##
Vulnerability details:
Checking for Content Injection Vulnerability in WordPress (
https://blog.sucuri.net/2017/02/content-injection-vulnerability-wordpress-rest-api.html).
##
OSSEC Rules:
<group name="web,appsec,attack">
<rule id="160006" level="10" maxsize="1">
<if_sid>31100,31101,31108</if_sid>
<url>/wp-json/wp/v2/posts/</url>
<match>GET</match>
<description>Checking for Content Injection Vulnerability in WordPress (
https://blog.sucuri.net/2017/02/content-injection-vulnerability-wordpress-rest-api.html).</description>
</rule>
</group>
<group name="web,appsec,attack">
<rule id="160007" level="10" maxsize="1">
<if_sid>31100,31101,31108</if_sid>
<url>/wp-json/wp/v2/posts/</url>
<match>POST</match>
<description>Checking for Content Injection Vulnerability in WordPress (
https://blog.sucuri.net/2017/02/content-injection-vulnerability-wordpress-rest-api.html).</description>
</rule>
</group>
<group name="web,appsec,attack">
<rule id="160008" level="10" maxsize="1">
<if_sid>31100,31101,31108</if_sid>
<url>/wp-json/wp/v2/posts/</url>
<regex>/wp-json/wp/v2/posts/+\d?id=\D+</regex>
<description>Content Injection Attack in WordPress (
https://blog.sucuri.net/2017/02/content-injection-vulnerability-wordpress-rest-api.html).</description>
</rule>
</group>
<group name="web,appsec,attack">
<rule id="160009" level="10" maxsize="1">
<if_sid>31100,31101,31108</if_sid>
<url>/wp-json/wp/v2/posts/</url>
<match>Python-urllib</match>
<description>Content Injection Attack in WordPress (
https://blog.sucuri.net/2017/02/content-injection-vulnerability-wordpress-rest-api.html).</description>
</rule>
</group>
##
Log sampler:
** Alert 1487094067.16027193: mail - web,appsec,attack
2017 Feb 14 17:41:07 wap->/var/log/nginx/www.ciespsul.org.br-access.log
Rule: 160006 (level 10) -> 'Checking for Content Injection Vulnerability in WordPress (
https://blog.sucuri.net/2017/02/content-injection-vulnerability-wordpress-rest-api.html).'
Src IP: 95.211.196.216 / NLD / Noord-Holland
95.211.196.216 - - [14/Feb/2017:15:41:06 -0200] "GET /index.php/wp-json/wp/v2/posts/ HTTP/1.1" 301 0 "-" "Mozilla/5.0 (Windows NT 6.2; WOW64; rv:49.0) Gecko/20100101 Firefox/49.0" "-"
** Alert 1487094069.16027729: mail - web,appsec,attack
2017 Feb 14 17:41:09 wap->/var/log/nginx/www.ciespsul.org.br-access.log
Rule: 160006 (level 10) -> 'Checking for Content Injection Vulnerability in WordPress (
https://blog.sucuri.net/2017/02/content-injection-vulnerability-wordpress-rest-api.html).'
Src IP: 95.211.196.216 / NLD / Noord-Holland
95.211.196.216 - - [14/Feb/2017:15:41:07 -0200] "GET /wp-json/wp/v2/posts/ HTTP/1.1" 404 17192 "-" "Mozilla/5.0 (Windows NT 6.2; WOW64; rv:49.0) Gecko/20100101 Firefox/49.0" "-"
##
Best regards.