contrast-agent 4.14.0 → 5.2.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/.simplecov +2 -3
- data/Gemfile +1 -1
- data/LICENSE.txt +1 -1
- data/Rakefile +1 -1
- data/exe/contrast_service +1 -1
- data/ext/build_funchook.rb +1 -1
- data/ext/cs__assess_array/cs__assess_array.c +1 -1
- data/ext/cs__assess_array/extconf.rb +1 -1
- data/ext/cs__assess_basic_object/cs__assess_basic_object.c +1 -1
- data/ext/cs__assess_basic_object/extconf.rb +1 -1
- data/ext/cs__assess_fiber_track/cs__assess_fiber_track.c +1 -1
- data/ext/cs__assess_fiber_track/extconf.rb +1 -1
- data/ext/cs__assess_hash/cs__assess_hash.c +1 -1
- data/ext/cs__assess_hash/extconf.rb +1 -1
- data/ext/cs__assess_kernel/cs__assess_kernel.c +8 -5
- data/ext/cs__assess_kernel/extconf.rb +1 -1
- data/ext/cs__assess_marshal_module/cs__assess_marshal_module.c +1 -1
- data/ext/cs__assess_marshal_module/extconf.rb +1 -1
- data/ext/cs__assess_module/cs__assess_module.c +49 -39
- data/ext/cs__assess_module/extconf.rb +1 -1
- data/ext/cs__assess_regexp/cs__assess_regexp.c +1 -1
- data/ext/cs__assess_regexp/extconf.rb +1 -1
- data/ext/cs__assess_string/cs__assess_string.c +1 -1
- data/ext/cs__assess_string/extconf.rb +1 -1
- data/ext/cs__assess_string_interpolation26/cs__assess_string_interpolation26.c +1 -1
- data/ext/cs__assess_string_interpolation26/extconf.rb +1 -1
- data/ext/cs__assess_yield_track/cs__assess_yield_track.c +1 -1
- data/ext/cs__assess_yield_track/extconf.rb +1 -1
- data/ext/cs__common/cs__common.c +5 -1
- data/ext/cs__common/cs__common.h +1 -0
- data/ext/cs__common/extconf.rb +1 -1
- data/ext/cs__contrast_patch/cs__contrast_patch.c +53 -28
- data/ext/cs__contrast_patch/cs__contrast_patch.h +2 -0
- data/ext/cs__contrast_patch/extconf.rb +1 -1
- data/ext/cs__os_information/cs__os_information.c +1 -1
- data/ext/cs__os_information/extconf.rb +1 -1
- data/ext/cs__scope/cs__scope.c +747 -0
- data/ext/cs__scope/cs__scope.h +88 -0
- data/ext/{cs__assess_active_record_named → cs__scope}/extconf.rb +1 -1
- data/ext/extconf_common.rb +1 -1
- data/lib/contrast/agent/assess/contrast_event.rb +27 -24
- data/lib/contrast/agent/assess/contrast_object.rb +5 -2
- data/lib/contrast/agent/assess/events/event_data.rb +30 -0
- data/lib/contrast/agent/assess/events/event_factory.rb +14 -6
- data/lib/contrast/agent/assess/events/source_event.rb +22 -3
- data/lib/contrast/agent/assess/finalizers/freeze.rb +1 -1
- data/lib/contrast/agent/assess/finalizers/hash.rb +1 -1
- data/lib/contrast/agent/assess/policy/dynamic_source_factory.rb +7 -7
- data/lib/contrast/agent/assess/policy/patcher.rb +1 -35
- data/lib/contrast/agent/assess/policy/policy.rb +1 -1
- data/lib/contrast/agent/assess/policy/policy_node.rb +2 -2
- data/lib/contrast/agent/assess/policy/policy_scanner.rb +1 -1
- data/lib/contrast/agent/assess/policy/preshift.rb +1 -1
- data/lib/contrast/agent/assess/policy/propagation_method.rb +55 -28
- data/lib/contrast/agent/assess/policy/propagation_node.rb +3 -6
- data/lib/contrast/agent/assess/policy/propagator/append.rb +1 -1
- data/lib/contrast/agent/assess/policy/propagator/base.rb +1 -1
- data/lib/contrast/agent/assess/policy/propagator/center.rb +1 -1
- data/lib/contrast/agent/assess/policy/propagator/custom.rb +1 -1
- data/lib/contrast/agent/assess/policy/propagator/database_write.rb +6 -2
- data/lib/contrast/agent/assess/policy/propagator/insert.rb +5 -2
- data/lib/contrast/agent/assess/policy/propagator/keep.rb +1 -1
- data/lib/contrast/agent/assess/policy/propagator/match_data.rb +13 -3
- data/lib/contrast/agent/assess/policy/propagator/next.rb +1 -1
- data/lib/contrast/agent/assess/policy/propagator/prepend.rb +1 -1
- data/lib/contrast/agent/assess/policy/propagator/rack_protection.rb +1 -1
- data/lib/contrast/agent/assess/policy/propagator/remove.rb +1 -1
- data/lib/contrast/agent/assess/policy/propagator/replace.rb +1 -1
- data/lib/contrast/agent/assess/policy/propagator/reverse.rb +1 -1
- data/lib/contrast/agent/assess/policy/propagator/select.rb +3 -2
- data/lib/contrast/agent/assess/policy/propagator/splat.rb +1 -1
- data/lib/contrast/agent/assess/policy/propagator/split.rb +27 -25
- data/lib/contrast/agent/assess/policy/propagator/substitution.rb +3 -5
- data/lib/contrast/agent/assess/policy/propagator/substitution_utils.rb +190 -0
- data/lib/contrast/agent/assess/policy/propagator/trim.rb +9 -4
- data/lib/contrast/agent/assess/policy/propagator.rb +1 -1
- data/lib/contrast/agent/assess/policy/source_method.rb +39 -26
- data/lib/contrast/agent/assess/policy/source_node.rb +1 -1
- data/lib/contrast/agent/assess/policy/source_validation/cross_site_validator.rb +1 -1
- data/lib/contrast/agent/assess/policy/source_validation/source_validation.rb +1 -1
- data/lib/contrast/agent/assess/policy/trigger/reflected_xss.rb +7 -2
- data/lib/contrast/agent/assess/policy/trigger/xpath.rb +1 -1
- data/lib/contrast/agent/assess/policy/trigger_method.rb +41 -25
- data/lib/contrast/agent/assess/policy/trigger_node.rb +1 -1
- data/lib/contrast/agent/assess/policy/trigger_validation/redos_validator.rb +1 -1
- data/lib/contrast/agent/assess/policy/trigger_validation/ssrf_validator.rb +1 -1
- data/lib/contrast/agent/assess/policy/trigger_validation/trigger_validation.rb +1 -1
- data/lib/contrast/agent/assess/policy/trigger_validation/xss_validator.rb +1 -1
- data/lib/contrast/agent/assess/properties.rb +1 -1
- data/lib/contrast/agent/assess/property/evented.rb +25 -12
- data/lib/contrast/agent/assess/property/tagged.rb +1 -1
