contrast-agent 3.11.0 → 3.13.1

Sign up to get free protection for your applications and to get access to all the features.
Files changed (298) hide show
  1. checksums.yaml +4 -4
  2. data/.dockerignore +0 -1
  3. data/.flayignore +1 -0
  4. data/.gitignore +1 -1
  5. data/.simplecov +1 -1
  6. data/Rakefile +31 -0
  7. data/ext/build_funchook.rb +0 -2
  8. data/ext/cs__assess_active_record_named/cs__active_record_named.c +7 -2
  9. data/ext/cs__assess_active_record_named/cs__active_record_named.h +1 -0
  10. data/ext/cs__assess_array/cs__assess_array.c +2 -1
  11. data/ext/cs__assess_array/cs__assess_array.h +1 -0
  12. data/ext/cs__assess_basic_object/cs__assess_basic_object.c +3 -7
  13. data/ext/cs__assess_basic_object/cs__assess_basic_object.h +2 -1
  14. data/ext/cs__assess_fiber_track/cs__assess_fiber_track.c +2 -8
  15. data/ext/cs__assess_fiber_track/cs__assess_fiber_track.h +0 -1
  16. data/ext/cs__assess_kernel/cs__assess_kernel.c +1 -1
  17. data/ext/cs__assess_module/cs__assess_module.c +5 -7
  18. data/ext/cs__assess_module/cs__assess_module.h +3 -0
  19. data/ext/cs__assess_string_interpolation26/cs__assess_string_interpolation26.c +1 -6
  20. data/ext/cs__assess_yield_track/cs__assess_yield_track.c +1 -5
  21. data/ext/cs__assess_yield_track/cs__assess_yield_track.h +0 -1
  22. data/ext/cs__common/cs__common.c +25 -1
  23. data/ext/cs__common/cs__common.h +3 -0
  24. data/ext/cs__common/extconf.rb +0 -14
  25. data/ext/cs__protect_kernel/cs__protect_kernel.c +4 -2
  26. data/ext/cs__protect_kernel/cs__protect_kernel.h +1 -0
  27. data/ext/extconf_common.rb +0 -28
  28. data/lib/contrast.rb +3 -2
  29. data/lib/contrast/agent.rb +33 -24
  30. data/lib/contrast/agent/assess.rb +0 -9
  31. data/lib/contrast/agent/assess/contrast_event.rb +28 -167
  32. data/lib/contrast/agent/assess/events/source_event.rb +3 -7
  33. data/lib/contrast/agent/assess/policy/dynamic_source_factory.rb +1 -1
  34. data/lib/contrast/agent/assess/policy/patcher.rb +1 -0
  35. data/lib/contrast/agent/assess/policy/policy_node.rb +5 -99
  36. data/lib/contrast/agent/assess/policy/policy_scanner.rb +1 -1
  37. data/lib/contrast/agent/assess/policy/propagation_method.rb +4 -2
  38. data/lib/contrast/agent/assess/policy/propagation_node.rb +5 -1
  39. data/lib/contrast/agent/assess/policy/propagator/base.rb +1 -1
  40. data/lib/contrast/agent/assess/policy/propagator/custom.rb +1 -1
  41. data/lib/contrast/agent/assess/policy/propagator/database_write.rb +1 -3
  42. data/lib/contrast/agent/assess/policy/propagator/insert.rb +1 -4
  43. data/lib/contrast/agent/assess/policy/propagator/match_data.rb +9 -1
  44. data/lib/contrast/agent/assess/policy/propagator/remove.rb +6 -11
  45. data/lib/contrast/agent/assess/policy/propagator/select.rb +4 -4
  46. data/lib/contrast/agent/assess/policy/propagator/split.rb +2 -2
  47. data/lib/contrast/agent/assess/policy/propagator/substitution.rb +4 -4
  48. data/lib/contrast/agent/assess/policy/propagator/trim.rb +6 -10
  49. data/lib/contrast/agent/assess/policy/source_method.rb +1 -2
  50. data/lib/contrast/agent/assess/policy/trigger/reflected_xss.rb +90 -0
  51. data/lib/contrast/agent/assess/policy/trigger/xpath.rb +57 -0
  52. data/lib/contrast/agent/assess/policy/trigger_method.rb +2 -14
  53. data/lib/contrast/agent/assess/policy/trigger_node.rb +20 -5
  54. data/lib/contrast/agent/assess/properties.rb +4 -382
  55. data/lib/contrast/agent/assess/property/evented.rb +78 -0
  56. data/lib/contrast/agent/assess/property/tagged.rb +339 -0
  57. data/lib/contrast/agent/assess/rule/base.rb +0 -15
  58. data/lib/contrast/agent/assess/rule/provider/hardcoded_value_rule.rb +5 -6
  59. data/lib/contrast/agent/assess/rule/redos.rb +0 -1
  60. data/lib/contrast/agent/assess/tag.rb +27 -12
  61. data/lib/contrast/agent/at_exit_hook.rb +4 -2
  62. data/lib/contrast/agent/class_reopener.rb +9 -4
  63. data/lib/contrast/agent/exclusion_matcher.rb +2 -3
  64. data/lib/contrast/agent/inventory/policy/datastores.rb +53 -0
