contrast-agent 3.8.4 → 6.9.0

Sign up to get free protection for your applications and to get access to all the features.
Files changed (676) hide show
  1. checksums.yaml +4 -4
  2. data/.dockerignore +0 -1
  3. data/.flayignore +1 -0
  4. data/.gitignore +8 -5
  5. data/.gitmodules +0 -3
  6. data/.rspec +0 -1
  7. data/.rspec_parallel +6 -0
  8. data/.simplecov +6 -2
  9. data/Gemfile +1 -1
  10. data/LICENSE.txt +1 -1
  11. data/Rakefile +5 -2
  12. data/ext/build_funchook.rb +27 -11
  13. data/ext/cs__assess_array/cs__assess_array.c +45 -7
  14. data/ext/cs__assess_array/cs__assess_array.h +5 -1
  15. data/ext/cs__assess_array/extconf.rb +3 -0
  16. data/ext/cs__assess_basic_object/cs__assess_basic_object.c +39 -17
  17. data/ext/cs__assess_basic_object/cs__assess_basic_object.h +2 -1
  18. data/ext/cs__assess_basic_object/extconf.rb +3 -0
  19. data/ext/cs__assess_fiber_track/cs__assess_fiber_track.c +9 -13
  20. data/ext/cs__assess_fiber_track/cs__assess_fiber_track.h +3 -4
  21. data/ext/cs__assess_fiber_track/extconf.rb +3 -0
  22. data/ext/cs__assess_hash/cs__assess_hash.c +46 -21
  23. data/ext/cs__assess_hash/cs__assess_hash.h +5 -6
  24. data/ext/cs__assess_hash/extconf.rb +3 -0
  25. data/ext/cs__assess_kernel/cs__assess_kernel.c +29 -15
  26. data/ext/cs__assess_kernel/cs__assess_kernel.h +3 -0
  27. data/ext/cs__assess_kernel/extconf.rb +3 -0
  28. data/ext/cs__assess_marshal_module/cs__assess_marshal_module.c +55 -23
  29. data/ext/cs__assess_marshal_module/cs__assess_marshal_module.h +6 -3
  30. data/ext/cs__assess_marshal_module/extconf.rb +3 -0
  31. data/ext/cs__assess_module/cs__assess_module.c +82 -23
  32. data/ext/cs__assess_module/cs__assess_module.h +10 -0
  33. data/ext/cs__assess_module/extconf.rb +3 -0
  34. data/ext/cs__assess_regexp/cs__assess_regexp.c +28 -9
  35. data/ext/cs__assess_regexp/cs__assess_regexp.h +3 -0
  36. data/ext/cs__assess_regexp/extconf.rb +3 -0
  37. data/ext/cs__assess_string/cs__assess_string.c +53 -21
  38. data/ext/cs__assess_string/cs__assess_string.h +7 -1
  39. data/ext/cs__assess_string/extconf.rb +3 -0
  40. data/ext/cs__assess_string_interpolation/cs__assess_string_interpolation.c +39 -0
  41. data/ext/cs__assess_string_interpolation/cs__assess_string_interpolation.h +13 -0
  42. data/ext/cs__assess_string_interpolation/extconf.rb +5 -0
  43. data/ext/cs__assess_test/cs__assess_test.h +9 -0
  44. data/ext/cs__assess_test/cs__assess_tests.c +22 -0
  45. data/ext/cs__assess_test/extconf.rb +5 -0
  46. data/ext/cs__assess_yield_track/cs__assess_yield_track.c +30 -0
  47. data/ext/cs__assess_yield_track/cs__assess_yield_track.h +11 -0
  48. data/ext/cs__assess_yield_track/extconf.rb +5 -0
  49. data/ext/cs__common/cs__common.c +246 -10
  50. data/ext/cs__common/cs__common.h +71 -2
  51. data/ext/cs__common/extconf.rb +3 -16
  52. data/ext/cs__contrast_patch/cs__contrast_patch.c +255 -155
  53. data/ext/cs__contrast_patch/cs__contrast_patch.h +13 -14
  54. data/ext/cs__contrast_patch/extconf.rb +3 -0
  55. data/ext/cs__os_information/cs__os_information.c +34 -0
  56. data/ext/cs__os_information/cs__os_information.h +7 -0
  57. data/ext/cs__os_information/extconf.rb +5 -0
  58. data/ext/cs__scope/cs__scope.c +755 -55
  59. data/ext/cs__scope/cs__scope.h +75 -20
  60. data/ext/cs__scope/extconf.rb +3 -0
  61. data/ext/cs__tests/cs__tests.c +12 -0
  62. data/ext/cs__tests/cs__tests.h +3 -0
  63. data/ext/cs__tests/extconf.rb +5 -0
  64. data/ext/extconf_common.rb +4 -34
  65. data/lib/contrast/agent/assess/contrast_object.rb +54 -0
  66. data/lib/contrast/agent/assess/events/event_data.rb +30 -0
  67. data/lib/contrast/agent/assess/finalizers/freeze.rb +15 -0
  68. data/lib/contrast/agent/assess/finalizers/hash.rb +107 -0
  69. data/lib/contrast/agent/assess/policy/dynamic_source_factory.rb +58 -36
  70. data/lib/contrast/agent/assess/policy/patcher.rb +13 -48
  71. data/lib/contrast/agent/assess/policy/policy.rb +20 -37
  72. data/lib/contrast/agent/assess/policy/policy_node.rb +96 -200
  73. data/lib/contrast/agent/assess/policy/policy_node_utils.rb +50 -0
  74. data/lib/contrast/agent/assess/policy/policy_scanner.rb +15 -12
  75. data/lib/contrast/agent/assess/policy/preshift.rb +50 -19
  76. data/lib/contrast/agent/assess/policy/propagation_method.rb +200 -192
  77. data/lib/contrast/agent/assess/policy/propagation_node.rb +49 -41
  78. data/lib/contrast/agent/assess/policy/propagator/append.rb +32 -15
  79. data/lib/contrast/agent/assess/policy/propagator/base.rb +5 -3
  80. data/lib/contrast/agent/assess/policy/propagator/buffer.rb +119 -0
  81. data/lib/contrast/agent/assess/policy/propagator/center.rb +12 -8
  82. data/lib/contrast/agent/assess/policy/propagator/custom.rb +7 -3
  83. data/lib/contrast/agent/assess/policy/propagator/database_write.rb +34 -25
  84. data/lib/contrast/agent/assess/policy/propagator/insert.rb +15 -11
  85. data/lib/contrast/agent/assess/policy/propagator/keep.rb +23 -6
  86. data/lib/contrast/agent/assess/policy/propagator/match_data.rb +118 -0
  87. data/lib/contrast/agent/assess/policy/propagator/next.rb +7 -6
  88. data/lib/contrast/agent/assess/policy/propagator/prepend.rb +13 -6
  89. data/lib/contrast/agent/assess/policy/propagator/rack_protection.rb +73 -0
  90. data/lib/contrast/agent/assess/policy/propagator/remove.rb +53 -41
  91. data/lib/contrast/agent/assess/policy/propagator/replace.rb +5 -3
  92. data/lib/contrast/agent/assess/policy/propagator/reverse.rb +7 -6
  93. data/lib/contrast/agent/assess/policy/propagator/select.rb +45 -36
  94. data/lib/contrast/agent/assess/policy/propagator/splat.rb +44 -21
  95. data/lib/contrast/agent/assess/policy/propagator/split.rb +176 -22
  96. data/lib/contrast/agent/assess/policy/propagator/substitution.rb +7 -132
  97. data/lib/contrast/agent/assess/policy/propagator/substitution_utils.rb +190 -0
  98. data/lib/contrast/agent/assess/policy/propagator/trim.rb +74 -52
  99. data/lib/contrast/agent/assess/policy/propagator.rb +21 -18
  100. data/lib/contrast/agent/assess/policy/source_method.rb +176 -177
  101. data/lib/contrast/agent/assess/policy/source_node.rb +3 -17
  102. data/lib/contrast/agent/assess/policy/source_validation/cross_site_validator.rb +32 -0
  103. data/lib/contrast/agent/assess/policy/source_validation/source_validation.rb +34 -0
  104. data/lib/contrast/agent/assess/policy/trigger/reflected_xss.rb +102 -0
  105. data/lib/contrast/agent/assess/policy/trigger/xpath.rb +57 -0
  106. data/lib/contrast/agent/assess/policy/trigger_method.rb +160 -173
  107. data/lib/contrast/agent/assess/policy/trigger_node.rb +162 -39
  108. data/lib/contrast/agent/assess/policy/trigger_validation/redos_validator.rb +60 -0
  109. data/lib/contrast/agent/assess/policy/trigger_validation/ssrf_validator.rb +8 -38
  110. data/lib/contrast/agent/assess/policy/trigger_validation/trigger_validation.rb +22 -7
  111. data/lib/contrast/agent/assess/policy/trigger_validation/xss_validator.rb +6 -15
  112. data/lib/contrast/agent/assess/properties.rb +15 -354
  113. data/lib/contrast/agent/assess/property/evented.rb +58 -0
  114. data/lib/contrast/agent/assess/property/tagged.rb +246 -0
  115. data/lib/contrast/agent/assess/property/updated.rb +131 -0
  116. data/lib/contrast/agent/assess/rule/provider/hardcoded_key.rb +58 -19
  117. data/lib/contrast/agent/assess/rule/provider/hardcoded_password.rb +22 -17
  118. data/lib/contrast/agent/assess/rule/provider/hardcoded_value_rule.rb +93 -81
  119. data/lib/contrast/agent/assess/rule/provider.rb +4 -4
  120. data/lib/contrast/agent/assess/rule/response/auto_complete_rule.rb +69 -0
  121. data/lib/contrast/agent/assess/rule/response/base_rule.rb +121 -0
  122. data/lib/contrast/agent/assess/rule/response/body_rule.rb +107 -0
  123. data/lib/contrast/agent/assess/rule/response/cache_control_header_rule.rb +195 -0
  124. data/lib/contrast/agent/assess/rule/response/click_jacking_header_rule.rb +26 -0
  125. data/lib/contrast/agent/assess/rule/response/csp_header_insecure_rule.rb +100 -0
  126. data/lib/contrast/agent/assess/rule/response/csp_header_missing_rule.rb +26 -0
  127. data/lib/contrast/agent/assess/rule/response/framework/rails_support.rb +34 -0
  128. data/lib/contrast/agent/assess/rule/response/header_rule.rb +70 -0
  129. data/lib/contrast/agent/assess/rule/response/hsts_header_rule.rb +36 -0
  130. data/lib/contrast/agent/assess/rule/response/parameters_pollution_rule.rb +61 -0
  131. data/lib/contrast/agent/assess/rule/response/x_content_type_header_rule.rb +26 -0
  132. data/lib/contrast/agent/assess/rule/response/x_xss_protection_header_rule.rb +34 -0
  133. data/lib/contrast/agent/assess/tag.rb +84 -41
  134. data/lib/contrast/agent/assess/tracker.rb +70 -0
  135. data/lib/contrast/agent/assess.rb +7 -29
  136. data/lib/contrast/agent/at_exit_hook.rb +28 -17
  137. data/lib/contrast/agent/deadzone/policy/deadzone_node.rb +11 -6
  138. data/lib/contrast/agent/deadzone/policy/policy.rb +11 -7
  139. data/lib/contrast/agent/disable_reaction.rb +6 -10
  140. data/lib/contrast/agent/excluder.rb +224 -0
  141. data/lib/contrast/agent/exclusion_matcher.rb +40 -74
  142. data/lib/contrast/agent/inventory/database_config.rb +174 -0
  143. data/lib/contrast/agent/inventory/dependencies.rb +52 -0
  144. data/lib/contrast/agent/inventory/dependency_analysis.rb +34 -0
  145. data/lib/contrast/agent/inventory/dependency_usage_analysis.rb +120 -0
  146. data/lib/contrast/agent/inventory/policy/datastores.rb +51 -0
  147. data/lib/contrast/agent/inventory/policy/policy.rb +5 -5
  148. data/lib/contrast/agent/inventory/policy/trigger_node.rb +2 -2
  149. data/lib/contrast/agent/inventory.rb +14 -0
  150. data/lib/contrast/agent/middleware.rb +146 -299
  151. data/lib/contrast/agent/module_data.rb +5 -4
  152. data/lib/contrast/agent/patching/policy/after_load_patch.rb +54 -7
  153. data/lib/contrast/agent/patching/policy/after_load_patcher.rb +103 -27
  154. data/lib/contrast/agent/patching/policy/method_policy.rb +53 -64
  155. data/lib/contrast/agent/patching/policy/method_policy_extend.rb +113 -0
  156. data/lib/contrast/agent/patching/policy/module_policy.rb +27 -47
  157. data/lib/contrast/agent/patching/policy/patch.rb +147 -241
  158. data/lib/contrast/agent/patching/policy/patch_status.rb +21 -45
  159. data/lib/contrast/agent/patching/policy/patcher.rb +126 -161
  160. data/lib/contrast/agent/patching/policy/policy.rb +66 -57
  161. data/lib/contrast/agent/patching/policy/policy_node.rb +63 -32
  162. data/lib/contrast/agent/patching/policy/trigger_node.rb +32 -15
  163. data/lib/contrast/agent/protect/exploitable_collection.rb +38 -0
  164. data/lib/contrast/agent/protect/input_analyzer/input_analyzer.rb +170 -0
  165. data/lib/contrast/agent/protect/input_analyzer/worth_watching_analyzer.rb +116 -0
  166. data/lib/contrast/agent/protect/policy/applies_command_injection_rule.rb +65 -0
  167. data/lib/contrast/agent/protect/policy/applies_deserialization_rule.rb +97 -0
  168. data/lib/contrast/agent/protect/policy/applies_no_sqli_rule.rb +69 -0
  169. data/lib/contrast/agent/protect/policy/applies_path_traversal_rule.rb +138 -0
  170. data/lib/contrast/agent/protect/policy/applies_sqli_rule.rb +55 -0