- data/lib/contrast/agent/assess/property/updated.rb +1 -1
- data/lib/contrast/agent/assess/rule/provider/hardcoded_key.rb +1 -19
- data/lib/contrast/agent/assess/rule/provider/hardcoded_password.rb +1 -13
- data/lib/contrast/agent/assess/rule/provider/hardcoded_value_rule.rb +7 -59
- data/lib/contrast/agent/assess/rule/provider.rb +1 -1
- data/lib/contrast/agent/assess/rule/response/auto_complete_rule.rb +69 -0
- data/lib/contrast/agent/assess/rule/response/base_rule.rb +130 -0
- data/lib/contrast/agent/assess/rule/response/body_rule.rb +109 -0
- data/lib/contrast/agent/assess/rule/response/cache_control_header_rule.rb +157 -0
- data/lib/contrast/agent/assess/rule/response/click_jacking_header_rule.rb +26 -0
- data/lib/contrast/agent/assess/rule/response/csp_header_insecure_rule.rb +100 -0
- data/lib/contrast/agent/assess/rule/response/csp_header_missing_rule.rb +26 -0
- data/lib/contrast/agent/assess/rule/response/framework/rails_support.rb +29 -0
- data/lib/contrast/agent/assess/rule/response/header_rule.rb +70 -0
- data/lib/contrast/agent/assess/rule/response/hsts_header_rule.rb +36 -0
- data/lib/contrast/agent/assess/rule/response/parameters_pollution_rule.rb +61 -0
- data/lib/contrast/agent/assess/rule/response/x_content_type_header_rule.rb +26 -0
- data/lib/contrast/agent/assess/rule/response/x_xss_protection_header_rule.rb +36 -0
- data/lib/contrast/agent/assess/tag.rb +1 -1
- data/lib/contrast/agent/assess/tracker.rb +1 -1
- data/lib/contrast/agent/assess.rb +1 -2
- data/lib/contrast/agent/at_exit_hook.rb +1 -1
- data/lib/contrast/agent/deadzone/policy/deadzone_node.rb +13 -8
- data/lib/contrast/agent/deadzone/policy/policy.rb +1 -1
- data/lib/contrast/agent/disable_reaction.rb +1 -1
- data/lib/contrast/agent/exclusion_matcher.rb +1 -1
- data/lib/contrast/agent/inventory/database_config.rb +115 -77
- data/lib/contrast/agent/inventory/dependencies.rb +1 -1
- data/lib/contrast/agent/inventory/dependency_analysis.rb +1 -1
- data/lib/contrast/agent/inventory/dependency_usage_analysis.rb +3 -3
- data/lib/contrast/agent/inventory/policy/datastores.rb +1 -1
- data/lib/contrast/agent/inventory/policy/policy.rb +1 -1
- data/lib/contrast/agent/inventory/policy/trigger_node.rb +1 -1
- data/lib/contrast/agent/inventory.rb +1 -1
- data/lib/contrast/agent/metric_telemetry_event.rb +1 -1
- data/lib/contrast/agent/middleware.rb +4 -2
- data/lib/contrast/agent/module_data.rb +1 -1
- data/lib/contrast/agent/patching/policy/after_load_patch.rb +1 -1
- data/lib/contrast/agent/patching/policy/after_load_patcher.rb +2 -4
- data/lib/contrast/agent/patching/policy/method_policy.rb +28 -15
- data/lib/contrast/agent/patching/policy/method_policy_extend.rb +12 -10
- data/lib/contrast/agent/patching/policy/module_policy.rb +1 -1
- data/lib/contrast/agent/patching/policy/patch.rb +3 -7
- data/lib/contrast/agent/patching/policy/patch_status.rb +2 -26
- data/lib/contrast/agent/patching/policy/patcher.rb +2 -6
- data/lib/contrast/agent/patching/policy/policy.rb +1 -1
- data/lib/contrast/agent/patching/policy/policy_node.rb +1 -1
- data/lib/contrast/agent/patching/policy/trigger_node.rb +1 -1
- data/lib/contrast/agent/protect/input_analyzer/input_analyzer.rb +94 -0
- data/lib/contrast/agent/protect/policy/applies_command_injection_rule.rb +1 -1
- data/lib/contrast/agent/protect/policy/applies_deserialization_rule.rb +1 -1
- data/lib/contrast/agent/protect/policy/applies_no_sqli_rule.rb +1 -1
- data/lib/contrast/agent/protect/policy/applies_path_traversal_rule.rb +1 -1
- data/lib/contrast/agent/protect/policy/applies_sqli_rule.rb +1 -1
- data/lib/contrast/agent/protect/policy/applies_xxe_rule.rb +1 -1
- data/lib/contrast/agent/protect/policy/policy.rb +1 -1
- data/lib/contrast/agent/protect/policy/rule_applicator.rb +1 -1
- data/lib/contrast/agent/protect/policy/trigger_node.rb +1 -1
- data/lib/contrast/agent/protect/rule/base.rb +29 -2
- data/lib/contrast/agent/protect/rule/base_service.rb +11 -2
- data/lib/contrast/agent/protect/rule/cmd_injection.rb +3 -1
- data/lib/contrast/agent/protect/rule/default_scanner.rb +1 -1
- data/lib/contrast/agent/protect/rule/deserialization.rb +7 -1
- data/lib/contrast/agent/protect/rule/http_method_tampering.rb +6 -2
- data/lib/contrast/agent/protect/rule/no_sqli/mongo_no_sql_scanner.rb +1 -1
- data/lib/contrast/agent/protect/rule/no_sqli.rb +2 -1
- data/lib/contrast/agent/protect/rule/path_traversal.rb +2 -1
- data/lib/contrast/agent/protect/rule/sql_sample_builder.rb +1 -1
- data/lib/contrast/agent/protect/rule/sqli/default_sql_scanner.rb +1 -1
- data/lib/contrast/agent/protect/rule/sqli/mysql_sql_scanner.rb +1 -1
- data/lib/contrast/agent/protect/rule/sqli/postgres_sql_scanner.rb +2 -2
- data/lib/contrast/agent/protect/rule/sqli/sqli_input_classification.rb +124 -0
- data/lib/contrast/agent/protect/rule/sqli/sqli_worth_watching.rb +121 -0
- data/lib/contrast/agent/protect/rule/sqli/sqlite_sql_scanner.rb +1 -1
- data/lib/contrast/agent/protect/rule/sqli.rb +34 -1
- data/lib/contrast/agent/protect/rule/unsafe_file_upload.rb +1 -1
- data/lib/contrast/agent/protect/rule/xss.rb +1 -1
- data/lib/contrast/agent/protect/rule/xxe/entity_wrapper.rb +1 -1
- data/lib/contrast/agent/protect/rule/xxe.rb +5 -1
- data/lib/contrast/agent/protect/rule.rb +1 -1
- data/lib/contrast/agent/reaction_processor.rb +1 -1
- data/lib/contrast/agent/reporting/input_analysis/input_analysis.rb +44 -0
- data/lib/contrast/agent/reporting/input_analysis/input_analysis_result.rb +115 -0