  65. data/lib/contrast/agent/inventory/policy/policy.rb +1 -1
  66. data/lib/contrast/agent/middleware.rb +36 -44
  67. data/lib/contrast/agent/patching/policy/after_load_patch.rb +11 -2
  68. data/lib/contrast/agent/patching/policy/after_load_patcher.rb +51 -56
  69. data/lib/contrast/agent/patching/policy/patch.rb +3 -2
  70. data/lib/contrast/agent/patching/policy/patcher.rb +10 -12
  71. data/lib/contrast/agent/patching/policy/policy.rb +3 -3
  72. data/lib/contrast/agent/patching/policy/policy_node.rb +3 -3
  73. data/lib/contrast/agent/patching/policy/trigger_node.rb +1 -1
  74. data/lib/contrast/agent/protect/policy/applies_command_injection_rule.rb +63 -0
  75. data/lib/contrast/agent/protect/policy/applies_deserialization_rule.rb +52 -0
  76. data/lib/contrast/agent/protect/policy/applies_no_sqli_rule.rb +68 -0
  77. data/lib/contrast/agent/protect/policy/applies_path_traversal_rule.rb +117 -0
  78. data/lib/contrast/agent/protect/policy/applies_sqli_rule.rb +54 -0
  79. data/lib/contrast/agent/protect/policy/applies_xxe_rule.rb +129 -0
  80. data/lib/contrast/agent/protect/policy/policy.rb +6 -6
  81. data/lib/contrast/agent/protect/policy/rule_applicator.rb +51 -0
  82. data/lib/contrast/agent/protect/rule.rb +0 -5
  83. data/lib/contrast/agent/protect/rule/base.rb +25 -36
  84. data/lib/contrast/agent/protect/rule/base_service.rb +1 -1
  85. data/lib/contrast/agent/protect/rule/cmd_injection.rb +3 -3
  86. data/lib/contrast/agent/protect/rule/http_method_tampering.rb +2 -7
  87. data/lib/contrast/agent/protect/rule/path_traversal.rb +2 -7
  88. data/lib/contrast/agent/protect/rule/sqli.rb +4 -4
  89. data/lib/contrast/agent/protect/rule/xxe.rb +1 -0
  90. data/lib/contrast/agent/railtie.rb +1 -0
  91. data/lib/contrast/agent/reaction_processor.rb +3 -3
  92. data/lib/contrast/agent/request.rb +91 -334
  93. data/lib/contrast/agent/request_context.rb +17 -18
  94. data/lib/contrast/agent/request_handler.rb +2 -2
  95. data/lib/contrast/agent/response.rb +2 -83
  96. data/lib/contrast/agent/scope.rb +1 -1
  97. data/lib/contrast/agent/service_heartbeat.rb +8 -10
  98. data/lib/contrast/agent/static_analysis.rb +2 -3
  99. data/lib/contrast/agent/thread_watcher.rb +49 -0
  100. data/lib/contrast/agent/version.rb +1 -1
  101. data/lib/contrast/agent/worker_thread.rb +24 -0
  102. data/lib/contrast/api.rb +3 -5
  103. data/lib/contrast/api/communication.rb +20 -0
  104. data/lib/contrast/api/communication/connection_status.rb +41 -0
  105. data/lib/contrast/api/communication/messaging_queue.rb +79 -0
  106. data/lib/contrast/{utils/service_response_util.rb → api/communication/response_processor.rb} +15 -22
  107. data/lib/contrast/api/communication/service_lifecycle.rb +61 -0
  108. data/lib/contrast/api/communication/socket.rb +45 -0
  109. data/lib/contrast/api/communication/socket_client.rb +76 -0
  110. data/lib/contrast/api/communication/speedracer.rb +111 -0
  111. data/lib/contrast/api/communication/tcp_socket.rb +31 -0
  112. data/lib/contrast/api/communication/unix_socket.rb +27 -0
  113. data/lib/contrast/api/decorators.rb +10 -0
  114. data/lib/contrast/api/decorators/address.rb +60 -0
  115. data/lib/contrast/api/decorators/application_settings.rb +7 -3
  116. data/lib/contrast/api/decorators/application_update.rb +0 -9
  117. data/lib/contrast/api/decorators/http_request.rb +139 -0
  118. data/lib/contrast/api/decorators/message.rb +75 -0
  119. data/lib/contrast/api/decorators/rasp_rule_sample.rb +28 -0
  120. data/lib/contrast/api/decorators/route_coverage.rb +57 -0
  121. data/lib/contrast/api/decorators/trace_event.rb +99 -0
  122. data/lib/contrast/api/decorators/trace_event_object.rb +57 -0
  123. data/lib/contrast/api/decorators/trace_event_signature.rb +46 -0
  124. data/lib/contrast/api/decorators/trace_taint_range.rb +51 -0
  125. data/lib/contrast/api/decorators/trace_taint_range_tags.rb +109 -0
  126. data/lib/contrast/api/decorators/user_input.rb +40 -0