  171. data/lib/contrast/agent/protect/policy/applies_xxe_rule.rb +125 -0
  172. data/lib/contrast/agent/protect/policy/policy.rb +10 -10
  173. data/lib/contrast/agent/protect/policy/rule_applicator.rb +102 -0
  174. data/lib/contrast/agent/protect/policy/trigger_node.rb +2 -2
  175. data/lib/contrast/agent/protect/rule/base.rb +205 -95
  176. data/lib/contrast/agent/protect/rule/base_service.rb +73 -14
  177. data/lib/contrast/agent/protect/rule/bot_blocker/bot_blocker_input_classification.rb +98 -0
  178. data/lib/contrast/agent/protect/rule/bot_blocker.rb +81 -0
  179. data/lib/contrast/agent/protect/rule/cmd_injection.rb +53 -123
  180. data/lib/contrast/agent/protect/rule/cmdi/cmdi_backdoors.rb +132 -0
  181. data/lib/contrast/agent/protect/rule/cmdi/cmdi_base_rule.rb +169 -0
  182. data/lib/contrast/agent/protect/rule/cmdi/cmdi_chained_command.rb +64 -0
  183. data/lib/contrast/agent/protect/rule/cmdi/cmdi_dangerous_path.rb +63 -0
  184. data/lib/contrast/agent/protect/rule/cmdi/cmdi_input_classification.rb +27 -0
  185. data/lib/contrast/agent/protect/rule/default_scanner.rb +69 -25
  186. data/lib/contrast/agent/protect/rule/deserialization.rb +32 -48
  187. data/lib/contrast/agent/protect/rule/http_method_tampering/http_method_tampering_input_classification.rb +96 -0
  188. data/lib/contrast/agent/protect/rule/http_method_tampering.rb +65 -62
  189. data/lib/contrast/agent/protect/rule/no_sqli/mongo_no_sql_scanner.rb +2 -3
  190. data/lib/contrast/agent/protect/rule/no_sqli/no_sqli_input_classification.rb +226 -0
  191. data/lib/contrast/agent/protect/rule/no_sqli.rb +47 -53
  192. data/lib/contrast/agent/protect/rule/path_traversal/path_traversal_input_classification.rb +61 -0
  193. data/lib/contrast/agent/protect/rule/path_traversal/path_traversal_semantic_security_bypass.rb +114 -0
  194. data/lib/contrast/agent/protect/rule/path_traversal.rb +57 -26
  195. data/lib/contrast/agent/protect/rule/sql_sample_builder.rb +155 -0
  196. data/lib/contrast/agent/protect/rule/sqli/default_sql_scanner.rb +1 -1
  197. data/lib/contrast/agent/protect/rule/sqli/mysql_sql_scanner.rb +1 -1
  198. data/lib/contrast/agent/protect/rule/sqli/postgres_sql_scanner.rb +2 -2
  199. data/lib/contrast/agent/protect/rule/sqli/sqli_base_rule.rb +37 -0
  200. data/lib/contrast/agent/protect/rule/sqli/sqli_input_classification.rb +28 -0
  201. data/lib/contrast/agent/protect/rule/sqli/sqli_semantic/sqli_dangerous_functions.rb +67 -0
  202. data/lib/contrast/agent/protect/rule/sqli/sqlite_sql_scanner.rb +1 -1
  203. data/lib/contrast/agent/protect/rule/sqli.rb +78 -62
  204. data/lib/contrast/agent/protect/rule/unsafe_file_upload/unsafe_file_upload_input_classification.rb +58 -0
  205. data/lib/contrast/agent/protect/rule/unsafe_file_upload.rb +19 -2
  206. data/lib/contrast/agent/protect/rule/xss/reflected_xss_input_classification.rb +58 -0
  207. data/lib/contrast/agent/protect/rule/xss.rb +20 -2
  208. data/lib/contrast/agent/protect/rule/xxe/entity_wrapper.rb +25 -21
  209. data/lib/contrast/agent/protect/rule/xxe.rb +69 -39
  210. data/lib/contrast/agent/protect/rule.rb +22 -25
  211. data/lib/contrast/agent/reporting/attack_result/attack_result.rb +71 -0
  212. data/lib/contrast/agent/reporting/attack_result/rasp_rule_sample.rb +86 -0
  213. data/lib/contrast/agent/reporting/attack_result/response_type.rb +29 -0
  214. data/lib/contrast/agent/reporting/attack_result/user_input.rb +98 -0
  215. data/lib/contrast/agent/reporting/details/bot_blocker_details.rb +29 -0
  216. data/lib/contrast/agent/reporting/details/cmd_injection_details.rb +30 -0
  217. data/lib/contrast/agent/reporting/details/details.rb +18 -0
  218. data/lib/contrast/agent/reporting/details/http_method_tempering_details.rb +27 -0
  219. data/lib/contrast/agent/reporting/details/ip_denylist_details.rb +35 -0
  220. data/lib/contrast/agent/reporting/details/no_sqli_details.rb +36 -0
  221. data/lib/contrast/agent/reporting/details/path_traversal_details.rb +24 -0
  222. data/lib/contrast/agent/reporting/details/path_traversal_semantic_analysis_details.rb +32 -0
  223. data/lib/contrast/agent/reporting/details/protect_rule_details.rb +17 -0
  224. data/lib/contrast/agent/reporting/details/sqli_dangerous_functions.rb +22 -0
  225. data/lib/contrast/agent/reporting/details/sqli_details.rb +36 -0
  226. data/lib/contrast/agent/reporting/details/untrusted_deserialization_details.rb +27 -0
  227. data/lib/contrast/agent/reporting/details/virtual_patch_details.rb +30 -0
  228. data/lib/contrast/agent/reporting/details/xss_details.rb +33 -0
  229. data/lib/contrast/agent/reporting/details/xss_match.rb +30 -0
  230. data/lib/contrast/agent/reporting/details/xxe_details.rb +36 -0
  231. data/lib/contrast/agent/reporting/details/xxe_match.rb +25 -0
  232. data/lib/contrast/agent/reporting/details/xxe_wrapper.rb +25 -0
  233. data/lib/contrast/agent/reporting/input_analysis/details/bot_blocker_details.rb +27 -0
  234. data/lib/contrast/agent/reporting/input_analysis/details/protect_rule_details.rb +15 -0
  235. data/lib/contrast/agent/reporting/input_analysis/input_analysis.rb +43 -0
  236. data/lib/contrast/agent/reporting/input_analysis/input_analysis_result.rb +129 -0
  237. data/lib/contrast/agent/reporting/input_analysis/input_type.rb +44 -0
  238. data/lib/contrast/agent/reporting/input_analysis/score_level.rb +21 -0
  239. data/lib/contrast/agent/reporting/masker/masker.rb +258 -0
  240. data/lib/contrast/agent/reporting/masker/masker_utils.rb +33 -0
  241. data/lib/contrast/agent/reporting/report.rb +31 -0
  242. data/lib/contrast/agent/reporting/reporter.rb +165 -0
  243. data/lib/contrast/agent/reporting/reporter_heartbeat.rb +47 -0
  244. data/lib/contrast/agent/reporting/reporting_events/agent_startup.rb +34 -0
  245. data/lib/contrast/agent/reporting/reporting_events/application_activity.rb +120 -0
  246. data/lib/contrast/agent/reporting/reporting_events/application_defend_activity.rb +85 -0
  247. data/lib/contrast/agent/reporting/reporting_events/application_defend_attack_activity.rb +65 -0
  248. data/lib/contrast/agent/reporting/reporting_events/application_defend_attack_sample.rb +102 -0
  249. data/lib/contrast/agent/reporting/reporting_events/application_defend_attack_sample_activity.rb +68 -0
  250. data/lib/contrast/agent/reporting/reporting_events/application_defend_attack_sample_stack.rb +22 -0
  251. data/lib/contrast/agent/reporting/reporting_events/application_defend_attacker_activity.rb +62 -0
  252. data/lib/contrast/agent/reporting/reporting_events/application_inventory.rb +42 -0
  253. data/lib/contrast/agent/reporting/reporting_events/application_inventory_activity.rb +57 -0
  254. data/lib/contrast/agent/reporting/reporting_events/application_reporting_event.rb +27 -0
  255. data/lib/contrast/agent/reporting/reporting_events/application_startup.rb +44 -0
  256. data/lib/contrast/agent/reporting/reporting_events/application_startup_instrumentation.rb +27 -0
  257. data/lib/contrast/agent/reporting/reporting_events/application_update.rb +56 -0
  258. data/lib/contrast/agent/reporting/reporting_events/architecture_component.rb +72 -0
  259. data/lib/contrast/agent/reporting/reporting_events/discovered_route.rb +126 -0
  260. data/lib/contrast/agent/reporting/reporting_events/finding.rb +210 -0
  261. data/lib/contrast/agent/reporting/reporting_events/finding_event.rb +449 -0
  262. data/lib/contrast/agent/reporting/reporting_events/finding_event_object.rb +104 -0
  263. data/lib/contrast/agent/reporting/reporting_events/finding_event_parent_object.rb +49 -0
  264. data/lib/contrast/agent/reporting/reporting_events/finding_event_property.rb +51 -0
  265. data/lib/contrast/agent/reporting/reporting_events/finding_event_signature.rb +106 -0
  266. data/lib/contrast/agent/reporting/reporting_events/finding_event_source.rb +74 -0
  267. data/lib/contrast/agent/reporting/reporting_events/finding_event_stack.rb +68 -0
  268. data/lib/contrast/agent/reporting/reporting_events/finding_event_taint_range.rb +71 -0
  269. data/lib/contrast/agent/reporting/reporting_events/finding_event_taint_range_tags.rb +105 -0
  270. data/lib/contrast/agent/reporting/reporting_events/finding_request.rb +134 -0
  271. data/lib/contrast/agent/reporting/reporting_events/library_discovery.rb +89 -0
  272. data/lib/contrast/agent/reporting/reporting_events/library_usage_observation.rb +48 -0
  273. data/lib/contrast/agent/reporting/reporting_events/observed_library_usage.rb +45 -0
  274. data/lib/contrast/agent/reporting/reporting_events/observed_route.rb +89 -0
  275. data/lib/contrast/agent/reporting/reporting_events/poll.rb +23 -0
  276. data/lib/contrast/agent/reporting/reporting_events/preflight.rb +41 -0
  277. data/lib/contrast/agent/reporting/reporting_events/preflight_message.rb +74 -0
  278. data/lib/contrast/agent/reporting/reporting_events/reporting_event.rb +66 -0
  279. data/lib/contrast/agent/reporting/reporting_events/route_coverage.rb +89 -0
  280. data/lib/contrast/agent/reporting/reporting_events/route_discovery.rb +63 -0
  281. data/lib/contrast/agent/reporting/reporting_events/route_discovery_observation.rb +53 -0
  282. data/lib/contrast/agent/reporting/reporting_events/server_reporting_event.rb +35 -0
  283. data/lib/contrast/agent/reporting/reporting_events/server_settings.rb +40 -0
  284. data/lib/contrast/agent/reporting/reporting_utilities/audit.rb +130 -0
  285. data/lib/contrast/agent/reporting/reporting_utilities/build_preflight.rb +35 -0
  286. data/lib/contrast/agent/reporting/reporting_utilities/endpoints.rb +176 -0
  287. data/lib/contrast/agent/reporting/reporting_utilities/headers.rb +54 -0
  288. data/lib/contrast/agent/reporting/reporting_utilities/reporter_client.rb +143 -0
  289. data/lib/contrast/agent/reporting/reporting_utilities/reporter_client_utils.rb +144 -0
  290. data/lib/contrast/agent/reporting/reporting_utilities/reporting_storage.rb +66 -0
  291. data/lib/contrast/agent/reporting/reporting_utilities/response.rb +98 -0
  292. data/lib/contrast/agent/reporting/reporting_utilities/response_extractor.rb +176 -0
  293. data/lib/contrast/agent/reporting/reporting_utilities/response_handler.rb +117 -0
  294. data/lib/contrast/agent/reporting/reporting_utilities/response_handler_mode.rb +63 -0
  295. data/lib/contrast/agent/reporting/reporting_utilities/response_handler_utils.rb +342 -0
  296. data/lib/contrast/agent/reporting/server_settings_worker.rb +44 -0
  297. data/lib/contrast/agent/reporting/settings/application_settings.rb +61 -0
  298. data/lib/contrast/agent/reporting/settings/assess.rb +45 -0
  299. data/lib/contrast/agent/reporting/settings/assess_server_feature.rb +114 -0
  300. data/lib/contrast/agent/reporting/settings/bot_blocker.rb +68 -0
  301. data/lib/contrast/agent/reporting/settings/code_exclusion.rb +32 -0
  302. data/lib/contrast/agent/reporting/settings/exclusion_base.rb +51 -0
  303. data/lib/contrast/agent/reporting/settings/exclusions.rb +106 -0
  304. data/lib/contrast/agent/reporting/settings/helpers.rb +63 -0
  305. data/lib/contrast/agent/reporting/settings/input_exclusion.rb +43 -0
  306. data/lib/contrast/agent/reporting/settings/ip_filter.rb +35 -0
  307. data/lib/contrast/agent/reporting/settings/keyword.rb +74 -0