- data/lib/contrast/agent/reporting/input_analysis/input_type.rb +44 -0
- data/lib/contrast/agent/reporting/input_analysis/score_level.rb +21 -0
- data/lib/contrast/agent/reporting/report.rb +8 -1
- data/lib/contrast/agent/reporting/reporter.rb +27 -47
- data/lib/contrast/agent/reporting/reporting_events/application_inventory.rb +49 -0
- data/lib/contrast/agent/reporting/reporting_events/application_update.rb +82 -0
- data/lib/contrast/agent/reporting/reporting_events/architecture_component.rb +80 -0
- data/lib/contrast/agent/reporting/reporting_events/discovered_route.rb +59 -0
- data/lib/contrast/agent/reporting/reporting_events/finding.rb +181 -43
- data/lib/contrast/agent/reporting/reporting_events/finding_event.rb +293 -0
- data/lib/contrast/agent/reporting/reporting_events/finding_event_object.rb +94 -0
- data/lib/contrast/agent/reporting/reporting_events/finding_event_parent_object.rb +39 -0
- data/lib/contrast/agent/reporting/reporting_events/finding_event_property.rb +40 -0
- data/lib/contrast/agent/reporting/reporting_events/finding_event_signature.rb +110 -0
- data/lib/contrast/agent/reporting/reporting_events/finding_event_source.rb +61 -0
- data/lib/contrast/agent/reporting/reporting_events/finding_event_stack.rb +71 -0
- data/lib/contrast/agent/reporting/reporting_events/finding_event_taint_range.rb +60 -0
- data/lib/contrast/agent/reporting/reporting_events/finding_request.rb +94 -0
- data/lib/contrast/agent/reporting/reporting_events/library_discovery.rb +93 -0
- data/lib/contrast/agent/reporting/reporting_events/library_usage_observation.rb +50 -0
- data/lib/contrast/agent/reporting/reporting_events/observed_library_usage.rb +54 -0
- data/lib/contrast/agent/reporting/reporting_events/observed_route.rb +66 -0
- data/lib/contrast/agent/reporting/reporting_events/poll.rb +29 -0
- data/lib/contrast/agent/reporting/reporting_events/preflight.rb +20 -6
- data/lib/contrast/agent/reporting/reporting_events/preflight_message.rb +36 -17
- data/lib/contrast/agent/reporting/reporting_events/reporting_event.rb +29 -18
- data/lib/contrast/agent/reporting/reporting_events/route_coverage.rb +76 -0
- data/lib/contrast/agent/reporting/reporting_events/route_discovery.rb +67 -0
- data/lib/contrast/agent/reporting/reporting_events/route_discovery_observation.rb +65 -0
- data/lib/contrast/agent/reporting/reporting_events/server_activity.rb +52 -0
- data/lib/contrast/agent/reporting/reporting_events/trace_event_source.rb +30 -0
- data/lib/contrast/agent/reporting/reporting_utilities/audit.rb +32 -15
- data/lib/contrast/agent/reporting/reporting_utilities/dtm_message.rb +67 -0
- data/lib/contrast/agent/reporting/reporting_utilities/endpoints.rb +164 -0
- data/lib/contrast/agent/reporting/reporting_utilities/headers.rb +55 -0
- data/lib/contrast/agent/reporting/reporting_utilities/reporter_client.rb +75 -156
- data/lib/contrast/agent/reporting/reporting_utilities/reporter_client_utils.rb +162 -0
- data/lib/contrast/agent/reporting/reporting_utilities/reporting_storage.rb +1 -1
- data/lib/contrast/agent/reporting/reporting_utilities/response.rb +30 -0
- data/lib/contrast/agent/reporting/reporting_utilities/response_handler.rb +57 -0
- data/lib/contrast/agent/reporting/reporting_utilities/response_handler_utils.rb +208 -0
- data/lib/contrast/agent/reporting/settings/application_settings.rb +67 -0
- data/lib/contrast/agent/reporting/settings/assess.rb +45 -0
- data/lib/contrast/agent/reporting/settings/assess_server_feature.rb +136 -0
- data/lib/contrast/agent/reporting/settings/exclusions.rb +123 -0
- data/lib/contrast/agent/reporting/settings/protect.rb +89 -0
- data/lib/contrast/agent/reporting/settings/protect_server_feature.rb +243 -0
- data/lib/contrast/agent/reporting/settings/reaction.rb +30 -0
- data/lib/contrast/agent/reporting/settings/server_features.rb +78 -0
- data/lib/contrast/agent/request.rb +44 -3
- data/lib/contrast/agent/request_context.rb +25 -7
- data/lib/contrast/agent/request_context_extend.rb +109 -7
- data/lib/contrast/agent/request_handler.rb +41 -5
- data/lib/contrast/agent/response.rb +23 -15
- data/lib/contrast/agent/rule_set.rb +1 -1
- data/lib/contrast/agent/scope.rb +103 -108
- data/lib/contrast/agent/service_heartbeat.rb +46 -3
- data/lib/contrast/agent/startup_metrics_telemetry_event.rb +34 -7
- data/lib/contrast/agent/static_analysis.rb +13 -3
- data/lib/contrast/agent/telemetry.rb +1 -1
- data/lib/contrast/agent/telemetry_event.rb +1 -1
- data/lib/contrast/agent/thread.rb +1 -1
- data/lib/contrast/agent/thread_watcher.rb +3 -3
- data/lib/contrast/agent/tracepoint_hook.rb +1 -4
- data/lib/contrast/agent/version.rb +2 -2
- data/lib/contrast/agent/worker_thread.rb +1 -1
- data/lib/contrast/agent.rb +4 -4
- data/lib/contrast/api/communication/connection_status.rb +1 -1
- data/lib/contrast/api/communication/messaging_queue.rb +4 -4
- data/lib/contrast/api/communication/response_processor.rb +9 -5
- data/lib/contrast/api/communication/service_lifecycle.rb +1 -1
- data/lib/contrast/api/communication/socket.rb +1 -1
- data/lib/contrast/api/communication/socket_client.rb +4 -1
- data/lib/contrast/api/communication/speedracer.rb +1 -1
- data/lib/contrast/api/communication/tcp_socket.rb +1 -1
- data/lib/contrast/api/communication/unix_socket.rb +1 -1
- data/lib/contrast/api/communication.rb +1 -1
- data/lib/contrast/api/decorators/address.rb +1 -1
- data/lib/contrast/api/decorators/agent_startup.rb +1 -1
- data/lib/contrast/api/decorators/application_settings.rb +1 -1
