Attachment: HTML smuggling with eval and atob via calendar invite

Scans calendar invites (.ics files) to detect HTML smuggling techniques.

Sublime rule (View on GitHub)

 1name: "Attachment: HTML smuggling with eval and atob via calendar invite"
 2description: "Scans calendar invites (.ics files) to detect HTML smuggling techniques."
 3type: "rule"
 4severity: "high"
 5source: |
 6  type.inbound
 7  and any(attachments,
 8          (
 9            .file_extension =~ "ics"
10            or .content_type == "text/calendar"
11          )
12          and any(file.explode(.),
13                  // usage: onerror="eval(atob('
14                  any(.scan.strings.strings,
15                      regex.imatch(., ".*eval.{1,4}atob.*")
16                  )
17          )
18  )  
19
20attack_types:
21  - "Credential Phishing"
22  - "Malware/Ransomware"
23tactics_and_techniques:
24  - "Evasion"
25  - "HTML smuggling"
26  - "Scripting"
27detection_methods:
28  - "File analysis"
29  - "HTML analysis"
30  - "Javascript analysis"
31id: "597c2edd-ff97-5ef6-bcf4-8957011edd9c"
to-top