  308. data/lib/contrast/agent/reporting/settings/log_enhancer.rb +65 -0
  309. data/lib/contrast/agent/reporting/settings/protect.rb +106 -0
  310. data/lib/contrast/agent/reporting/settings/protect_server_feature.rb +227 -0
  311. data/lib/contrast/agent/reporting/settings/reaction.rb +39 -0
  312. data/lib/contrast/agent/reporting/settings/rule_definition.rb +66 -0
  313. data/lib/contrast/agent/reporting/settings/sampling.rb +46 -0
  314. data/lib/contrast/agent/reporting/settings/sanitizer.rb +38 -0
  315. data/lib/contrast/agent/reporting/settings/security_logger.rb +77 -0
  316. data/lib/contrast/agent/reporting/settings/sensitive_data_masking.rb +118 -0
  317. data/lib/contrast/agent/reporting/settings/sensitive_data_masking_rule.rb +65 -0
  318. data/lib/contrast/agent/reporting/settings/server_features.rb +95 -0
  319. data/lib/contrast/agent/reporting/settings/syslog.rb +205 -0
  320. data/lib/contrast/agent/reporting/settings/url_exclusion.rb +42 -0
  321. data/lib/contrast/agent/reporting/settings/validator.rb +17 -0
  322. data/lib/contrast/agent/request.rb +107 -411
  323. data/lib/contrast/agent/request_context.rb +78 -162
  324. data/lib/contrast/agent/request_context_extend.rb +85 -0
  325. data/lib/contrast/agent/request_handler.rb +41 -0
  326. data/lib/contrast/agent/response.rb +37 -165
  327. data/lib/contrast/agent/rule_set.rb +52 -0
  328. data/lib/contrast/agent/scope.rb +142 -20
  329. data/lib/contrast/agent/static_analysis.rb +51 -0
  330. data/lib/contrast/agent/telemetry/base.rb +155 -0
  331. data/lib/contrast/agent/telemetry/events/event.rb +35 -0
  332. data/lib/contrast/agent/telemetry/events/exceptions/obfuscate.rb +119 -0
  333. data/lib/contrast/agent/telemetry/events/exceptions/telemetry_exception_base.rb +61 -0
  334. data/lib/contrast/agent/telemetry/events/exceptions/telemetry_exception_event.rb +46 -0
  335. data/lib/contrast/agent/telemetry/events/exceptions/telemetry_exception_message.rb +118 -0
  336. data/lib/contrast/agent/telemetry/events/exceptions/telemetry_exception_message_exception.rb +86 -0
  337. data/lib/contrast/agent/telemetry/events/exceptions/telemetry_exception_stack_frame.rb +67 -0
  338. data/lib/contrast/agent/telemetry/events/exceptions/telemetry_exceptions.rb +19 -0
  339. data/lib/contrast/agent/telemetry/events/metric_event.rb +28 -0
  340. data/lib/contrast/agent/telemetry/events/startup_metrics_event.rb +123 -0
  341. data/lib/contrast/agent/thread.rb +4 -6
  342. data/lib/contrast/agent/thread_watcher.rb +117 -0
  343. data/lib/contrast/agent/tracepoint_hook.rb +19 -13
  344. data/lib/contrast/agent/version.rb +2 -2
  345. data/lib/contrast/agent/worker_thread.rb +42 -0
  346. data/lib/contrast/agent.rb +83 -50
  347. data/lib/contrast/agent_lib/api/command_injection.rb +46 -0
  348. data/lib/contrast/agent_lib/api/init.rb +101 -0
  349. data/lib/contrast/agent_lib/api/input_tracing.rb +267 -0
  350. data/lib/contrast/agent_lib/api/method_tempering.rb +29 -0
  351. data/lib/contrast/agent_lib/api/panic.rb +87 -0
  352. data/lib/contrast/agent_lib/api/path_semantic_file_security_bypass.rb +40 -0
  353. data/lib/contrast/agent_lib/interface.rb +260 -0
  354. data/lib/contrast/agent_lib/interface_base.rb +118 -0
  355. data/lib/contrast/agent_lib/return_types/eval_result.rb +44 -0
  356. data/lib/contrast/agent_lib/test.rb +29 -0
  357. data/lib/contrast/api/communication/connection_status.rb +59 -0
  358. data/lib/contrast/components/agent.rb +108 -36
  359. data/lib/contrast/components/api.rb +159 -0
  360. data/lib/contrast/components/app_context.rb +124 -134
  361. data/lib/contrast/components/app_context_extend.rb +53 -0
  362. data/lib/contrast/components/assess.rb +187 -24
  363. data/lib/contrast/components/assess_rules.rb +54 -0
  364. data/lib/contrast/components/base.rb +103 -0
  365. data/lib/contrast/components/config/sources.rb +95 -0
  366. data/lib/contrast/components/config.rb +182 -60
  367. data/lib/contrast/components/heap_dump.rb +77 -12
  368. data/lib/contrast/components/inventory.rb +37 -10
  369. data/lib/contrast/components/logger.rb +46 -76
  370. data/lib/contrast/components/polling.rb +36 -0
  371. data/lib/contrast/components/protect.rb +142 -16
  372. data/lib/contrast/components/ruby_component.rb +96 -0
  373. data/lib/contrast/components/sampling.rb +156 -15
  374. data/lib/contrast/components/scope.rb +116 -85
  375. data/lib/contrast/components/security_logger.rb +36 -0
  376. data/lib/contrast/components/settings.rb +197 -90
  377. data/lib/contrast/config/api_proxy_configuration.rb +27 -0
  378. data/lib/contrast/config/base_configuration.rb +20 -94
  379. data/lib/contrast/config/certification_configuration.rb +47 -0
  380. data/lib/contrast/config/config.rb +46 -0
  381. data/lib/contrast/config/diagnostics.rb +114 -0
  382. data/lib/contrast/config/diagnostics_tools.rb +98 -0
  383. data/lib/contrast/config/effective_config.rb +65 -0
  384. data/lib/contrast/config/effective_config_value.rb +32 -0
  385. data/lib/contrast/config/env_variables.rb +18 -0
  386. data/lib/contrast/config/exception_configuration.rb +34 -12
  387. data/lib/contrast/config/protect_rule_configuration.rb +45 -24
  388. data/lib/contrast/config/protect_rules_configuration.rb +97 -22
  389. data/lib/contrast/config/request_audit_configuration.rb +57 -0
  390. data/lib/contrast/config/server_configuration.rb +67 -15
  391. data/lib/contrast/config.rb +6 -22
  392. data/lib/contrast/configuration.rb +231 -108
  393. data/lib/contrast/extension/assess/array.rb +75 -0
  394. data/lib/contrast/extension/assess/erb.rb +61 -0
  395. data/lib/contrast/extension/assess/eval_trigger.rb +47 -0
  396. data/lib/contrast/{core_extensions → extension}/assess/exec_trigger.rb +9 -21
  397. data/lib/contrast/extension/assess/fiber.rb +95 -0
  398. data/lib/contrast/extension/assess/hash.rb +33 -0
  399. data/lib/contrast/extension/assess/kernel.rb +124 -0
  400. data/lib/contrast/extension/assess/marshal.rb +80 -0
  401. data/lib/contrast/extension/assess/regexp.rb +71 -0
  402. data/lib/contrast/extension/assess/string.rb +84 -0
  403. data/lib/contrast/extension/assess.rb +47 -0
  404. data/lib/contrast/{core_extensions → extension}/delegator.rb +3 -1
  405. data/lib/contrast/extension/extension.rb +59 -0
  406. data/lib/contrast/extension/inventory.rb +21 -0
  407. data/lib/contrast/extension/module.rb +16 -0
  408. data/lib/contrast/extension/object.rb +19 -0
  409. data/lib/contrast/extension/protect/psych.rb +7 -0
  410. data/lib/contrast/{core_extensions → extension}/protect.rb +6 -6
  411. data/lib/contrast/extension/thread.rb +50 -0
  412. data/lib/contrast/framework/base_support.rb +78 -0
  413. data/lib/contrast/framework/grape/support.rb +176 -0
  414. data/lib/contrast/framework/manager.rb +158 -0
  415. data/lib/contrast/framework/manager_extend.rb +50 -0
  416. data/lib/contrast/framework/rack/patch/session_cookie.rb +107 -0
  417. data/lib/contrast/framework/rack/patch/support.rb +26 -0
  418. data/lib/contrast/framework/rack/support.rb +23 -0
  419. data/lib/contrast/framework/rails/patch/action_controller_live_buffer.rb +46 -0
  420. data/lib/contrast/framework/rails/patch/assess_configuration.rb +98 -0
  421. data/lib/contrast/framework/rails/patch/rails_application_configuration.rb +31 -0
  422. data/lib/contrast/framework/rails/patch/support.rb +46 -0
  423. data/lib/contrast/framework/rails/railtie.rb +33 -0
  424. data/lib/contrast/framework/rails/support.rb +187 -0
  425. data/lib/contrast/framework/sinatra/support.rb +165 -0
  426. data/lib/contrast/funchook/funchook.rb +45 -0
  427. data/lib/contrast/logger/aliased_logging.rb +101 -0
  428. data/lib/contrast/logger/application.rb +84 -0
  429. data/lib/contrast/logger/cef_log.rb +169 -0
  430. data/lib/contrast/logger/format.rb +61 -0
  431. data/lib/contrast/logger/log.rb +90 -0
  432. data/lib/contrast/logger/request.rb +25 -0
  433. data/lib/contrast/logger/time.rb +57 -0
  434. data/lib/contrast/security_exception.rb +2 -2
  435. data/lib/contrast/tasks/config.rb +144 -0
  436. data/lib/contrast/utils/assess/event_limit_utils.rb +134 -0
  437. data/lib/contrast/utils/assess/object_store.rb +36 -0
  438. data/lib/contrast/utils/assess/propagation_method_utils.rb +155 -0
  439. data/lib/contrast/utils/assess/property/tagged_utils.rb +165 -0
  440. data/lib/contrast/utils/assess/sampling_util.rb +11 -17
  441. data/lib/contrast/utils/assess/source_method_utils.rb +74 -0
  442. data/lib/contrast/utils/assess/split_utils.rb +23 -0
  443. data/lib/contrast/utils/assess/tracking_util.rb +95 -19
  444. data/lib/contrast/utils/assess/trigger_method_utils.rb +132 -0
  445. data/lib/contrast/utils/class_util.rb +125 -38
  446. data/lib/contrast/utils/duck_utils.rb +54 -43
  447. data/lib/contrast/utils/env_configuration_item.rb +4 -3
  448. data/lib/contrast/utils/findings.rb +66 -0
  449. data/lib/contrast/utils/hash_digest.rb +52 -100
  450. data/lib/contrast/utils/hash_digest_extend.rb +129 -0
  451. data/lib/contrast/utils/head_dump_utils_extend.rb +74 -0
  452. data/lib/contrast/utils/heap_dump_util.rb +44 -88
  453. data/lib/contrast/utils/input_classification_base.rb +155 -0
  454. data/lib/contrast/utils/invalid_configuration_util.rb +36 -50
  455. data/lib/contrast/utils/io_util.rb +47 -51
  456. data/lib/contrast/utils/job_servers_running.rb +47 -0
  457. data/lib/contrast/utils/log_utils.rb +254 -0
  458. data/lib/contrast/utils/lru_cache.rb +48 -0
  459. data/lib/contrast/utils/metrics_hash.rb +59 -0
  460. data/lib/contrast/utils/middleware_utils.rb +89 -0
  461. data/lib/contrast/utils/net_http_base.rb +167 -0
  462. data/lib/contrast/utils/object_share.rb +7 -48
  463. data/lib/contrast/utils/os.rb +14 -24
  464. data/lib/contrast/utils/patching/policy/patch_utils.rb +175 -0
  465. data/lib/contrast/utils/patching/policy/patcher_utils.rb +54 -0
  466. data/lib/contrast/utils/reporting/application_activity_batch_utils.rb +81 -0
  467. data/lib/contrast/utils/request_utils.rb +96 -0
  468. data/lib/contrast/utils/resource_loader.rb +2 -2
  469. data/lib/contrast/utils/response_utils.rb +79 -0
  470. data/lib/contrast/utils/routes_sent.rb +60 -0
  471. data/lib/contrast/utils/sha256_builder.rb +9 -21
  472. data/lib/contrast/utils/stack_trace_utils.rb +68 -184
  473. data/lib/contrast/utils/string_utils.rb +82 -52
  474. data/lib/contrast/utils/tag_util.rb +58 -44
  475. data/lib/contrast/utils/telemetry.rb +103 -0
  476. data/lib/contrast/utils/telemetry_client.rb +107 -0
  477. data/lib/contrast/utils/telemetry_hash.rb +65 -0
  478. data/lib/contrast/utils/telemetry_identifier.rb +153 -0
  479. data/lib/contrast/utils/thread_tracker.rb +27 -23
  480. data/lib/contrast/utils/timer.rb +20 -55
  481. data/lib/contrast-agent.rb +2 -2
  482. data/lib/contrast.rb +105 -43
  483. data/resources/assess/policy.json +523 -137
  484. data/resources/deadzone/policy.json +280 -10
  485. data/resources/inventory/policy.json +2 -2
  486. data/resources/protect/policy.json +30 -17
  487. data/ruby-agent.gemspec +114 -45
  488. data/sonar-project.properties +9 -0
  489. metadata +694 -287
  490. data/exe/contrast_service +0 -29