  127. data/lib/contrast/components/agent.rb +17 -12
  128. data/lib/contrast/components/app_context.rb +27 -2
  129. data/lib/contrast/components/assess.rb +25 -15
  130. data/lib/contrast/components/config.rb +4 -9
  131. data/lib/contrast/components/contrast_service.rb +23 -67
  132. data/lib/contrast/components/interface.rb +5 -13
  133. data/lib/contrast/components/inventory.rb +5 -1
  134. data/lib/contrast/components/logger.rb +2 -2
  135. data/lib/contrast/components/protect.rb +40 -4
  136. data/lib/contrast/components/scope.rb +2 -52
  137. data/lib/contrast/components/settings.rb +18 -18
  138. data/lib/contrast/config/protect_rules_configuration.rb +0 -1
  139. data/lib/contrast/configuration.rb +2 -2
  140. data/lib/contrast/{extensions/ruby_core → extension}/assess.rb +12 -15
  141. data/lib/contrast/extension/assess/array.rb +77 -0
  142. data/lib/contrast/{extensions/ruby_core → extension}/assess/assess_extension.rb +3 -4
  143. data/lib/contrast/{extensions/ruby_core → extension}/assess/erb.rb +0 -0
  144. data/lib/contrast/extension/assess/eval_trigger.rb +78 -0
  145. data/lib/contrast/{extensions/ruby_core → extension}/assess/exec_trigger.rb +1 -1
  146. data/lib/contrast/{extensions/ruby_core → extension}/assess/fiber.rb +7 -6
  147. data/lib/contrast/{extensions/ruby_core → extension}/assess/hash.rb +2 -2
  148. data/lib/contrast/extension/assess/kernel.rb +110 -0
  149. data/lib/contrast/{extensions/ruby_core → extension}/assess/regexp.rb +4 -4
  150. data/lib/contrast/{extensions/ruby_core → extension}/assess/string.rb +6 -6
  151. data/lib/contrast/{extensions/ruby_core → extension}/delegator.rb +0 -0
  152. data/lib/contrast/{extensions/ruby_core → extension}/inventory.rb +2 -3
  153. data/lib/contrast/extension/kernel.rb +54 -0
  154. data/lib/contrast/{extensions/ruby_core → extension}/module.rb +0 -0
  155. data/lib/contrast/{extensions/ruby_core → extension}/protect.rb +2 -2
  156. data/lib/contrast/extension/protect/kernel.rb +44 -0
  157. data/lib/contrast/{extensions/ruby_core → extension}/protect/psych.rb +1 -1
  158. data/lib/contrast/{extensions/ruby_core → extension}/thread.rb +0 -0
  159. data/lib/contrast/framework/base_support.rb +22 -23
  160. data/lib/contrast/framework/manager.rb +31 -15
  161. data/lib/contrast/framework/rack/patch/session_cookie.rb +126 -0
  162. data/lib/contrast/framework/rack/patch/support.rb +24 -0
  163. data/lib/contrast/framework/rack/support.rb +22 -0
  164. data/lib/contrast/framework/rails/patch/action_controller_live_buffer.rb +41 -0
  165. data/lib/contrast/framework/rails/patch/assess_configuration.rb +102 -0
  166. data/lib/contrast/framework/rails/patch/rails_application_configuration.rb +31 -0
  167. data/lib/contrast/framework/rails/patch/support.rb +67 -0
  168. data/lib/contrast/framework/rails/rewrite/action_controller_railties_helper_inherited.rb +34 -0
  169. data/lib/contrast/framework/rails/rewrite/active_record_attribute_methods_read.rb +39 -0
  170. data/lib/contrast/framework/rails/rewrite/active_record_named.rb +73 -0
  171. data/lib/contrast/framework/rails/rewrite/active_record_time_zone_inherited.rb +33 -0
  172. data/lib/contrast/framework/rails/support.rb +86 -0
  173. data/lib/contrast/framework/sinatra/patch/base.rb +83 -0
  174. data/lib/contrast/framework/sinatra/patch/support.rb +27 -0
  175. data/lib/contrast/framework/sinatra/support.rb +98 -0
  176. data/lib/contrast/funchook/funchook.rb +45 -0
  177. data/lib/contrast/logger/application.rb +80 -0
  178. data/lib/contrast/logger/format.rb +51 -0
  179. data/lib/contrast/{agent/logger.rb → logger/log.rb} +39 -63
  180. data/lib/contrast/logger/time.rb +50 -0
  181. data/lib/contrast/tasks/config.rb +54 -0
  182. data/lib/contrast/tasks/service.rb +1 -5
  183. data/lib/contrast/utils/assess/tracking_util.rb +45 -20
  184. data/lib/contrast/utils/class_util.rb +4 -2
  185. data/lib/contrast/utils/gemfile_reader.rb +2 -2
