Attachment: HTML smuggling with eval and atob via calendar invite
Scans calendar invites (.ics files) to detect HTML smuggling techniques.
Sublime rule (View on GitHub)
1name: "Attachment: HTML smuggling with eval and atob via calendar invite"
2description: "Scans calendar invites (.ics files) to detect HTML smuggling techniques."
3type: "rule"
4severity: "high"
5source: |
6 type.inbound
7 and any(attachments,
8 (
9 .file_extension =~ "ics"
10 or .content_type == "text/calendar"
11 )
12 // usage: onerror="eval(atob('
13 and regex.imatch(file.parse_text(.).text, ".*eval.{1,4}atob.*")
14
15 )
16attack_types:
17 - "Credential Phishing"
18 - "Malware/Ransomware"
19tactics_and_techniques:
20 - "Evasion"
21 - "HTML smuggling"
22 - "Scripting"
23detection_methods:
24 - "File analysis"
25 - "HTML analysis"
26 - "Javascript analysis"
27id: "597c2edd-ff97-5ef6-bcf4-8957011edd9c"