  491. data/ext/cs__assess_active_record_named/cs__active_record_named.c +0 -47
  492. data/ext/cs__assess_active_record_named/cs__active_record_named.h +0 -10
  493. data/ext/cs__assess_active_record_named/extconf.rb +0 -2
  494. data/ext/cs__assess_regexp_track/cs__assess_regexp_track.c +0 -63
  495. data/ext/cs__assess_regexp_track/cs__assess_regexp_track.h +0 -29
  496. data/ext/cs__assess_regexp_track/extconf.rb +0 -2
  497. data/ext/cs__assess_string_interpolation26/cs__assess_string_interpolation26.c +0 -31
  498. data/ext/cs__assess_string_interpolation26/cs__assess_string_interpolation26.h +0 -13
  499. data/ext/cs__assess_string_interpolation26/extconf.rb +0 -2
  500. data/ext/cs__protect_kernel/cs__protect_kernel.c +0 -37
  501. data/ext/cs__protect_kernel/cs__protect_kernel.h +0 -11
  502. data/ext/cs__protect_kernel/extconf.rb +0 -2
  503. data/funchook/Makefile +0 -29
  504. data/funchook/autom4te.cache/output.0 +0 -4976
  505. data/funchook/autom4te.cache/requests +0 -78
  506. data/funchook/autom4te.cache/traces.0 +0 -364
  507. data/funchook/config.log +0 -490
  508. data/funchook/config.status +0 -1016
  509. data/funchook/configure +0 -4976
  510. data/funchook/src/Makefile +0 -70
  511. data/funchook/src/config.h +0 -101
  512. data/funchook/src/config.h.in +0 -100
  513. data/funchook/src/decoder.o +0 -0
  514. data/funchook/src/distorm.o +0 -0
  515. data/funchook/src/funchook.o +0 -0
  516. data/funchook/src/funchook_io.o +0 -0
  517. data/funchook/src/funchook_syscall.o +0 -0
  518. data/funchook/src/funchook_unix.o +0 -0
  519. data/funchook/src/funchook_x86.o +0 -0
  520. data/funchook/src/instructions.o +0 -0
  521. data/funchook/src/insts.o +0 -0
  522. data/funchook/src/libfunchook.so +0 -0
  523. data/funchook/src/mnemonics.o +0 -0
  524. data/funchook/src/operands.o +0 -0
  525. data/funchook/src/os_func.o +0 -0
  526. data/funchook/src/os_func_unix.o +0 -0
  527. data/funchook/src/prefix.o +0 -0
  528. data/funchook/src/printf_base.o +0 -0
  529. data/funchook/src/textdefs.o +0 -0
  530. data/funchook/src/wstring.o +0 -0
  531. data/funchook/test/Makefile +0 -43
  532. data/funchook/test/funchook_test +0 -0
  533. data/funchook/test/libfunchook_test.so +0 -0
  534. data/funchook/test/test_main.o +0 -0
  535. data/funchook/test/x86_64_test.o +0 -0
  536. data/lib/contrast/agent/assess/adjusted_span.rb +0 -25
  537. data/lib/contrast/agent/assess/class_reverter.rb +0 -82
  538. data/lib/contrast/agent/assess/contrast_event.rb +0 -398
  539. data/lib/contrast/agent/assess/frozen_properties.rb +0 -41
  540. data/lib/contrast/agent/assess/insulator.rb +0 -53
  541. data/lib/contrast/agent/assess/policy/rewriter_patch.rb +0 -79
  542. data/lib/contrast/agent/assess/rule/base.rb +0 -72
  543. data/lib/contrast/agent/assess/rule/csrf/csrf_action.rb +0 -28
  544. data/lib/contrast/agent/assess/rule/csrf/csrf_applicator.rb +0 -69
  545. data/lib/contrast/agent/assess/rule/csrf/csrf_watcher.rb +0 -132
  546. data/lib/contrast/agent/assess/rule/csrf.rb +0 -66
  547. data/lib/contrast/agent/assess/rule/redos.rb +0 -68
  548. data/lib/contrast/agent/assess/rule/response_scanning_rule.rb +0 -47
  549. data/lib/contrast/agent/assess/rule/response_watcher.rb +0 -36
  550. data/lib/contrast/agent/assess/rule/watcher.rb +0 -36
  551. data/lib/contrast/agent/assess/rule.rb +0 -18
  552. data/lib/contrast/agent/class_reopener.rb +0 -195
  553. data/lib/contrast/agent/feature_state.rb +0 -379
  554. data/lib/contrast/agent/logger_manager.rb +0 -116
  555. data/lib/contrast/agent/patching/policy/policy_unpatcher.rb +0 -28
  556. data/lib/contrast/agent/protect/rule/csrf/csrf_evaluator.rb +0 -103
  557. data/lib/contrast/agent/protect/rule/csrf/csrf_token_injector.rb +0 -85
  558. data/lib/contrast/agent/protect/rule/csrf.rb +0 -118
  559. data/lib/contrast/agent/railtie.rb +0 -30
  560. data/lib/contrast/agent/reaction_processor.rb +0 -47
  561. data/lib/contrast/agent/require_state.rb +0 -61
  562. data/lib/contrast/agent/rewriter.rb +0 -244
  563. data/lib/contrast/agent/service_heartbeat.rb +0 -37
  564. data/lib/contrast/agent/settings_state.rb +0 -148
  565. data/lib/contrast/agent/socket_client.rb +0 -125
  566. data/lib/contrast/api/connection_status.rb +0 -49
  567. data/lib/contrast/api/dtm_pb.rb +0 -718
  568. data/lib/contrast/api/settings_pb.rb +0 -416
  569. data/lib/contrast/api/socket.rb +0 -43
  570. data/lib/contrast/api/speedracer.rb +0 -206
  571. data/lib/contrast/api/tcp_socket.rb +0 -31
  572. data/lib/contrast/api/unix_socket.rb +0 -25
  573. data/lib/contrast/api.rb +0 -17
  574. data/lib/contrast/common_agent_configuration.rb +0 -86
  575. data/lib/contrast/components/contrast_service.rb +0 -113
  576. data/lib/contrast/components/interface.rb +0 -178
  577. data/lib/contrast/config/agent_configuration.rb +0 -24
  578. data/lib/contrast/config/application_configuration.rb +0 -27
  579. data/lib/contrast/config/assess_configuration.rb +0 -22
  580. data/lib/contrast/config/assess_rules_configuration.rb +0 -18
  581. data/lib/contrast/config/default_value.rb +0 -16
  582. data/lib/contrast/config/heap_dump_configuration.rb +0 -23
  583. data/lib/contrast/config/inventory_configuration.rb +0 -20
  584. data/lib/contrast/config/logger_configuration.rb +0 -20
  585. data/lib/contrast/config/protect_configuration.rb +0 -20
  586. data/lib/contrast/config/root_configuration.rb +0 -26
  587. data/lib/contrast/config/ruby_configuration.rb +0 -39
  588. data/lib/contrast/config/sampling_configuration.rb +0 -22
  589. data/lib/contrast/config/service_configuration.rb +0 -22
  590. data/lib/contrast/core_extensions/assess/array.rb +0 -58
  591. data/lib/contrast/core_extensions/assess/assess_extension.rb +0 -145
  592. data/lib/contrast/core_extensions/assess/basic_object.rb +0 -15
  593. data/lib/contrast/core_extensions/assess/erb.rb +0 -42
  594. data/lib/contrast/core_extensions/assess/fiber.rb +0 -125
  595. data/lib/contrast/core_extensions/assess/hash.rb +0 -22
  596. data/lib/contrast/core_extensions/assess/kernel.rb +0 -95
  597. data/lib/contrast/core_extensions/assess/module.rb +0 -14
  598. data/lib/contrast/core_extensions/assess/regexp.rb +0 -206
  599. data/lib/contrast/core_extensions/assess/string.rb +0 -75
  600. data/lib/contrast/core_extensions/assess/tilt_template_trigger.rb +0 -73
  601. data/lib/contrast/core_extensions/assess.rb +0 -51
  602. data/lib/contrast/core_extensions/eval_trigger.rb +0 -52
  603. data/lib/contrast/core_extensions/inventory/datastores.rb +0 -37
  604. data/lib/contrast/core_extensions/inventory.rb +0 -22
  605. data/lib/contrast/core_extensions/module.rb +0 -42
  606. data/lib/contrast/core_extensions/object.rb +0 -27
  607. data/lib/contrast/core_extensions/protect/applies_command_injection_rule.rb +0 -70
  608. data/lib/contrast/core_extensions/protect/applies_deserialization_rule.rb +0 -58
  609. data/lib/contrast/core_extensions/protect/applies_no_sqli_rule.rb +0 -81
  610. data/lib/contrast/core_extensions/protect/applies_path_traversal_rule.rb +0 -119
  611. data/lib/contrast/core_extensions/protect/applies_sqli_rule.rb +0 -63
  612. data/lib/contrast/core_extensions/protect/applies_xxe_rule.rb +0 -141
  613. data/lib/contrast/core_extensions/protect/kernel.rb +0 -30
  614. data/lib/contrast/core_extensions/protect/psych.rb +0 -7
  615. data/lib/contrast/core_extensions/thread.rb +0 -31
  616. data/lib/contrast/internal_exception.rb +0 -8
  617. data/lib/contrast/rails_extensions/assess/action_controller_inheritance.rb +0 -48
  618. data/lib/contrast/rails_extensions/assess/active_record.rb +0 -32
  619. data/lib/contrast/rails_extensions/assess/active_record_named.rb +0 -61
  620. data/lib/contrast/rails_extensions/assess/configuration.rb +0 -26
  621. data/lib/contrast/rails_extensions/buffer.rb +0 -30
  622. data/lib/contrast/rails_extensions/rack.rb +0 -45
  623. data/lib/contrast/sinatra_extensions/assess/cookie.rb +0 -26
  624. data/lib/contrast/sinatra_extensions/inventory/sinatra_base.rb +0 -59
  625. data/lib/contrast/tasks/service.rb +0 -95
  626. data/lib/contrast/utils/boolean_util.rb +0 -33
  627. data/lib/contrast/utils/cache.rb +0 -69
  628. data/lib/contrast/utils/comment_range.rb +0 -19
  629. data/lib/contrast/utils/data_store_util.rb +0 -23
  630. data/lib/contrast/utils/environment_util.rb +0 -152
  631. data/lib/contrast/utils/freeze_util.rb +0 -36
  632. data/lib/contrast/utils/gemfile_reader.rb +0 -191
  633. data/lib/contrast/utils/inventory_util.rb +0 -126
  634. data/lib/contrast/utils/operating_environment.rb +0 -38
  635. data/lib/contrast/utils/path_util.rb +0 -151
  636. data/lib/contrast/utils/performs_logging.rb +0 -152
  637. data/lib/contrast/utils/preflight_util.rb +0 -13
  638. data/lib/contrast/utils/prevent_serialization.rb +0 -52
  639. data/lib/contrast/utils/rack_assess_session_cookie.rb +0 -104
  640. data/lib/contrast/utils/rails_assess_configuration.rb +0 -95
  641. data/lib/contrast/utils/random_util.rb +0 -22
  642. data/lib/contrast/utils/ruby_ast_rewriter.rb +0 -74
  643. data/lib/contrast/utils/scope_util.rb +0 -99
  644. data/lib/contrast/utils/service_response_util.rb +0 -116
  645. data/lib/contrast/utils/service_sender_util.rb +0 -98
  646. data/lib/contrast/utils/sinatra_helper.rb +0 -49
  647. data/resources/csrf/inject.js +0 -44
  648. data/resources/factory-bot-spec/spec_helper.rb +0 -30
  649. data/resources/rubocops/kernel/catch_cop.rb +0 -37
  650. data/resources/rubocops/kernel/require_cop.rb +0 -37
  651. data/resources/rubocops/kernel/require_relative_cop.rb +0 -33
  652. data/resources/rubocops/module/autoload_cop.rb +0 -37
  653. data/resources/rubocops/module/const_defined_cop.rb +0 -37
  654. data/resources/rubocops/module/const_get_cop.rb +0 -37
  655. data/resources/rubocops/module/const_set_cop.rb +0 -37
  656. data/resources/rubocops/module/constants_cop.rb +0 -37
  657. data/resources/rubocops/module/name_cop.rb +0 -37
  658. data/resources/rubocops/object/class_cop.rb +0 -37
  659. data/resources/rubocops/object/freeze_cop.rb +0 -37
  660. data/resources/rubocops/object/frozen_cop.rb +0 -37
  661. data/resources/rubocops/object/is_a_cop.rb +0 -37
  662. data/resources/rubocops/object/method_cop.rb +0 -37
  663. data/resources/rubocops/object/respond_to_cop.rb +0 -37
  664. data/resources/rubocops/object/singleton_class_cop.rb +0 -37
  665. data/resources/rubocops/regexp/spelling_cop.rb +0 -44
  666. data/resources/rubocops/thread/new_cop.rb +0 -39
  667. data/resources/ruby-spec/ancestors_spec.rb +0 -70
  668. data/resources/ruby-spec/modulo_spec.rb +0 -831
  669. data/resources/ruby-spec/parameters_spec.rb +0 -261
  670. data/resources/ruby-spec/ruby_spec_spec_helper.rb +0 -35
  671. data/service_executables/.gitkeep +0 -0
  672. data/service_executables/VERSION +0 -1
  673. data/service_executables/linux/contrast-service +0 -0
  674. data/service_executables/mac/contrast-service +0 -0
  675. data/shared_libraries/funchook.h +0 -123
  676. data/shared_libraries/libfunchook.so +0 -0
@@ -1,19 +1,33 @@
1
- # Copyright (c) 2020 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
1
+ # Copyright (c) 2022 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
2
2
  # frozen_string_literal: true
3
3
 