  186. data/lib/contrast/utils/hash_digest.rb +13 -9
  187. data/lib/contrast/utils/invalid_configuration_util.rb +2 -18
  188. data/lib/contrast/utils/inventory_util.rb +2 -7
  189. data/lib/contrast/utils/job_servers_running.rb +4 -2
  190. data/lib/contrast/utils/object_share.rb +0 -2
  191. data/lib/contrast/utils/os.rb +16 -4
  192. data/lib/contrast/utils/stack_trace_utils.rb +0 -1
  193. data/lib/contrast/utils/tag_util.rb +1 -1
  194. data/lib/contrast/utils/thread_tracker.rb +1 -14
  195. data/lib/contrast/utils/timer.rb +1 -17
  196. data/resources/assess/policy.json +9 -50
  197. data/resources/inventory/policy.json +2 -2
  198. data/resources/protect/policy.json +6 -6
  199. data/ruby-agent.gemspec +9 -5
  200. data/service_executables/VERSION +1 -1
  201. data/service_executables/linux/contrast-service +0 -0
  202. data/service_executables/mac/contrast-service +0 -0
  203. metadata +103 -139
  204. data/funchook/Makefile +0 -29
  205. data/funchook/autom4te.cache/output.0 +0 -4964
  206. data/funchook/autom4te.cache/requests +0 -77
  207. data/funchook/autom4te.cache/traces.0 +0 -361
  208. data/funchook/config.log +0 -651
  209. data/funchook/config.status +0 -1015
  210. data/funchook/configure +0 -4964
  211. data/funchook/src/Makefile +0 -70
  212. data/funchook/src/config.h +0 -101
  213. data/funchook/src/config.h.in +0 -100
  214. data/funchook/src/decoder.o +0 -0
  215. data/funchook/src/distorm.o +0 -0
  216. data/funchook/src/funchook.o +0 -0
  217. data/funchook/src/funchook_io.o +0 -0
  218. data/funchook/src/funchook_syscall.o +0 -0
  219. data/funchook/src/funchook_unix.o +0 -0
  220. data/funchook/src/funchook_x86.o +0 -0
  221. data/funchook/src/instructions.o +0 -0
  222. data/funchook/src/insts.o +0 -0
  223. data/funchook/src/libfunchook.dylib +0 -0
  224. data/funchook/src/mnemonics.o +0 -0
  225. data/funchook/src/operands.o +0 -0
  226. data/funchook/src/os_func.o +0 -0
  227. data/funchook/src/os_func_unix.o +0 -0
  228. data/funchook/src/prefix.o +0 -0
  229. data/funchook/src/printf_base.o +0 -0
  230. data/funchook/src/textdefs.o +0 -0
  231. data/funchook/src/wstring.o +0 -0
  232. data/funchook/test/Makefile +0 -43
  233. data/funchook/test/funchook_test +0 -0
  234. data/funchook/test/libfunchook_test.so +0 -0
  235. data/funchook/test/libfunchook_test.so.dSYM/Contents/Info.plist +0 -20
  236. data/funchook/test/libfunchook_test.so.dSYM/Contents/Resources/DWARF/libfunchook_test.so +0 -0
  237. data/funchook/test/test_main.o +0 -0
  238. data/funchook/test/x86_64_test.o +0 -0
  239. data/lib/contrast/agent/assess/adjusted_span.rb +0 -27
  240. data/lib/contrast/agent/assess/rule/csrf.rb +0 -66
  241. data/lib/contrast/agent/assess/rule/csrf/csrf_action.rb +0 -28
  242. data/lib/contrast/agent/assess/rule/csrf/csrf_applicator.rb +0 -53
  243. data/lib/contrast/agent/assess/rule/csrf/csrf_watcher.rb +0 -136
  244. data/lib/contrast/agent/assess/rule/response_scanning_rule.rb +0 -47
  245. data/lib/contrast/agent/assess/rule/response_watcher.rb +0 -36
  246. data/lib/contrast/agent/assess/rule/watcher.rb +0 -36
  247. data/lib/contrast/agent/feature_state.rb +0 -346
  248. data/lib/contrast/agent/protect/rule/csrf.rb +0 -119
  249. data/lib/contrast/agent/protect/rule/csrf/csrf_evaluator.rb +0 -100
  250. data/lib/contrast/agent/protect/rule/csrf/csrf_token_injector.rb +0 -85
  251. data/lib/contrast/agent/settings_state.rb +0 -88
  252. data/lib/contrast/agent/socket_client.rb +0 -134
  253. data/lib/contrast/api/connection_status.rb +0 -49
  254. data/lib/contrast/api/decorators/exclusion.rb +0 -20
  255. data/lib/contrast/api/socket.rb +0 -43
  256. data/lib/contrast/api/speedracer.rb +0 -188
  257. data/lib/contrast/api/tcp_socket.rb +0 -29
  258. data/lib/contrast/api/unix_socket.rb +0 -25
  259. data/lib/contrast/extensions/framework/rack/cookie.rb +0 -24
  260. data/lib/contrast/extensions/framework/rack/request.rb +0 -24
  261. data/lib/contrast/extensions/framework/rack/response.rb +0 -23