- data/lib/contrast/api/decorators/application_startup.rb +1 -1
- data/lib/contrast/api/decorators/application_update.rb +1 -1
- data/lib/contrast/api/decorators/architecture_component.rb +36 -0
- data/lib/contrast/api/decorators/bot_blocker.rb +37 -0
- data/lib/contrast/api/decorators/finding.rb +1 -17
- data/lib/contrast/api/decorators/http_request.rb +3 -2
- data/lib/contrast/api/decorators/input_analysis.rb +1 -1
- data/lib/contrast/api/decorators/instrumentation_mode.rb +1 -1
- data/lib/contrast/api/decorators/ip_denylist.rb +37 -0
- data/lib/contrast/api/decorators/library.rb +1 -1
- data/lib/contrast/api/decorators/library_usage_update.rb +1 -1
- data/lib/contrast/api/decorators/message.rb +1 -1
- data/lib/contrast/api/decorators/rasp_rule_sample.rb +30 -1
- data/lib/contrast/api/decorators/route_coverage.rb +1 -1
- data/lib/contrast/api/decorators/server_features.rb +1 -1
- data/lib/contrast/api/decorators/trace_event.rb +1 -1
- data/lib/contrast/api/decorators/trace_event_object.rb +1 -1
- data/lib/contrast/api/decorators/trace_event_signature.rb +1 -1
- data/lib/contrast/api/decorators/trace_taint_range.rb +1 -1
- data/lib/contrast/api/decorators/trace_taint_range_tags.rb +1 -1
- data/lib/contrast/api/decorators/user_input.rb +12 -2
- data/lib/contrast/api/decorators/virtual_patch.rb +34 -0
- data/lib/contrast/api/decorators.rb +2 -1
- data/lib/contrast/api.rb +1 -1
- data/lib/contrast/components/agent.rb +5 -24
- data/lib/contrast/components/api.rb +18 -9
- data/lib/contrast/components/app_context.rb +2 -1
- data/lib/contrast/components/app_context_extend.rb +1 -1
- data/lib/contrast/components/assess.rb +12 -8
- data/lib/contrast/components/base.rb +1 -1
- data/lib/contrast/components/config.rb +30 -15
- data/lib/contrast/components/contrast_service.rb +1 -1
- data/lib/contrast/components/heap_dump.rb +1 -1
- data/lib/contrast/components/inventory.rb +5 -1
- data/lib/contrast/components/logger.rb +6 -1
- data/lib/contrast/components/protect.rb +10 -4
- data/lib/contrast/components/sampling.rb +1 -1
- data/lib/contrast/components/scope.rb +99 -92
- data/lib/contrast/components/settings.rb +25 -12
- data/lib/contrast/config/agent_configuration.rb +59 -13
- data/lib/contrast/config/api_configuration.rb +101 -13
- data/lib/contrast/config/api_proxy_configuration.rb +56 -4
- data/lib/contrast/config/application_configuration.rb +115 -16
- data/lib/contrast/config/assess_configuration.rb +107 -13
- data/lib/contrast/config/assess_rules_configuration.rb +45 -4
- data/lib/contrast/config/base_configuration.rb +2 -1
- data/lib/contrast/config/certification_configuration.rb +75 -4
- data/lib/contrast/config/env_variables.rb +1 -1
- data/lib/contrast/config/exception_configuration.rb +62 -4
- data/lib/contrast/config/heap_dump_configuration.rb +102 -18
- data/lib/contrast/config/inventory_configuration.rb +65 -4
- data/lib/contrast/config/logger_configuration.rb +47 -4
- data/lib/contrast/config/protect_configuration.rb +1 -1
- data/lib/contrast/config/protect_rule_configuration.rb +37 -10
- data/lib/contrast/config/protect_rules_configuration.rb +121 -18
- data/lib/contrast/config/request_audit_configuration.rb +69 -4
- data/lib/contrast/config/root_configuration.rb +1 -1
- data/lib/contrast/config/ruby_configuration.rb +97 -20
- data/lib/contrast/config/sampling_configuration.rb +77 -11
- data/lib/contrast/config/server_configuration.rb +57 -12
- data/lib/contrast/config/service_configuration.rb +1 -1
- data/lib/contrast/config.rb +1 -1
- data/lib/contrast/configuration.rb +7 -4
- data/lib/contrast/extension/assess/array.rb +4 -2
- data/lib/contrast/extension/assess/erb.rb +32 -5
- data/lib/contrast/extension/assess/eval_trigger.rb +3 -1
- data/lib/contrast/extension/assess/exec_trigger.rb +2 -1
- data/lib/contrast/extension/assess/fiber.rb +6 -3
- data/lib/contrast/extension/assess/hash.rb +1 -1
- data/lib/contrast/extension/assess/kernel.rb +8 -3
- data/lib/contrast/extension/assess/marshal.rb +6 -2
- data/lib/contrast/extension/assess/regexp.rb +8 -2
- data/lib/contrast/extension/assess/string.rb +8 -2
- data/lib/contrast/extension/assess.rb +1 -1
- data/lib/contrast/extension/delegator.rb +1 -1
- data/lib/contrast/extension/extension.rb +2 -4
- data/lib/contrast/extension/inventory.rb +1 -1
- data/lib/contrast/extension/module.rb +1 -1
- data/lib/contrast/extension/protect/psych.rb +1 -1
- data/lib/contrast/extension/protect.rb +1 -1
- data/lib/contrast/extension/thread.rb +32 -13
- data/lib/contrast/framework/base_support.rb +5 -1
- data/lib/contrast/framework/grape/support.rb +25 -1
- data/lib/contrast/framework/manager.rb +26 -5
- data/lib/contrast/framework/manager_extend.rb +1 -1
- data/lib/contrast/framework/platform_version.rb +1 -1
- data/lib/contrast/framework/rack/patch/session_cookie.rb +1 -1
- data/lib/contrast/framework/rack/patch/support.rb +1 -1
- data/lib/contrast/framework/rack/support.rb +1 -1
- data/lib/contrast/framework/rails/patch/action_controller_live_buffer.rb +1 -1
- data/lib/contrast/framework/rails/patch/assess_configuration.rb +1 -1
- data/lib/contrast/framework/rails/patch/rails_application_configuration.rb +1 -1
- data/lib/contrast/framework/rails/patch/support.rb +1 -1
- data/lib/contrast/framework/rails/railtie.rb +1 -1
- data/lib/contrast/framework/rails/support.rb +46 -2
- data/lib/contrast/framework/sinatra/support.rb +24 -2
- data/lib/contrast/funchook/funchook.rb +21 -18
- data/lib/contrast/logger/application.rb +1 -1