4
- # This could be useful for making patterns maybe?
5
- # https://github.com/cr0hn/nosqlinjection_wordlists
6
- # https://www.owasp.org/index.php/Testing_for_NoSQL_injection
4
+ require 'contrast/agent/protect/rule/base_service'
5
+ require 'contrast/agent/protect/rule/sql_sample_builder'
6
+ require 'contrast/agent/reporting/input_analysis/input_type'
7
+
7
8
  module Contrast
8
9
  module Agent
9
10
  module Protect
10
11
  module Rule
11
12
  # The Ruby implementation of the Protect NoSQL Injection rule.
12
13
  class NoSqli < Contrast::Agent::Protect::Rule::BaseService
14
+ # Generate a sample for the No-SQL injection detection rule, allowing for reporting to and rendering
15
+ # by TeamServer
16
+ include SqlSampleBuilder::NoSqliSample
17
+ # Defining build_attack_with_match method
18
+ include SqlSampleBuilder::AttackBuilder
19
+ include Contrast::Agent::Reporting::InputType
20
+
13
21
  NAME = 'nosql-injection'
14
22
  BLOCK_MESSAGE = 'NoSQLi rule triggered. Response blocked.'
15
-
16
- def name
23
+ APPLICABLE_USER_INPUTS = [
24
+ BODY, COOKIE_NAME, COOKIE_VALUE, HEADER,
25
+ PARAMETER_NAME, PARAMETER_VALUE, JSON_VALUE,
26
+ MULTIPART_VALUE, MULTIPART_FIELD_NAME,
27
+ XML_VALUE, DWR_VALUE
28
+ ].cs__freeze
29
+
30
+ def rule_name
17
31
  NAME
18
32
  end
19
33
 