  262. data/lib/contrast/extensions/framework/rails/action_controller_inheritance.rb +0 -39
  263. data/lib/contrast/extensions/framework/rails/action_controller_railties_helper_inherited.rb +0 -20
  264. data/lib/contrast/extensions/framework/rails/active_record.rb +0 -26
  265. data/lib/contrast/extensions/framework/rails/active_record_named.rb +0 -58
  266. data/lib/contrast/extensions/framework/rails/active_record_time_zone_inherited.rb +0 -21
  267. data/lib/contrast/extensions/framework/rails/buffer.rb +0 -28
  268. data/lib/contrast/extensions/framework/rails/configuration.rb +0 -27
  269. data/lib/contrast/extensions/framework/sinatra/base.rb +0 -59
  270. data/lib/contrast/extensions/ruby_core/assess/array.rb +0 -59
  271. data/lib/contrast/extensions/ruby_core/assess/basic_object.rb +0 -15
  272. data/lib/contrast/extensions/ruby_core/assess/kernel.rb +0 -96
  273. data/lib/contrast/extensions/ruby_core/assess/module.rb +0 -14
  274. data/lib/contrast/extensions/ruby_core/assess/tilt_template_trigger.rb +0 -78
  275. data/lib/contrast/extensions/ruby_core/assess/xpath_library_trigger.rb +0 -40
  276. data/lib/contrast/extensions/ruby_core/eval_trigger.rb +0 -51
  277. data/lib/contrast/extensions/ruby_core/inventory/datastores.rb +0 -37
  278. data/lib/contrast/extensions/ruby_core/protect/applies_command_injection_rule.rb +0 -61
  279. data/lib/contrast/extensions/ruby_core/protect/applies_deserialization_rule.rb +0 -50
  280. data/lib/contrast/extensions/ruby_core/protect/applies_no_sqli_rule.rb +0 -66
  281. data/lib/contrast/extensions/ruby_core/protect/applies_path_traversal_rule.rb +0 -115
  282. data/lib/contrast/extensions/ruby_core/protect/applies_sqli_rule.rb +0 -53
  283. data/lib/contrast/extensions/ruby_core/protect/applies_xxe_rule.rb +0 -127
  284. data/lib/contrast/extensions/ruby_core/protect/kernel.rb +0 -30
  285. data/lib/contrast/extensions/ruby_core/protect/rule_applicator.rb +0 -50
  286. data/lib/contrast/framework/rails_support.rb +0 -104
  287. data/lib/contrast/framework/sinatra_application_helper.rb +0 -49
  288. data/lib/contrast/framework/sinatra_support.rb +0 -104
  289. data/lib/contrast/framework/view_technologies_descriptor.rb +0 -21
  290. data/lib/contrast/internal_exception.rb +0 -8
  291. data/lib/contrast/utils/cache.rb +0 -58
  292. data/lib/contrast/utils/data_store_util.rb +0 -23
  293. data/lib/contrast/utils/rack_assess_session_cookie.rb +0 -104
  294. data/lib/contrast/utils/rails_assess_configuration.rb +0 -95
  295. data/lib/contrast/utils/random_util.rb +0 -22
  296. data/lib/contrast/utils/service_sender_util.rb +0 -110
  297. data/lib/contrast/utils/sinatra_helper.rb +0 -49
  298. data/resources/csrf/inject.js +0 -44
@@ -1,40 +0,0 @@
1
- # Copyright (c) 2020 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
2
- # frozen_string_literal: true
3
-
4
- cs__scoped_require 'contrast/components/interface'
5
- # This module acts a trigger to handle the special cases of the XPath library gem
6
- # and the Oga gem. Untrusted data may come into either of the trigger methods from
7
- # these classes as an array or hash, respectively. Since untrusted user input comes
8
- # into these triggers as a splat argument or an options hash, we need to iterate
9
- # thorugh these objects to see if we were tracking on any of them and report a finding
10
- # if so.
11
- module XPathLibraryTrigger
12
- include Contrast::Components::Interface
13
-
14
- class << self
15
- def xpath_trigger_check context, trigger_node, _source, object, ret, *args
16
- return ret unless args
17
-
18
- # convert the options arg in Oga::XML::CharacterNode#initialize into an
19
- # array of its values so we can check if any are unsafe
20
- args = args.first.values if oga_defined? && object.cs__is_a?(Oga::XML::CharacterNode) && args.first.cs__is_a?(Hash)
21
-
22
- args.each do |arg|
23
- next unless arg.cs__is_a?(String) || arg.cs__is_a?(Symbol)
24
- next unless arg.cs__tracked?