- data/lib/contrast/logger/cef_log.rb +151 -0
- data/lib/contrast/logger/format.rb +1 -1
- data/lib/contrast/logger/log.rb +1 -1
- data/lib/contrast/logger/request.rb +1 -1
- data/lib/contrast/logger/time.rb +1 -1
- data/lib/contrast/security_exception.rb +1 -1
- data/lib/contrast/tasks/config.rb +1 -1
- data/lib/contrast/tasks/service.rb +1 -1
- data/lib/contrast/utils/assess/propagation_method_utils.rb +1 -1
- data/lib/contrast/utils/assess/property/tagged_utils.rb +1 -1
- data/lib/contrast/utils/assess/sampling_util.rb +4 -4
- data/lib/contrast/utils/assess/source_method_utils.rb +1 -1
- data/lib/contrast/utils/assess/split_utils.rb +23 -0
- data/lib/contrast/utils/assess/tracking_util.rb +1 -1
- data/lib/contrast/utils/assess/trigger_method_utils.rb +3 -2
- data/lib/contrast/utils/class_util.rb +1 -1
- data/lib/contrast/utils/duck_utils.rb +1 -1
- data/lib/contrast/utils/env_configuration_item.rb +2 -2
- data/lib/contrast/utils/exclude_key.rb +1 -1
- data/lib/contrast/utils/findings.rb +5 -2
- data/lib/contrast/utils/hash_digest.rb +44 -6
- data/lib/contrast/utils/hash_digest_extend.rb +44 -1
- data/lib/contrast/utils/head_dump_utils_extend.rb +1 -1
- data/lib/contrast/utils/heap_dump_util.rb +1 -1
- data/lib/contrast/utils/invalid_configuration_util.rb +6 -5
- data/lib/contrast/utils/io_util.rb +1 -1
- data/lib/contrast/utils/job_servers_running.rb +1 -1
- data/lib/contrast/utils/log_utils.rb +115 -1
- data/lib/contrast/utils/lru_cache.rb +1 -1
- data/lib/contrast/utils/metrics_hash.rb +2 -2
- data/lib/contrast/utils/middleware_utils.rb +7 -8
- data/lib/contrast/utils/net_http_base.rb +26 -16
- data/lib/contrast/utils/object_share.rb +1 -6
- data/lib/contrast/utils/os.rb +9 -5
- data/lib/contrast/utils/patching/policy/patch_utils.rb +62 -102
- data/lib/contrast/utils/patching/policy/patcher_utils.rb +1 -1
- data/lib/contrast/utils/preflight_util.rb +1 -1
- data/lib/contrast/utils/request_utils.rb +9 -1
- data/lib/contrast/utils/resource_loader.rb +1 -1
- data/lib/contrast/utils/response_utils.rb +1 -1
- data/lib/contrast/utils/sha256_builder.rb +1 -1
- data/lib/contrast/utils/stack_trace_utils.rb +1 -1
- data/lib/contrast/utils/string_utils.rb +69 -67
- data/lib/contrast/utils/tag_util.rb +2 -1
- data/lib/contrast/utils/telemetry.rb +1 -1
- data/lib/contrast/utils/telemetry_client.rb +1 -1
- data/lib/contrast/utils/telemetry_identifier.rb +1 -1
- data/lib/contrast/utils/thread_tracker.rb +1 -1
- data/lib/contrast/utils/timer.rb +1 -1
- data/lib/contrast-agent.rb +1 -1
- data/lib/contrast.rb +5 -4
- data/resources/assess/policy.json +10 -0
- data/ruby-agent.gemspec +4 -5
- data/service_executables/VERSION +1 -1
- data/service_executables/linux/contrast-service +0 -0
- data/service_executables/mac/contrast-service +0 -0
- metadata +96 -40
- data/ext/cs__assess_active_record_named/cs__active_record_named.c +0 -46
- data/ext/cs__assess_active_record_named/cs__active_record_named.h +0 -11
- data/lib/contrast/agent/assess/policy/rewriter_patch.rb +0 -95
- data/lib/contrast/agent/class_reopener.rb +0 -258
- data/lib/contrast/agent/rewriter.rb +0 -259
- data/lib/contrast/extension/kernel.rb +0 -54
- data/lib/contrast/framework/rails/rewrite/action_controller_railties_helper_inherited.rb +0 -37
- data/lib/contrast/framework/rails/rewrite/active_record_attribute_methods_read.rb +0 -41
- data/lib/contrast/framework/rails/rewrite/active_record_named.rb +0 -75
- data/lib/contrast/framework/rails/rewrite/active_record_time_zone_inherited.rb +0 -35
- data/lib/contrast/utils/ruby_ast_rewriter.rb +0 -82
- data/lib/contrast/utils/substitution_utils.rb +0 -167
@@ -1,4 +1,4 @@
|
|
1
|
-
# Copyright (c)
|
1
|
+
# Copyright (c) 2022 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
|
2
2
|
# frozen_string_literal: true
|
3
3
|
|
4
4
|
require 'ipaddr'
|
@@ -169,9 +169,11 @@ module Contrast
|
|
169
169
|
request_handler.stream_safe_postfilter
|
170
170
|
else
|
171
171
|
request_handler.ruleset.postfilter
|
172
|
-
request_handler.
|
172
|
+
request_handler.report_activity
|
173
|
+
request_handler.send_activity_messages # TODO: RUBY-1438 -- remove
|
173
174
|
end
|
174
175
|
end
|
176
|
+
# unsuccessful attack
|
175
177
|
rescue StandardError => e
|
176
178
|
raise e if security_exception?(e)
|
177
179
|
|
@@ -1,4 +1,4 @@
|
|
1
|
-
# Copyright (c)
|
1
|
+
# Copyright (c) 2022 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
|
2
2
|
# frozen_string_literal: true
|
3
3
|
|
4
4
|
module Contrast
|
@@ -1,4 +1,4 @@
|
|
1
|
-
# Copyright (c)
|
1
|
+
# Copyright (c) 2022 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
|
2
2
|
# frozen_string_literal: true
|
3
3
|
|
4
4
|
require 'contrast/components/scope'
|
@@ -1,4 +1,4 @@
|
|
1
|
-
# Copyright (c)
|
1
|
+
# Copyright (c) 2022 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
|
2
2
|
# frozen_string_literal: true
|
3
3
|
|
4
4
|
require 'contrast/agent/patching/policy/after_load_patch'
|
@@ -29,14 +29,13 @@ module Contrast
|
|
29
29
|
# there are no require time side effects of loading our core
|
30
30
|
# extensions.
|
31
31
|
def apply_direct_patches!
|
32
|
-
@_apply_direct_patches ||= begin
|
32
|
+
@_apply_direct_patches ||= begin # TODO: RUBY-1541 - put 'kernel' back
|
33
33
|
paths = %w[
|
34
34
|
array
|
35
35
|
basic_object
|
36
36
|
module
|
37
37
|
fiber_track
|
38
38
|
hash
|
39
|
-
kernel
|
40
39
|
marshal_module
|
41
40
|
regexp
|
42
41
|
string
|
@@ -75,7 +74,6 @@ module Contrast
|
|
75
74
|
def apply_require_patches!