@@ -21,45 +35,43 @@ module Contrast
21
35
  BLOCK_MESSAGE
22
36
  end
23
37
 
38
+ def applicable_user_inputs
39
+ APPLICABLE_USER_INPUTS
40
+ end
41
+
42
+ # @raise [Contrast::SecurityException] if the attack is blocked
43
+ # raised with BLOCK_MESSAGE
24
44
  def infilter context, database, query_string
25
- return nil unless infilter?(context)
45
+ return unless infilter?(context)
26
46
 
27
47
  result = find_attacker(context, query_string, database: database)
28
- return nil unless result
48
+ return unless result
29
49
 
30
50
  append_to_activity(context, result)
31
51
 
32
- raise Contrast::SecurityException.new(self, BLOCK_MESSAGE) if blocked?
52
+ cef_logging(result, :successful_attack)
53
+ raise(Contrast::SecurityException.new(self, BLOCK_MESSAGE)) if blocked?
33
54
  end
34
55
 
35
- def build_attack_with_match context, input_analysis_result, result, query_string, **kwargs
56
+ def build_attack_with_match context, input_analysis_result, result, candidate_string, **kwargs
36
57
  return result if mode == :NO_ACTION || mode == :PERMIT
37
58
 
38
- attack_string = input_analysis_result.value
39
- regexp = Regexp.new(Regexp.escape(attack_string), Regexp::IGNORECASE)
40
- return nil unless query_string.match?(regexp)
41
-
42
- scanner = select_scanner
43
- ss = StringScanner.new(query_string)
44
- length = attack_string.length
45
- while ss.scan_until(regexp)
46
- # the pos of StringScanner is at the end of the regexp (input string),
47
- # we need the beginning
48
- idx = ss.pos - attack_string.length
49
- last_boundary, boundary = scanner.crosses_boundary(query_string, idx, input_analysis_result.value)
50
- next unless last_boundary && boundary
51
-
52
- kwargs[:start_idx] = idx
53
- kwargs[:end_idx] = idx + length
54
- kwargs[:boundary_overrun_idx] = boundary
55
- kwargs[:input_boundary_idx] = last_boundary
56
-
57
- result ||= build_attack_result(context)
58
- update_successful_attack_response(context, input_analysis_result, result, query_string)
59
- append_sample(context, input_analysis_result, result, query_string, **kwargs)
59
+ result ||= build_attack_result(context)
60
+ update_successful_attack_response(context, input_analysis_result, result, candidate_string)
61
+ append_sample(context, input_analysis_result, result, candidate_string, **kwargs)
62
+ result
63
+ end
64
+
65
+ # @param context [Contrast::Agent::RequestContext]
66
+ def infilter? context
67
+ return false unless enabled?
68
+ return false unless context&.agent_input_analysis&.results&.any? do |result|
69
+ result.rule_id == rule_name
60
70
  end
61
71
 
62
- result
72
+ return false if protect_excluded_by_code?
73
+
74
+ true
63
75
  end
64
76
 
65
77
  protected
@@ -70,30 +82,12 @@ module Contrast
70
82
  begin
71
83
  potential_attack_string = JSON.generate(potential_attack_string).to_s
72
84
  rescue JSON::GeneratorError
73
- logger.debug("Error in JSON::generate from input #{ potential_attack_string }")
85
+ logger.trace('Error in JSON::generate', input: potential_attack_string)
86
+ nil
74
87
  end
75
88
  end
76
89
  super(context, potential_attack_string, **kwargs)
77
90
  end
78
-
79
- def build_sample context, input_analysis_result, candidate_string, **kwargs
80
- input = input_analysis_result.value
81
-
82
- sample = build_base_sample(context, input_analysis_result)
83
- sample.no_sqli = Contrast::Api::Dtm::NoSqlInjectionDetails.new
84
- sample.no_sqli.query = Contrast::Utils::StringUtils.protobuf_safe_string(candidate_string)
85
- sample.no_sqli.start_idx = sample.no_sqli.query.index(input).to_i
86
- sample.no_sqli.boundary_overrun_idx = sample.no_sqli.start_idx + input.length
87
- sample.no_sqli.input_boundary_idx = kwargs[:boundary].to_i
88
- sample.no_sqli.input_boundary_idx = kwargs[:last_boundary].to_i
89
- sample
90
- end
91
-
92
- private
93
-
94
- def select_scanner
95
- @_select_scanner ||= Contrast::Agent::Protect::Rule::NoSqli::MongoNoSqlScanner.new
96
- end
97
91
  end
98
92
  end
99
93
  end
@@ -0,0 +1,61 @@
1
+ # Copyright (c) 2022 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
2
+ # frozen_string_literal: true
3
+
4
+ require 'contrast/utils/input_classification_base'
5
+
6
+ module Contrast
7
+ module Agent
8
+ module Protect
9
+ module Rule
10
+ # The Ruby implementation of the Protect Path Traversal rule
11
+ # Input classification
12
+ module PathTraversalInputClassification
13
+ PATH_TRAVERSAL_MATCH = 'path-traversal-input-tracing-v1'
14
+ WORTHWATCHING_MATCH = 'path-traversal-worth-watching-v2'
15
+
16
+ THRESHOLD = 90.cs__freeze
17
+ class << self
18
+ include InputClassificationBase
19
+
20
+ private
21
+
22
+ # This methods checks if input is tagged DEFINITEATTACK or IGNORE matches value with it's
23
+ # key if needed and Creates new isntance of InputAnalysisResult.
24
+ #
25
+ # @param request [Contrast::Agent::Request] the current request context.
26
+ # @param rule_id [String] The name of the Protect Rule.
27
+ # @param input_type [Contrast::Agent::Reporting::InputType] The type of the user input.
28
+ # @param value [String, Array<String>] the value of the input.
29
+ #
30
+ # @return res [Contrast::Agent::Reporting::InputAnalysisResult]
31
+ def create_new_input_result request, rule_id, input_type, value
32
+ return unless Contrast::AGENT_LIB
33
+
34
+ input_eval = Contrast::AGENT_LIB.eval_input(value,
35
+ convert_input_type(input_type),
36
+ Contrast::AGENT_LIB.rule_set[rule_id],
37
+ Contrast::AGENT_LIB.eval_option[:WORTHWATCHING])
38
+
39
+ ia_result = new_ia_result(rule_id, input_type, request.path, value)
40
+ score = input_eval&.score || 0
41
+ if score >= THRESHOLD
42
+ ia_result.score_level = DEFINITEATTACK
43
+ ia_result.ids << PATH_TRAVERSAL_MATCH
44
+ elsif score == 10
45
+ # There is one pattern to match 10 and thus on its own will be reported as a probe.
46
+ # This rule can report WORTHWATCHING:
47
+ # https://protect-spec.prod.dotnet.contsec.com/rules/path-traversal.html#applicable-input-types
48
+ ia_result.score_level = WORTHWATCHING
49
+ ia_result.ids << WORTHWATCHING_MATCH
50
+ else
51
+ ia_result.score_level = IGNORE
52
+ end
53
+ add_needed_key(request, ia_result, input_type, value)
54
+ ia_result
55
+ end
56
+ end
57
+ end
58
+ end
59
+ end
60
+ end
61
+ end
@@ -0,0 +1,114 @@
1
+ # Copyright (c) 2022 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
2
+ # frozen_string_literal: true
3
+
4
+ require 'contrast/agent/protect/rule/base_service'
5
+ require 'contrast/agent/reporting/details/path_traversal_semantic_analysis_details'
6
+ require 'contrast/agent/request_context'
7
+ require 'contrast/utils/string_utils'
8
+ require 'contrast/agent_lib/api/path_semantic_file_security_bypass'
9
+ require 'contrast/agent_lib/interface'
10
+
11
+ module Contrast
12
+ module Agent
13
+ module Protect
14
+ module Rule
15
+ # The Ruby implementation of the Protect Path Traversal Semantic
16
+ # Bypass sub-rule. This rule should report the attack result
17
+ class PathTraversalSemanticBypass < Contrast::Agent::Protect::Rule::BaseService
18
+ NAME = 'path-traversal-semantic-file-security-bypass'
19
+ # There paths here will eventually be moved
20
+
21
+ def rule_name
22
+ NAME
23
+ end
24
+
25
+ def infilter context, method, path
26
+ return unless rule_violated?(path)
27
+
28
+ result = find_vulnerability(context, path)
29
+
30
+ return unless result
31
+
32
+ append_to_activity(context, result)
33
+ return unless blocked?
34
+
35
+ result_rule_name = Contrast::Utils::StringUtils.transform_string(result.rule_id)
36
+ cef_logging(result, :successful_attack, value: path)
37
+ exception_messasge = "#{ result_rule_name } rule triggered. Call to File.#{ method } blocked."
38
+ raise(Contrast::SecurityException.new(self, exception_messasge))
39
+ end
40
+
41
+ protected
42
+
43
+ # Check if semantic file security bypass is detected
44
+ #
45
+ # @param file_path [String] command to check.
46
+ # @param is_custom_code[String] whether the file is being accessed by custom (user) code,
47
+ # rather than framework code
48
+ # @return result[Integer, nil] returns:
49
+ # 1 => security bypass is detected.
50
+ # 0 => no security bypass is detected.
51
+ def file_security_bypassed? file_path, is_custom_code = nil
52
+ return false unless (agent_lib = Contrast::AGENT_LIB) || file_path
53
+
54
+ custom_call = is_custom_code.nil? ? 0 : 1
55
+
56
+ agent_lib.check_path_semantic_security_bypass(file_path, custom_call) == 1
57
+ end
58
+
59
+ def rule_violated? path
60
+ is_custom_code = custom_code_accessing_system_file?(path)
61
+ is_custom_code || file_security_bypassed?(path, is_custom_code)
62
+ end
63
+
64
+ def find_vulnerability context, path
65
+ build_attack_with_match(context, nil, nil, path)
66
+ end
67
+
68
+ def build_sample context, _input_analysis_result, path, **_kwargs
69
+ sample = build_base_sample(context, nil)
70
+ sample.details = Contrast::Agent::Reporting::Details::PathTraversalSemanticAnalysisDetails.new
71
+ path = Contrast::Utils::StringUtils.protobuf_safe_string(path)
72
+ sample.details.path = path
73
+
74
+ is_custom_code = custom_code_accessing_system_file?(path)
75
+ # This should catch all the types of security breaches in that sub-rule scope
76
+ # but apparently it's not, because some of the system files is being skipped and not detected,
77
+ # but for our previous logic - it was expected for certain files to be detected and blocked
78
+ security_bypassed = file_security_bypassed?(path, is_custom_code)
79
+
80
+ # if agent lib sub-rule returns true and is custom code -> assign and report
81
+ if security_bypassed
82
+ if is_custom_code
83
+ sample.details.findings << :CUSTOM_CODE_ACCESSING_SYSTEM_FILES
84
+ sample.details.findings << :COMMON_FILE_EXPLOITS if common_file_exploits_enabled?
85
+ end
86
+ return sample
87
+ end
88
+
89
+ if is_custom_code
90
+ sample.details.findings << :CUSTOM_CODE_ACCESSING_SYSTEM_FILES
91
+ return sample
92
+ end
93
+
94
+ nil
95
+ end
96
+
97
+ def custom_code_accessing_system_file? input
98
+ system_file?(input) && Contrast::Utils::StackTraceUtils.custom_code_context?
99
+ end
100
+
101
+ def system_file? path
102
+ return false unless path
103
+
104
+ Contrast::Agent::Protect::Rule::PathTraversal::SYSTEM_PATHS.any? { |sys_path| sys_path.include?(path) }
105
+ end
106
+
107
+ def common_file_exploits_enabled?
108
+ false
109
+ end
110
+ end
111
+ end
112
+ end
113
+ end
114
+ end
@@ -1,8 +1,14 @@
1
- # Copyright (c) 2020 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
1
+ # Copyright (c) 2022 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
2
2
  # frozen_string_literal: true
3
3
 
