Attachment: HTML smuggling with eval and atob via calendar invite
Scans calendar invites (.ics files) to detect HTML smuggling techniques.
Sublime rule (View on GitHub)
1name: "Attachment: HTML smuggling with eval and atob via calendar invite"
2description: "Scans calendar invites (.ics files) to detect HTML smuggling techniques."
3type: "rule"
4severity: "high"
5source: |
6 type.inbound
7 and any(attachments,
8 (.file_extension =~ "ics" or .content_type == "text/calendar")
9 // usage: onerror="eval(atob('
10 and regex.imatch(file.parse_text(.).text, ".*eval.{1,4}atob.*")
11 )
12attack_types:
13 - "Credential Phishing"
14 - "Malware/Ransomware"
15tactics_and_techniques:
16 - "Evasion"
17 - "HTML smuggling"
18 - "Scripting"
19detection_methods:
20 - "File analysis"
21 - "HTML analysis"
22 - "Javascript analysis"
23id: "597c2edd-ff97-5ef6-bcf4-8957011edd9c"