|
76
75
|
@_apply_require_patches ||= begin
|
77
76
|
require 'contrast/extension/thread'
|
78
|
-
require 'contrast/extension/kernel'
|
79
77
|
true
|
80
78
|
rescue LoadError, StandardError => e
|
81
79
|
logger.error('failed instrumenting apply_require_patches!', e)
|
@@ -1,4 +1,4 @@
|
|
1
|
-
# Copyright (c)
|
1
|
+
# Copyright (c) 2022 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
|
2
2
|
# frozen_string_literal: true
|
3
3
|
|
4
4
|
require 'contrast/agent/patching/policy/method_policy_extend'
|
@@ -13,20 +13,33 @@ module Contrast
|
|
13
13
|
attr_reader :deadzone_node, :inventory_node, :propagation_node, :protect_node, :trigger_node
|
14
14
|
attr_accessor :source_node, :method_name, :method_visibility, :instance_method
|
15
15
|
|
16
|
-
|
17
|
-
|
18
|
-
|
19
|
-
|
20
|
-
|
21
|
-
|
22
|
-
|
23
|
-
|
24
|
-
|
25
|
-
|
26
|
-
|
27
|
-
|
28
|
-
|
29
|
-
|
16
|
+
# Initialize new method policy with:
|
17
|
+
#
|
18
|
+
# @param method_policy [Hash]
|
19
|
+
# {
|
20
|
+
# source_node [ Contrast::Agent::Assesss::Policy::SourceNode ]
|
21
|
+
# propagation_node [ Contrast::Agent::Assesss::Policy::PropagationNode ]
|
22
|
+
# trigger_node [ Contrast::Agent::Assesss::Policy::TriggerNode ]
|
23
|
+
# inventory_node [ Contrast::Agent::Inventory::Policy::TriggerNode ]
|
24
|
+
# protect_node [ Contrast::Agent::Protect::Policy::TriggerNode ]
|
25
|
+
# deadzone_node [ Contrast::Agent::Deadzone::Policy::DeadzoneNode ]
|
26
|
+
# method_name [ Symbol ]
|
27
|
+
# the name of the method for this policy
|
28
|
+
# method_visibility [ Symbol ]
|
29
|
+
# Public, Private Protected
|
30
|
+
# instance_method [ Boolean ]
|
31
|
+
# true if this method is an instance method
|
32
|
+
# }
|
33
|
+
def initialize method_policy
|
34
|
+
@method_name = method_policy[:method_name]
|
35
|
+
@method_visibility = method_policy[:method_visibility]
|
36
|
+
@instance_method = method_policy[:instance_method]
|
37
|
+
@source_node = method_policy[:source_node]
|
38
|
+
@propagation_node = method_policy[:propagation_node]
|
39
|
+
@trigger_node = method_policy[:trigger_node]
|
40
|
+
@inventory_node = method_policy[:inventory_node]
|
41
|
+
@protect_node = method_policy[:protect_node]
|
42
|
+
@deadzone_node = method_policy[:deadzone_node]
|
30
43
|
end
|
31
44
|
|
32
45
|
def private_method?
|
@@ -1,4 +1,4 @@
|
|
1
|
-
# Copyright (c)
|
1
|
+
# Copyright (c) 2022 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
|
2
2
|
# frozen_string_literal: true
|
3
3
|
|
4
4
|
module Contrast
|
@@ -26,15 +26,17 @@ module Contrast
|
|
26
26
|
deadzone_node = find_method_node(module_policy.deadzone_nodes, method_name, instance_method)
|
27
27
|
method_visibility = find_visibility(source_node, propagation_node, trigger_node, protect_node,
|
28
28
|
inventory_node, deadzone_node)
|
29
|
-
method_policy = MethodPolicy.new(
|
30
|
-
|
31
|
-
|
32
|
-
|
33
|
-
|
34
|
-
|
35
|
-
|
36
|
-
|
37
|
-
|
29
|
+
method_policy = MethodPolicy.new({
|
30
|
+
method_name: method_name,
|
31
|
+
method_visibility: method_visibility,
|
32
|
+
instance_method: instance_method,
|
33
|
+
source_node: source_node,
|
34
|
+
propagation_node: propagation_node,
|
35
|
+
trigger_node: trigger_node,
|
36
|
+
protect_node: protect_node,
|
37
|
+
inventory_node: inventory_node,
|
38
|
+
deadzone_node: deadzone_node
|
39
|
+
})
|
38
40
|
|
39
41
|
return method_policy unless check_method_policy_nodes_empty? source_node, propagation_node, trigger_node,
|
40
42
|
protect_node, inventory_node, deadzone_node
|
@@ -1,4 +1,4 @@
|
|
1
|
-
# Copyright (c)
|
1
|
+
# Copyright (c) 2022 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
|
2
2
|
# frozen_string_literal: true
|
3
3
|
|
4
4
|
require 'contrast/agent/patching/policy/method_policy'
|
@@ -1,4 +1,4 @@
|
|
1
|
-
# Copyright (c)
|
1
|
+
# Copyright (c) 2022 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
|
2
2
|
# frozen_string_literal: true
|
3
3
|
|
4
4
|
require 'monitor'
|
@@ -49,15 +49,11 @@ module Contrast
|
|
49
49
|
].cs__freeze
|
50
50
|
|
51
51
|
def enter_method_scope! method_policy
|
52
|
-
method_policy.scopes_to_enter
|
53
|
-
enter_scope!(scope)
|
54
|
-
end
|
52
|
+
contrast_enter_method_scopes! method_policy.scopes_to_enter
|
55
53
|
end
|
56
54
|
|
57
55
|
def exit_method_scope! method_policy
|
58
|
-
method_policy.scopes_to_exit
|
59
|
-
exit_scope!(scope)
|
60
|
-
end
|
56
|
+
contrast_exit_method_scopes! method_policy.scopes_to_exit
|
61
57
|
end
|
62
58
|
|
63
59
|
# @param mod [Module] the module in which the patch should be
|
@@ -1,4 +1,4 @@
|
|
1
|
-
# Copyright (c)
|
1
|
+
# Copyright (c) 2022 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
|
2
2
|
# frozen_string_literal: true
|
3
3
|
|
4
4
|
module Contrast
|
@@ -125,7 +125,7 @@ module Contrast
|
|
125
125
|
MOD_ARRAY = [Module].cs__freeze
|
126
126
|
end
|
127
127
|
|
128
|
-
attr_reader :patch_status
|
128
|
+
attr_reader :patch_status
|
129
129
|
|
130
130
|
def patching!
|
131
131
|
@patch_status = :PATCHING
|
@@ -154,30 +154,6 @@ module Contrast
|
|
154
154
|
def patched?
|
155
155
|
@patch_status == :PATCHED || @patch_status == :NONE || @patch_status == :FAILED
|
156
156
|
end
|
157
|
-
|
158
|
-
def rewriting!
|
159
|
-
@rewrite_status = :REWRITING
|
160
|
-
end
|
161
|
-
|
162
|
-
def no_rewrite!
|
163
|
-
@rewrite_status = :NO_REWRITE
|
164
|
-
end
|
165
|
-
|
166
|
-
def rewritten!
|
167
|
-
@rewrite_status = :REWRITTEN
|
168
|
-
end
|
169
|
-
|
170
|
-
def failed_rewrite!
|
171
|
-
@rewrite_status = :FAILED_REWRITE
|
172
|
-
end
|
173
|
-
|
174
|
-
def rewriting?
|
175
|
-
@rewrite_status == :REWRITING
|
176
|
-
end
|
177
|
-
|
178
|
-
def rewritten?