4
- cs__scoped_require 'contrast/utils/stack_trace_utils'
5
- cs__scoped_require 'contrast/components/interface'
4
+ require 'contrast/agent/protect/rule/base_service'
5
+ require 'contrast/agent/protect/rule/path_traversal/path_traversal_semantic_security_bypass'
6
+ require 'contrast/agent/reporting/input_analysis/input_type'
7
+ require 'contrast/agent/reporting/input_analysis/score_level'
8
+ require 'contrast/utils/stack_trace_utils'
9
+ require 'contrast/agent/reporting/details/path_traversal_details'
10
+ require 'contrast/agent/reporting/details/path_traversal_semantic_analysis_details'
11
+ require 'contrast/utils/string_utils'
6
12
 
7
13
  module Contrast
8
14
  module Agent
@@ -11,10 +17,13 @@ module Contrast
11
17
  # This class handles our implementation of the Path Traversal
12
18
  # Protect rule.
13
19
  class PathTraversal < Contrast::Agent::Protect::Rule::BaseService
14
- include Contrast::Components::Interface
15
- access_component :logging, :agent
20
+ include Contrast::Agent::Reporting::InputType
16
21
 
17
22
  NAME = 'path-traversal'
23
+ APPLICABLE_USER_INPUTS = [
24
+ BODY, COOKIE_NAME, COOKIE_VALUE, HEADER, PARAMETER_VALUE, PARAMETER_NAME,
25
+ JSON_VALUE, MULTIPART_VALUE, MULTIPART_FIELD_NAME, XML_VALUE, DWR_VALUE, URI
26
+ ].cs__freeze
18
27
  SYSTEM_PATHS = %w[
19
28
  /proc/self
20
29
  etc/passwd
@@ -28,12 +37,21 @@ module Contrast
28
37
  /windows/repair/
29
38
  ].cs__freeze
30
39
 
31
- KNOWN_SECURITY_BYPASS_MARKERS = ['::$DATA', '::$Index', '', '\x00'].cs__freeze
32
-
33
- def name
40
+ def rule_name
34
41
  NAME
35
42
  end
36
43
 
44
+ # Array of sub_rules
45
+ #
46
+ # @return [Array]
47
+ def sub_rules
48
+ @_sub_rules ||= [Contrast::Agent::Protect::Rule::PathTraversalSemanticBypass.new].cs__freeze
49
+ end
50
+
51
+ def applicable_user_inputs
52
+ APPLICABLE_USER_INPUTS
53
+ end
54
+
37
55
  def infilter context, method, path
38
56
  return unless infilter?(context)
39
57
 
@@ -43,9 +61,10 @@ module Contrast
43
61
  append_to_activity(context, result)
44
62
  return unless blocked?
45
63
 
46
- raise Contrast::SecurityException.new(
47
- self,
48
- "Path Traversal rule triggered. Call to File.#{ method } blocked.")
64
+ result_rule_name = Contrast::Utils::StringUtils.transform_string(result.rule_id)
65
+ cef_logging(result, :successful_attack, value: path)
66
+ exception_messasge = "#{ result_rule_name } rule triggered. Call to File.#{ method } blocked."
67
+ raise(Contrast::SecurityException.new(self, exception_messasge))
49
68
  end
50
69
 
51
70
  protected
@@ -53,41 +72,50 @@ module Contrast
53
72
  def find_attacker context, path
54
73
  attack_result = nil
55
74
  attack_result = super(context, path) if infilter?(context)
56
- attack_result = check_rep_features(context, path, attack_result)
57
- attack_result
75
+ check_rep_features(context, path, attack_result)
58
76
  end
59
77
 
60
78
  # Build a subclass of the RaspRuleSample using the query string and the
61
79
  # evaluation
62
80
  def build_sample context, input_analysis_result, path, **_kwargs
63
81
  sample = build_base_sample(context, input_analysis_result)
64
- sample.path_traversal = Contrast::Api::Dtm::PathTraversalDetails.new
82
+ sample.details = Contrast::Agent::Reporting::Details::PathTraversalDetails.new
65
83
  path ||= input_analysis_result.value
66
- sample.path_traversal.path = Contrast::Utils::StringUtils.protobuf_safe_string(path)
84
+ sample.details.path = Contrast::Utils::StringUtils.protobuf_safe_string(path)
67
85
  sample
68
86
  end
69
87
 
88
+ # @param context [Contrast::Agent::RequestContext]
89
+ def infilter? context
90
+ return false unless enabled?
91
+ return false unless context&.agent_input_analysis&.results&.any? do |result|
92
+ # When a file is being accessed, the agent should see if any of its worth-watching inputs appear in
93
+ # the file path. If so, the input is considered a confirmed attack and should be reported or blocked.
94
+ # If the score level is ignore we don't need to report it.
95
+ result.rule_id == rule_name && result.score_level != Contrast::Agent::Reporting::ScoreLevel::IGNORE
96
+ end
97
+
98
+ return false if protect_excluded_by_code?
99
+
100
+ true
101
+ end
102
+
70
103
  private
71
104
 
72
105
  # Build a subclass of the RaspRuleSample if the sample matches
73
- # TODO: SPEED-? delete me when implemented in Speedracer.
74
- # this implementation duplicates logic that is moving to Speedracer
75
- # the reason it is still here is Speedracer doesn't yet have a method to correlate
76
- # and (update) attack results that are generated because the evaluation results
77
- # from REP, it can only forward the attack results are generated by the agent.
78
106
  def build_rep_sample context, path
79
107
  sample = build_base_sample(context, nil)
80
- sample.path_traversal_semantic = Contrast::Api::Dtm::PathTraversalSemanticAnalysisDetails.new
108
+ sample.details = Contrast::Agent::Reporting::Details::PathTraversalSemanticAnalysisDetails.new
81
109
  path = Contrast::Utils::StringUtils.protobuf_safe_string(path)
82
- sample.path_traversal_semantic.path = path
110
+ sample.details.path = path
83
111
 
84
112
  if custom_code_access_sysfile_enabled? && custom_code_accessing_system_file?(path)
85
- sample.path_traversal_semantic.findings << :CUSTOM_CODE_ACCESSING_SYSTEM_FILES
113
+ sample.details.findings << :CUSTOM_CODE_ACCESSING_SYSTEM_FILES
86
114
  return sample
87
115
  end
88
116
 
89
117
  if common_file_exploits_enabled? && contains_known_attack_signatures?(path)
90
- sample.path_traversal_semantic.findings << :COMMON_FILE_EXPLOITS
118
+ sample.details.findings << :COMMON_FILE_EXPLOITS
91
119
  return sample
92
120
  end
93
121
 
@@ -104,7 +132,7 @@ module Contrast
104
132
  end
105
133
 
106
134
  def custom_code_access_sysfile_enabled?
107
- AGENT.report_custom_code_sysfile_access?
135
+ ::Contrast::PROTECT.report_custom_code_sysfile_access?
108
136
  end
109
137
 