25
- next unless trigger_node.violated?(arg)
26
-
27
- Contrast::Agent::Assess::Policy::TriggerMethod.build_finding(
28
- context, trigger_node, arg, object, ret, args)
29
- end
30
-
31
- ret
32
- end
33
-
34
- private
35
-
36
- def oga_defined?
37
- @_oga_defined ||= defined?(Oga::XML::CharacterNode)
38
- end
39
- end
40
- end
@@ -1,51 +0,0 @@
1
- # Copyright (c) 2020 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
2
- # frozen_string_literal: true
3
-
4
- module Contrast
5
- module CoreExtensions
6
- module Assess
7
- # This Module allows us to track calls to the BasicObject#eval method,
8
- # which violates the design of most methods we track in that we have to
9
- # apply the trigger in a custom patch over one of the generic triggers in
10
- # TriggerMethod.
11
- module EvalTrigger
12
- def instance_eval_trigger_check source, ret
13
- apply_trigger(source, ret, 'BasicObject', :instance_eval)
14
- end
15
-
16
- def eval_trigger_check source, ret, method
17
- apply_trigger(source, ret, 'Module', method)
18
- end
19
-
20
- def apply_trigger source, ret, clazz, method
21
- current_context = Contrast::Agent::REQUEST_TRACKER.current
22
- return unless current_context
23
-
24
- # Since we know this is the source of the trigger, we can do some
25
- # optimization here and return when it is not tracked
26
- return unless Contrast::Utils::Assess::TrackingUtil.tracked?(source)
27
-
28
- # source might not be all the args passed in, but it is the one we care
29
- # about. we could pass in all the args in the last param here if it
30
- # becomes an issue in rendering on TS
31
- Contrast::Agent::Assess::Policy::TriggerMethod.apply_eval_trigger(
32
- current_context,
33
- trigger_node(clazz, method),
34
- source,
35
- self,
36
- ret,
37
- source)
38
- end
39
-
40
- private
41
-
42
- def trigger_node clazz, method
43
- triggers = Contrast::Agent::Assess::Policy::Policy.instance.triggers
44
- return unless triggers
45
-
46
- triggers.find { |node| node.class_name == clazz && node.method_name == method }
47
- end
48
- end
49
- end
50
- end
51
- end
@@ -1,37 +0,0 @@
1
- # Copyright (c) 2020 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
2
- # frozen_string_literal: true
3
-
4
- cs__scoped_require 'contrast/components/interface'
5
- cs__scoped_require 'contrast/utils/data_store_util'
6
-
7
- module Contrast
8
- module CoreExtensions
9
- module Inventory
10
- # This Module is how we apply the Data Store detection required for the
11
- # FlowMap feature. It is called from our patches of the targeted methods
12
- # in which database operations occur. It is responsible for deciding if
13
- # the given invocation is worth reporting or not.
14
- module DataStores
15
- class << self
16
- include Contrast::Components::Interface
17
-
18
- access_component :analysis, :logging
19
- # The key used in policy.json to indicate the database type to
20
- # report.
21
- DATA_STORE_MARKER = 'data_store'
22
-
23
- def patched_report_data_store _method, _exception, properties, object, _args
24
- return unless INVENTORY.enabled?
25
-
26
- marker = properties[DATA_STORE_MARKER]
27
- return unless marker
28
-
29
- Contrast::Utils::DataStoreUtil.report_data_store(marker)
30
- rescue StandardError => e
31
- logger.error('Error reporting database call', e, object: object)
32
- end
33
- end
34
- end
35
- end
36
- end
37
- end
@@ -1,61 +0,0 @@
1
- # Copyright (c) 2020 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
2
- # frozen_string_literal: true
3
-
4
- cs__scoped_require 'contrast/agent/protect/rule/cmd_injection'
5
- cs__scoped_require 'contrast/extensions/ruby_core/protect/applies_deserialization_rule'
6
- cs__scoped_require 'contrast/extensions/ruby_core/protect/rule_applicator'
7
-
8
- module Contrast
9
- module CoreExtensions
10
- module Protect
11
- # This Module is how we apply the Command Injection rule. It is called
12
- # from our patches of the targeted methods in which command execution
13
- # occurs. It is responsible for deciding if the infilter methods of the
14
- # rule should be invoked.
15
- # In addition, b/c of the nature of Deserialization's sand boxing
16
- # function, this Module's apply methods call through to the
17
- # {#apply_deserialization_command_check} method of the
18
- # Deserialization applicator.
19
- module AppliesCommandInjectionRule
20
- extend Contrast::CoreExtensions::Protect::RuleApplicator
21
-
22
- CS__SEMICOLON = '; '
23
-
24
- class << self
25
- def invoke method, _exception, _properties, object, args
26
- return unless valid_command?(args)
27
-
28
- command = build_command(args)
29
- Contrast::CoreExtensions::Protect::AppliesDeserializationRule.apply_deserialization_command_check(command)
30
- return if skip_analysis?