|
179
|
-
@rewrite_status == :REWRITTEN || @rewrite_status == :NO_REWRITE || @rewrite_status == :FAILED_REWRITE
|
180
|
-
end
|
181
157
|
end
|
182
158
|
end
|
183
159
|
end
|
@@ -1,4 +1,4 @@
|
|
1
|
-
# Copyright (c)
|
1
|
+
# Copyright (c) 2022 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
|
2
2
|
# frozen_string_literal: true
|
3
3
|
|
4
4
|
require 'monitor'
|
@@ -15,8 +15,6 @@ require 'contrast/utils/patching/policy/patcher_utils'
|
|
15
15
|
# assess
|
16
16
|
require 'contrast/agent/assess/policy/policy'
|
17
17
|
require 'contrast/agent/assess/policy/policy_scanner'
|
18
|
-
# TODO: RUBY-714 remove guard w/ EOL of 2.5
|
19
|
-
require 'contrast/agent/assess/policy/rewriter_patch' if RUBY_VERSION < '2.6.0'
|
20
18
|
require 'contrast/agent/assess/policy/source_method'
|
21
19
|
require 'contrast/agent/assess/policy/trigger_method'
|
22
20
|
|
@@ -56,8 +54,6 @@ module Contrast
|
|
56
54
|
def patch
|
57
55
|
catchup_after_load_patches
|
58
56
|
catchup_loaded_methods
|
59
|
-
# TODO: RUBY-714 remove guard w/ EOL of 2.5
|
60
|
-
Contrast::Agent::Assess::Policy::RewriterPatch.rewrite_interpolations if RUBY_VERSION < '2.6.0'
|
61
57
|
end
|
62
58
|
|
63
59
|
# Hook to only monkeypatch Contrast. This will not trigger any
|
@@ -151,7 +147,7 @@ module Contrast
|
|
151
147
|
return
|
152
148
|
end
|
153
149
|
|
154
|
-
patch_methods
|
150
|
+
patch_methods(status, module_data, module_policy)
|
155
151
|
rescue StandardError => e
|
156
152
|
status&.failed_patch!
|
157
153
|
logger.warn('Patching failed', e, module: module_data.mod_name)
|
@@ -1,4 +1,4 @@
|
|
1
|
-
# Copyright (c)
|
1
|
+
# Copyright (c) 2022 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
|
2
2
|
# frozen_string_literal: true
|
3
3
|
|
4
4
|
require 'json'
|
@@ -1,4 +1,4 @@
|
|
1
|
-
# Copyright (c)
|
1
|
+
# Copyright (c) 2022 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
|
2
2
|
# frozen_string_literal: true
|
3
3
|
|
4
4
|
require 'contrast/components/scope'
|
@@ -1,4 +1,4 @@
|
|
1
|
-
# Copyright (c)
|
1
|
+
# Copyright (c) 2022 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
|
2
2
|
# frozen_string_literal: true
|
3
3
|
|
4
4
|
require 'contrast/extension/module'
|
@@ -0,0 +1,94 @@
|
|
1
|
+
# Copyright (c) 2022 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
|
2
|
+
# frozen_string_literal: true
|
3
|
+
|
4
|
+
require 'contrast/agent/reporting/input_analysis/input_type'
|
5
|
+
require 'contrast/agent/reporting/input_analysis/score_level'
|
6
|
+
require 'contrast/agent/reporting/input_analysis/input_analysis'
|
7
|
+
require 'contrast/agent/protect/rule/sqli/sqli_input_classification'
|
8
|
+
require 'json'
|
9
|
+
|
10
|
+
module Contrast
|
11
|
+
module Agent
|
12
|
+
module Protect
|
13
|
+
# InputAnalyzer will extract input form current request context and will analyze it.
|
14
|
+
# This will be used in for the SQLI and CMDI worth_watching_v2 implementations.
|
15
|
+
module InputAnalyzer
|
16
|
+
class << self
|
17
|
+
include Contrast::Agent::Reporting::InputType
|
18
|
+
include Contrast::Agent::Reporting::ScoreLevel
|
19
|
+
include Contrast::Agent::Protect::Rule::SqliWorthWatching
|
20
|
+
|
21
|
+
PROTECT_RULES = { sqli: 'sql-injection' }.cs__freeze
|
22
|
+
|
23
|
+
# This method with analyze the user input from the context of the
|
24
|
+
# current request and run each of the protect rules against all
|
25
|
+
# found input types
|
26
|
+
#
|
27
|
+
# @param request [Contrast::Agent::Request] current request context.
|
28
|
+
# @return input_analysis [Contrast::Agent::Reporting::InputAnalysis, nil]
|
29
|
+
def analyse request
|
30
|
+
return unless Contrast::SETTINGS.protect_state.enabled
|
31
|
+
return if request.nil?
|
32
|
+
|
33
|
+
inputs = extract_input request
|
34
|
+
return unless inputs
|
35
|
+
|
36
|
+
input_analysis = Contrast::Agent::Reporting::InputAnalysis.new
|
37
|
+
input_analysis.request = request
|
38
|
+
# each rule against each input
|
39
|
+
input_classification inputs, input_analysis
|
40
|
+
input_analysis
|
41
|
+
end
|
42
|
+
|
43
|
+
private
|
44
|
+
|
45
|
+
# classify input by rule implementation of worth_watching_v2 for the rules supporting it.
|
46
|
+
#
|
47
|
+
# @param inputs [String, Array<String>] user input to be analysed.
|
48
|
+
# @param input_analysis [Contrast::Agent::Reporting::InputAnalysis] Here we will keep all the results
|
49
|
+
# for each protect rule.
|
50
|
+
# @return input_analysis [Contrast::Agent::Reporting::InputAnalysis, nil]
|
51
|
+
def input_classification inputs, input_analysis
|
52
|
+
# key = input type, value = user_input
|
53
|
+
inputs.each do |input_type, value|
|
54
|
+
PROTECT_RULES.each do |_key, rule_id|
|
55
|
+
# check if rule is enabled
|
56
|
+
next unless Contrast::PROTECT.rule(rule_id).enabled?
|
57
|
+
|
58
|
+
# start with sqli rule
|
59
|
+
case rule_id
|
60
|
+
when PROTECT_RULES[:sqli]
|
61
|
+
Contrast::Agent::Protect::Rule::SqliInputClassification.classify input_type, value, input_analysis
|
62
|
+
else
|
63
|
+
return nil
|
64
|
+
end
|
65
|
+
end
|
66
|
+
end
|
67
|
+
input_analysis
|
68
|
+
end
|
69
|
+
|
70
|
+
# Extract the inputs from the request context and label them with Protect
|
71
|
+
# input type tags. Each tag will contain one or more user inputs.
|
72
|
+
#
|
73
|
+
# This methods is to be expanded and modified as needed by other Protect rules
|
74
|
+
# and sub-rules for their requirements.
|
75
|
+
#
|
76
|
+
# @param request [Contrast::Agent::Request] current request context.
|
77
|
+
# @return inputs [Hash<Contrast::Agent::Protect::InputType => user_inputs>]
|
78
|
+
def extract_input request
|
79
|
+
inputs = {}
|
80
|
+
inputs[BODY] = request.body
|
81
|
+
inputs[COOKIE_NAME] = request.cookies.keys
|
82
|
+
inputs[COOKIE_VALUE] = request.cookies.values
|
83
|
+
inputs[HEADER] = request.headers
|
84
|
+
inputs[PARAMETER_NAME] = request.parameters.keys
|
85
|
+
inputs[PARAMETER_VALUE] = request.parameters.values
|
86
|
+
inputs[QUERYSTRING] = request.query_string
|
87
|
+
inputs.compact!