110
138
  def custom_code_accessing_system_file? input
@@ -121,6 +149,8 @@ module Contrast
121
149
  false
122
150
  end
123
151
 
152
+ # TODO: RUBY-318
153
+ # KNOWN_SECURITY_BYPASS_MARKERS = ['::$DATA', '::$Index', '', '\x00'].cs__freeze
124
154
  def contains_known_attack_signatures? input
125
155
  utf8 = Contrast::Utils::StringUtils.force_utf8(input)
126
156
  _ = CGI.unescape(utf8)
@@ -133,7 +163,8 @@ module Contrast
133
163
  # return 'NUL' in str(e) or 'null byte' in str(e) or (PY34 and 'embedded NUL character' == str(e))
134
164
  # except Exception as e:
135
165
  # return 'null byte' in str(e).lower()
136
- # return return any([bypass_markers.lower().rstrip('/') in realpath for bypass_markers in PathTraversalREPMixin.KNOWN_SECURITY_BYPASS_MARKERS])
166
+ # return return any([bypass_markers.lower().rstrip('/') in realpath for bypass_markers in
167
+ # PathTraversalREPMixin.KNOWN_SECURITY_BYPASS_MARKERS])
137
168
  false
138
169
  end
139
170
  end
@@ -0,0 +1,155 @@
1
+ # Copyright (c) 2022 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
2
+ # frozen_string_literal: true
3
+
4
+ require 'contrast/agent/protect/rule/base'
5
+ require 'contrast/agent/protect/rule/base_service'
6
+ require 'contrast/agent/reporting/details/sqli_details'
7
+ require 'contrast/agent/reporting/details/no_sqli_details'
8
+
9
+ module Contrast
10
+ module Agent
11
+ module Protect
12
+ module Rule
13
+ module SqlSampleBuilder
14
+ # Generate a sample for the SQL injection detection rule, allowing for reporting to and rendering
15
+ # by TeamServer
16
+ #
17
+ # @param context [Contrast::Agent::RequestContext] the context for the current request
18
+ # @param input_analysis_result [Contrast::Agent::Reporting, nil] previous attack result for this rule,
19
+ # if one exists, in the case of multiple inputs being found to violate the protection criteria
20
+ # @candidate_string [String] the value of the input which may be an attack
21
+ # @kwargs [Hash] key - value pairs of context individual rules need to build out details
22
+ # to send to TeamServer to tell the story of the attack
23
+ # @return [Contrast::Agent::Reporting::RaspRuleSample] the sample from this attack
24
+ module SqliSample
25
+ def build_sample context, input_analysis_result, candidate_string, **kwargs
26
+ sqli_sample = build_base_sample(context, input_analysis_result)
27
+ sqli_sample.details = Contrast::Agent::Reporting::Details::SqliDetails.new
28
+ sqli_sample.details.query = Contrast::Utils::StringUtils.protobuf_safe_string(candidate_string)
29
+ sqli_sample.details.start_idx = kwargs[:start_idx]
30
+ sqli_sample.details.end_idx = kwargs[:end_idx]
31
+ sqli_sample.details.boundary_overrun_idx = kwargs[:boundary_overrun_idx].to_i
32
+ sqli_sample.details.input_boundary_idx = kwargs[:input_boundary_idx].to_i
33
+ sqli_sample
34
+ end
35
+ end
36
+
37
+ # Generate a sample for the No-SQL injection detection rule, allowing for reporting to and rendering
38
+ # by TeamServer
39
+ #
40
+ # @param context [Contrast::Agent::RequestContext] the context for the current request
41
+ # @param input_analysis_result [Contrast::Agent::Reporting, nil] previous attack result for this rule,
42
+ # if one exists, in the case of multiple inputs being found to violate the protection criteria
43
+ # @candidate_string [String] the value of the input which may be an attack
44
+ # @kwargs [Hash] key - value pairs of context individual rules need to build out details
45
+ # to send to TeamServer to tell the story of the attack
46
+ # @return [Contrast::Agent::Reporting::RaspRuleSample] the sample from this attack
47
+ module NoSqliSample
48
+ def build_sample context, input_analysis_result, candidate_string, **kwargs
49
+ no_sqli_sample = build_base_sample(context, input_analysis_result)
50
+ no_sqli_sample.details = Contrast::Agent::Reporting::Details::NoSqliDetails.new
51
+ no_sqli_sample.details.query = Contrast::Utils::StringUtils.protobuf_safe_string(candidate_string)
52
+ no_sqli_sample.details.start_idx = kwargs[:start_idx].to_i
53
+ no_sqli_sample.details.end_idx = kwargs[:end_idx].to_i
54
+ no_sqli_sample.details.boundary_overrun_idx = kwargs[:boundary_overrun_idx].to_i
55
+ no_sqli_sample.details.input_boundary_idx = kwargs[:input_boundary_idx].to_i
56
+ no_sqli_sample
57
+ end
58
+ end
59
+
60
+ # This Module is how we apply the attack fo NoSQL and SQL Injection rule.
61
+ # It includes methods for building attack with match and database scanners
62
+ module AttackBuilder
63
+ # Set up an attack result and assigns Database scanner for the No-SQL and SQLI injection detection rules
64
+ #
65
+ # @param context [Contrast::Agent::RequestContext] the context for the current request
66
+ # @param input_analysis_result [Contrast::Agent::Reporting, nil] previous attack result for this rule,
67
+ # if one exists, in the case of multiple inputs being found to violate the protection criteria
68
+ # @param result [Contrast::Agent::Reporting, nil] previous attack result for this rule, if one exists,
69
+ # in the case of multiple inputs being found to violate the protection criteria
70
+ # @param query_string [String] the value of the input which may be an attack
71
+ # @param kwargs [Hash] key - value pairs of context individual rules need to build out details to send
72
+ # to TeamServer to tell the story of the attack
73
+ # @return [Contrast::Agent::Reporting] the result from this attack
74
+ def build_attack_with_match context, input_analysis_result, result, query_string, **kwargs
75
+ return result if mode == :NO_ACTION || mode == :PERMIT
76
+
77
+ attack_string = input_analysis_result.value
78
+ regexp = Regexp.new(Regexp.escape(attack_string), Regexp::IGNORECASE)
79
+ # extract struct result from kwargs
80
+ agent_lib_struct_result = kwargs[:result_struct]
81
+ return unless query_string.match?(regexp)
82
+
83
+ database = kwargs[:database]
84
+ scanner = select_scanner(database)
85
+ ss = StringScanner.new(query_string)
86
+ length = attack_string.length
87
+ while ss.scan_until(regexp)
88
+ # the pos of StringScanner is at the end of the regexp (input string), we need the beginning
89
+ idx = ss.pos - attack_string.length
90
+ last_boundary, boundary = scanner.crosses_boundary(query_string, idx, input_analysis_result.value)
91
+ next unless last_boundary && boundary
92
+
93
+ result ||= build_attack_result(context)
94
+
95
+ # if the struct actually has the needed data in it - use it
96
+ if agent_lib_struct_result.cs__is_a?(Hash)
97
+ record_agent_lib_match(agent_lib_struct_result, length, kwargs)
98
+ else
99
+ record_match(idx, length, boundary, last_boundary, kwargs)
100
+ end
101
+
102
+ append_match(context, input_analysis_result, result, query_string, **kwargs)
103
+ end
104
+
105
+ result
106
+ end
107
+
108
+ def select_scanner database
109
+ @scanners ||= {
110
+ Contrast::Agent::Protect::Policy::AppliesSqliRule::DATABASE_MYSQL =>
111
+ Contrast::Agent::Protect::Rule::Sqli::MysqlSqlScanner.new,
112
+ Contrast::Agent::Protect::Policy::AppliesSqliRule::DATABASE_PG =>
113
+ Contrast::Agent::Protect::Rule::Sqli::PostgresSqlScanner.new,
114
+ Contrast::Agent::Protect::Policy::AppliesSqliRule::DATABASE_SQLITE =>
115
+ Contrast::Agent::Protect::Rule::Sqli::SqliteSqlScanner.new,
116
+ Contrast::Agent::Protect::Policy::AppliesNoSqliRule::DATABASE_NOSQL =>
117
+ Contrast::Agent::Protect::Rule::NoSqli::MongoNoSqlScanner.new
118
+ }.cs__freeze
119
+
120
+ @default_scanner ||= Contrast::Agent::Protect::Rule::Sqli::DefaultSqlScanner.new
121
+ @scanners[database.to_s] || @default_scanner
122
+ end
123
+
124
+ def record_match idx, length, boundary, last_boundary, kwargs
125
+ kwargs[:start_idx] = idx
126
+ kwargs[:end_idx] = idx + length
127
+ kwargs[:boundary_overrun_idx] = boundary
128
+ kwargs[:input_boundary_idx] = last_boundary
129
+ end
130
+
131
+ # all the agent_lib checks methods needed
132
+
133
+ # @param struct[ResultingStruct] The struct including all the data from the agent_lib scan
134
+ def record_agent_lib_match struct, length, kwargs
135
+ kwargs[:start_idx] = struct[:start_index]
136
+ kwargs[:end_idx] = if (struct[:end_index]).zero?
137
+ struct[:start_index] + length
138
+ else
139
+ struct[:end_index]
140
+ end
141
+ kwargs[:boundary_overrun_idx] = struct[:boundary_overrun_index]
142
+ kwargs[:input_boundary_idx] = struct[:input_boundary_index]
143
+ end
144
+
145
+ def append_match context, input_analysis_result, result, query_string, **kwargs
146
+ input_analysis_result.attack_count = input_analysis_result.attack_count + 1
147
+ update_successful_attack_response(context, input_analysis_result, result, query_string)
148
+ append_sample(context, input_analysis_result, result, query_string, **kwargs)
149
+ end
150
+ end
151
+ end
152
+ end
153
+ end
154
+ end
155
+ end
@@ -1,4 +1,4 @@
1
- # Copyright (c) 2020 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
1
+ # Copyright (c) 2022 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
2
2
  # frozen_string_literal: true
3
3
 
4
4
  module Contrast
@@ -1,4 +1,4 @@
1
- # Copyright (c) 2020 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
1
+ # Copyright (c) 2022 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
2
2
  # frozen_string_literal: true
3
3
 
4
4
  # This class is the concrete implementation of the DefaultSqlScanner designed
@@ -1,7 +1,7 @@
1
- # Copyright (c) 2020 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
1
+ # Copyright (c) 2022 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
2
2
  # frozen_string_literal: true
3
3
 
4
- # Copyright (c) 2020 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
4
+ # Copyright (c) 2022 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
5
5
  # frozen_string_literal: true
6
6
 
7
7
  module Contrast