31
-
32
- begin
33
- clazz = object.is_a?(Module) ? object : object.cs__class
34
- class_name = clazz.cs__name
35
- rule.infilter(Contrast::Agent::REQUEST_TRACKER.current, class_name, method, command)
36
- end
37
- end
38
-
39
- protected
40
-
41
- def name
42
- Contrast::Agent::Protect::Rule::CmdInjection::NAME
43
- end
44
-
45
- private
46
-
47
- def valid_command? command
48
- command && (command.is_a?(String) || command.is_a?(Array))
49
- end
50
-
51
- def build_command command
52
- return command if command.is_a?(String)
53
-
54
- command = command.drop(1) if command.length > 1
55
- command.join(CS__SEMICOLON)
56
- end
57
- end
58
- end
59
- end
60
- end
61
- end
@@ -1,50 +0,0 @@
1
- # Copyright (c) 2020 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
2
- # frozen_string_literal: true
3
-
4
- cs__scoped_require 'contrast/agent/protect/rule/deserialization'
5
- cs__scoped_require 'contrast/extensions/ruby_core/protect/rule_applicator'
6
-
7
- module Contrast
8
- module CoreExtensions
9
- module Protect
10
- # This Module is how we apply the Deserialization rule. It is called from
11
- # our patches of the targeted methods in which deserialization occurs.
12
- # It is responsible for deciding if the infilter methods of the rule
13
- # should be invoked.
14
- module AppliesDeserializationRule
15
- extend Contrast::CoreExtensions::Protect::RuleApplicator
16
-
17
- class << self
18
- def invoke _method, _exception, _properties, _object, args
19
- return unless valid_input?(args)
20
- return if skip_analysis?
21
-
22
- rule.infilter(Contrast::Agent::REQUEST_TRACKER.current, args[0])
23
- end
24
-
25
- def apply_deserialization_command_check command
26
- return unless command
27
- return if skip_analysis?
28
-
29
- rule.check_command_scope(command)
30
- end
31
-
32
- protected
33
-
34
- def name
35
- Contrast::Agent::Protect::Rule::Deserialization::NAME
36
- end
37
-
38
- private
39
-
40
- def valid_input? args
41
- return false unless args&.any?
42
-
43
- input = args[0]
44
- input.is_a?(String)
45
- end
46
- end
47
- end
48
- end
49
- end
50
- end
@@ -1,66 +0,0 @@
1
- # Copyright (c) 2020 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
2
- # frozen_string_literal: true
3
-
4
- cs__scoped_require 'contrast/agent/protect/rule/no_sqli'
5
- cs__scoped_require 'contrast/extensions/ruby_core/protect/rule_applicator'
6
-
7
- module Contrast
8
- module CoreExtensions
9
- module Protect
10
- # This Module is how we apply the NoSQL Injection rule. It is called from
11
- # our patches of the targeted methods in which the execution of String
12
- # based NoSQL queries occur. It is responsible for deciding if the
13
- # infilter methods of the rule should be invoked.
14
- module AppliesNoSqliRule
15
- extend Contrast::CoreExtensions::Protect::RuleApplicator
16
-
17
- class << self
18
- def invoke method, _exception, properties, _object, args
19
- return unless valid_input?(args)
20
- return if skip_analysis?
21
-
22
- database = properties['database']
23
- operations = args[0]
24
- context = Contrast::Agent::REQUEST_TRACKER.current
25
- if operations.is_a?(Array)
26
- operations.each do |m|
27
- handle_operation(context, database, method, m)
28
- end
29
- else
30
- handle_operation(context, database, method, operations)
31
- end
32
- end
33
-
34
- protected
35
-
36
- def name
37
- Contrast::Agent::Protect::Rule::NoSqli::NAME
38
- end
39
-
40
- private
41
-
42
- def valid_input? args
43
- return false unless args&.any?
44
-
45
- args[0]
46
- end
47
-
48
- def handle_operation context, database, _action, operation
49
- data = extract_mongo_data(operation)
50
- return unless data && !data.empty?
51
-
52
- rule.infilter(context, database, data)
53
- end
54
-
55
- def extract_mongo_data operation
56
- if operation.cs__respond_to? :selector
57
- operation.selector
58
- elsif operation.cs__respond_to? :documents
59
- operation.documents
60
- end
61
- end
62
- end
63
- end
64
- end
65
- end
66
- end
@@ -1,115 +0,0 @@
1
- # Copyright (c) 2020 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
2
- # frozen_string_literal: true
3
-
4
- cs__scoped_require 'contrast/agent/protect/rule/path_traversal'
5
- cs__scoped_require 'contrast/extensions/ruby_core/protect/rule_applicator'
6
- cs__scoped_require 'contrast/utils/object_share'
7
-
8
- module Contrast
9
- module CoreExtensions
10
- module Protect
11
- # This Module is how we apply the Path Traversal rule. It is called from
12
- # our patches of the targeted methods in which File or IO access occur.
13
- # It is responsible for deciding if the infilter methods of the rule
14
- # should be invoked.
15
- module AppliesPathTraversalRule
16
- extend Contrast::CoreExtensions::Protect::RuleApplicator
17
-
18
- class << self
19
- def invoke method, _exception, properties, object, args
20
- return unless args&.any?
