautiful Cookie Consent Banner' Plugin Cross-Site Scripting Vulnerability (CVE-2023-3388)
1011561* - WordPress 'Ketchup Restaurant Reservations' Plugin SQL Injection Vulnerability (CVE-2022-2754)
1011992* - WordPress 'Paid Memberships Pro' Plugin Arbitrary File Upload Vulnerability (CVE-2023-6187)
1012005* - WordPress 'Popup Builder' Plugin Cross-Site Scripting Vulnerability (CVE-2023-6000)
1012007* - WordPress 'Ultimate Member' Plugin SQL Injection Vulnerability (CVE-2024-1071)
1012045 - WordPress 'WPvivid Backup' Plugin Insecure Deserialization Vulnerability (CVE-2024-3054)
Web Client Common
1004715* - HTTP Web Client Decoding
1011949* - Microsoft Windows SmartScreen Security Feature Bypass Vulnerability (CVE-2024-21412)
Web Server HTTPS
1011979* - Centreon SQL Injection Vulnerability (CVE-2024-0637)
1011984* - Centreon SQL Injection Vulnerability (CVE-2024-23115)
1011983* - Centreon SQL Injection Vulnerability (CVE-2024-23116)
Web Server Miscellaneous
1012043 - XWiki Code Injection Vulnerability (CVE-2024-31984)
Integrity Monitoring Rules:
1010793* - Linux/Unix - Shared object files modified
1011021* - Linux/Unix - bash root user configuration files modified (ATT&CK T1546.004)
Log Inspection Rules:
There are no new or updated Log Inspection Rules in this Security Update.
Deep Packet Inspection Rules:
Network Scanner
1008800* - Bypass Network Scanner Traffic
Nextgen Mirth Connect
1012008* - Nextgen Mirth Connect Insecure Deserialization Vulnerability (CVE-2023-43208)
Oracle VirtualBox
1012034* - Oracle VirtualBox Information Disclosure Vulnerability (CVE-2024-21109)
Progress Telerik Reporting
1012039 - Progress Telerik Reporting Insecure Deserialization Vulnerability (CVE-2024-1856 and CVE-2024-1801)
Web Application PHP Based
1011975* - WordPress 'Backup Migration' Plugin Command Injection Vulnerability (CVE-2023-7002)
1011828* - WordPress 'Beautiful Cookie Consent Banner' Plugin Cross-Site Scripting Vulnerability (CVE-2023-3388)
1011561* - WordPress 'Ketchup Restaurant Reservations' Plugin SQL Injection Vulnerability (CVE-2022-2754)
1011992* - WordPress 'Paid Memberships Pro' Plugin Arbitrary File Upload Vulnerability (CVE-2023-6187)
1012005* - WordPress 'Popup Builder' Plugin Cross-Site Scripting Vulnerability (CVE-2023-6000)
1012007* - WordPress 'Ultimate Member' Plugin SQL Injection Vulnerability (CVE-2024-1071)
1012045 - WordPress 'WPvivid Backup' Plugin Insecure Deserialization Vulnerability (CVE-2024-3054)
Web Client Common
1004715* - HTTP Web Client Decoding
1011949* - Microsoft Windows SmartScreen Security Feature Bypass Vulnerability (CVE-2024-21412)
Web Server HTTPS
1011979* - Centreon SQL Injection Vulnerability (CVE-2024-0637)
1011984* - Centreon SQL Injection Vulnerability (CVE-2024-23115)
1011983* - Centreon SQL Injection Vulnerability (CVE-2024-23116)
Web Server Miscellaneous
1012043 - XWiki Code Injection Vulnerability (CVE-2024-31984)
Integrity Monitoring Rules:
1010793* - Linux/Unix - Shared object files modified
1011021* - Linux/Unix - bash root user configuration files modified (ATT&CK T1546.004)
Log Inspection Rules:
There are no new or updated Log Inspection Rules in this Security Update.
Featured Stories
- The Mirage of AI Programming: Hallucinations and Code IntegrityThe adoption of large language models (LLMs) and Generative Pre-trained Transformers (GPTs), such as ChatGPT, by leading firms like Microsoft, Nuance, Mix and Google CCAI Insights, drives the industry towards a series of transformative changes. As the use of these new technologies becomes prevalent, it is important to understand their key behavior, advantages, and the risks they present.Read more
- Open RAN: Attack of the xAppsThis article discusses two O-RAN vulnerabilities that attackers can exploit. One vulnerability stems from insufficient access control, and the other arises from faulty message handlingRead more
- A Closer Exploration of Residential Proxies and CAPTCHA-Breaking ServicesThis article, the final part of a two-part series, focuses on the details of our technical findings and analyses of select residential proxies and CAPTCHA-solving services.Read more
- How Residential Proxies and CAPTCHA-Solving Services Become Agents of AbuseThis article, the first of a two-part series, provides insights on how abusers and cybercriminals use residential proxies and CAPTCHA-solving services to enable bots, scrapers, and stuffers, and proposes security countermeasures for organizations.Read more