21
-
22
- path = args[0]
23
- return unless path.is_a?(String)
24
- return if skip_analysis?
25
-
26
- action = properties['action']
27
- write_marker = write?(action, *args)
28
- possible_write = write_marker && possible_write(write_marker)
29
- path_traversal_rule(path, possible_write, object, method)
30
-
31
- # If the action was copy, we need to handle the write half of it.
32
- # We handled read in line above.
33
- return unless action == COPY
34
- return unless args.length > 1
35
-
36
- dst = args[1]
37
- return unless dst.is_a?(String)
38
-
39
- path_traversal_rule(dst, true, object, method)
40
- end
41
-
42
- protected
43
-
44
- def name
45
- Contrast::Agent::Protect::Rule::PathTraversal::NAME
46
- end
47
-
48
- private
49
-
50
- def possible_write input
51
- input.cs__respond_to?(:to_s) &&
52
- input.to_s.include?(Contrast::Utils::ObjectShare::WRITE_FLAG)
53
- end
54
-
55
- READ = 'read'
56
- WRITE = 'write'
57
- COPY = 'copy'
58
- def write? action, *args
59
- return false if action == READ
60
- return false if action == COPY
61
- return true if action == WRITE
62
-
63
- write_marker = args.length > 1 ? args[1] : nil
64
- write_marker && possible_write(write_marker)
65
- end
66
-
67
- def path_traversal_rule path, possible_write, object, method
68
- return unless applies_to?(path, possible_write)
69
-
70
- rule.infilter(Contrast::Agent::REQUEST_TRACKER.current, method, path)
71
- rescue Contrast::SecurityException => e
72
- raise e
73
- rescue StandardError => e
74
- logger.error('Error applying path traversal', e, module: object.cs__class.cs__name, method: method)
75
- end
76
-
77
- CS__SAFER_REL_PATHS = %w[public app log tmp].cs__freeze
78
- def safer_abs_paths
79
- @_safer_abs_paths ||= begin
80
- pwd = ENV['PWD']
81
- if pwd
82
- tmp = CS__SAFER_REL_PATHS.map { |r| "#{ pwd }/#{ r }" }
83
- gems = ENV['GEM_PATH']
84
- tmp += gems.split(Contrast::Utils::ObjectShare::COLON) if gems
85
- tmp
86
- else
87
- []
88
- end
89
- end
90
- end
91
-
92
- def applies_to? path, possible_write = false
93
- # any possible write is a potential risk
94
- return true if possible_write
95
-
96
- # any path that moves 'up' is a potential risk
97
- return true if path.index(Contrast::Utils::ObjectShare::PARENT_PATH)
98
-
99
- path = path.downcase
100
- if path.start_with?(Contrast::Utils::ObjectShare::SLASH)
101
- safer_abs_paths.each do |prefix|
102
- return false if path.start_with?(prefix)
103
- end
104
- else
105
- CS__SAFER_REL_PATHS.each do |prefix|
106
- return false if path.start_with?(prefix)
107
- end
108
- end
109
- true
110
- end
111
- end
112
- end
113
- end
114
- end
115
- end
@@ -1,53 +0,0 @@
1
- # Copyright (c) 2020 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
2
- # frozen_string_literal: true
3
-
4
- cs__scoped_require 'contrast/agent/protect/rule/sqli'
5
- cs__scoped_require 'contrast/extensions/ruby_core/protect/rule_applicator'
6
- cs__scoped_require 'contrast/utils/data_store_util'
7
-
8
- module Contrast
9
- module CoreExtensions
10
- module Protect
11
- # This Module is how we apply the SQL Injection rule. It is called from
12
- # our patches of the targeted methods in which the execution of String
13
- # based SQL queries occur. It is responsible for deciding if the infilter
14
- # methods of the rule should be invoked.
15
- class AppliesSqliRule
16
- extend Contrast::CoreExtensions::Protect::RuleApplicator
17
-
18
- DATABASE_MYSQL = 'MySQL'
19
- DATABASE_SQLITE = 'SQLite3'
20
- DATABASE_PG = 'PostgreSQL'
21
-
22
- class << self
23
- def invoke _method, _exception, properties, _object, args
24
- database = properties['database']
25
- return unless database
26
-
27
- index = properties[Contrast::Utils::ObjectShare::INDEX]
28
- return unless valid_input?(index, args)
29
- return if skip_analysis?
30
-
31
- sql = args[index]
32
- rule.infilter(Contrast::Agent::REQUEST_TRACKER.current, database, sql)
33
- end
34
-
35
- protected
36
-
37
- def name
38
- Contrast::Agent::Protect::Rule::Sqli::NAME
39
- end
40
-
41
- private
42
-
43
- def valid_input? index, args
44
- return false unless args && args.length > index
45
-
46
- sql = args[index]
47
- sql && !sql.empty?
48
- end
49
- end
50
- end
51
- end
52
- end
53
- end