|
88
|
+
inputs
|
89
|
+
end
|
90
|
+
end
|
91
|
+
end
|
92
|
+
end
|
93
|
+
end
|
94
|
+
end
|
@@ -1,4 +1,4 @@
|
|
1
|
-
# Copyright (c)
|
1
|
+
# Copyright (c) 2022 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
|
2
2
|
# frozen_string_literal: true
|
3
3
|
|
4
4
|
require 'contrast/agent/protect/rule/cmd_injection'
|
@@ -1,4 +1,4 @@
|
|
1
|
-
# Copyright (c)
|
1
|
+
# Copyright (c) 2022 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
|
2
2
|
# frozen_string_literal: true
|
3
3
|
|
4
4
|
require 'contrast/agent/protect/rule/deserialization'
|
@@ -1,4 +1,4 @@
|
|
1
|
-
# Copyright (c)
|
1
|
+
# Copyright (c) 2022 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
|
2
2
|
# frozen_string_literal: true
|
3
3
|
|
4
4
|
require 'contrast/agent/protect/rule/no_sqli'
|
@@ -1,4 +1,4 @@
|
|
1
|
-
# Copyright (c)
|
1
|
+
# Copyright (c) 2022 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
|
2
2
|
# frozen_string_literal: true
|
3
3
|
|
4
4
|
require 'contrast/agent/protect/rule/path_traversal'
|
@@ -1,4 +1,4 @@
|
|
1
|
-
# Copyright (c)
|
1
|
+
# Copyright (c) 2022 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
|
2
2
|
# frozen_string_literal: true
|
3
3
|
|
4
4
|
require 'contrast/agent/protect/rule/sqli'
|
@@ -1,4 +1,4 @@
|
|
1
|
-
# Copyright (c)
|
1
|
+
# Copyright (c) 2022 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
|
2
2
|
# frozen_string_literal: true
|
3
3
|
|
4
4
|
require 'contrast/agent/protect/rule/xxe'
|
@@ -1,4 +1,4 @@
|
|
1
|
-
# Copyright (c)
|
1
|
+
# Copyright (c) 2022 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
|
2
2
|
# frozen_string_literal: true
|
3
3
|
|
4
4
|
require 'contrast/agent/patching/policy/policy'
|
@@ -1,4 +1,4 @@
|
|
1
|
-
# Copyright (c)
|
1
|
+
# Copyright (c) 2022 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
|
2
2
|
# frozen_string_literal: true
|
3
3
|
|
4
4
|
require 'contrast/components/logger'
|
@@ -1,4 +1,4 @@
|
|
1
|
-
# Copyright (c)
|
1
|
+
# Copyright (c) 2022 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
|
2
2
|
# frozen_string_literal: true
|
3
3
|
|
4
4
|
require 'contrast/agent/patching/policy/trigger_node'
|
@@ -1,4 +1,4 @@
|
|
1
|
-
# Copyright (c)
|
1
|
+
# Copyright (c) 2022 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
|
2
2
|
# frozen_string_literal: true
|
3
3
|
|
4
4
|
require 'contrast/components/logger'
|
@@ -173,6 +173,19 @@ module Contrast
|
|
173
173
|
context.activity.results << result if result
|
174
174
|
end
|
175
175
|
|
176
|
+
# With this we log to CEF
|
177
|
+
#
|
178
|
+
# @param result [Contrast::Api::Dtm::AttackResult]
|
179
|
+
# @param attack [Symbol] the type of message we want to send
|
180
|
+
# @param value [String] the input value we want to log
|
181
|
+
def cef_logging result, attack = :ineffective_attack, value = nil
|
182
|
+
sample_to_json = Contrast::Api::Dtm::RaspRuleSample.to_controlled_hash result.samples[0]
|
183
|
+
outcome = Contrast::Api::Dtm::AttackResult::ResponseType.get_name_by_tag(result.response)
|
184
|
+
input_type = extract_input_type sample_to_json[:user_input].input_type
|
185
|
+
input_value = value || sample_to_json[:user_input].value
|
186
|
+
cef_logger.send(attack, result.rule_id, outcome, input_type, input_value)
|
187
|
+
end
|
188
|
+
|
176
189
|
protected
|
177
190
|
|
178
191
|
def mode_from_settings
|
@@ -232,7 +245,13 @@ module Contrast
|
|
232
245
|
|
233
246
|
def update_perimeter_attack_response context, ia_result, result
|
234
247
|
if mode == Contrast::Api::Settings::ProtectionRule::Mode::BLOCK_AT_PERIMETER
|
235
|
-
result.response = Contrast::
|
248
|
+
result.response = if ia_result&.rule_id == Contrast::Agent::Protect::Rule::Sqli::NAME
|
249
|
+
# Block At Perimeter mode has been deprecated in sqli_worth_watching_v2
|
250
|
+
# and should be treated equivalent to Blocked mode if set
|
251
|
+
Contrast::Api::Dtm::AttackResult::ResponseType::BLOCKED
|
252
|
+
else
|
253
|
+
Contrast::Api::Dtm::AttackResult::ResponseType::BLOCKED_AT_PERIMETER
|
254
|
+
end
|
236
255
|
log_rule_matched(context, ia_result, result.response)
|
237
256
|
elsif ia_result.nil? || ia_result.attack_count.zero?
|
238
257
|
result.response = Contrast::Api::Dtm::AttackResult::ResponseType::PROBED
|
@@ -293,6 +312,14 @@ module Contrast
|
|
293
312
|
result: response)
|
294
313
|
end
|
295
314
|
|
315
|
+
# This method returns the symbol for the enum
|
316
|
+
#
|
317
|
+
# @param enum [Enumerable]
|
318
|
+
# @return [Symbol]
|
319
|
+
def extract_input_type enum
|
320
|
+
Contrast::Api::Dtm::UserInput::InputType.get_name_by_tag enum
|
321
|
+
end
|
322
|
+
|
296
323
|
private
|
297
324
|
|
298
325
|
def log_rule_probed _context, ia_result
|
@@ -1,7 +1,8 @@
|
|
1
|
-
# Copyright (c)
|
1
|
+
# Copyright (c) 2022 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
|
2
2
|
# frozen_string_literal: true
|
3
3
|
|
4
4
|
require 'contrast/agent/protect/rule/base'
|
5
|
+
require 'contrast/components/logger'
|
5
6
|
|
6
7
|
module Contrast
|
7
8
|
module Agent
|
@@ -10,6 +11,8 @@ module Contrast
|
|
10
11
|
# Encapsulate common code for protect rules that do their
|
11
12
|
# input analysis on Speedracer rather in ruby code
|
12
13
|
class BaseService < Contrast::Agent::Protect::Rule::Base
|
14
|
+
include Contrast::Components::Logger::InstanceMethods
|
15
|
+
|
13
16
|
def rule_name
|
14
17
|
'base-service'
|
15
18
|
end
|
@@ -41,6 +44,7 @@ module Contrast
|
|
41
44
|
result = find_postfilter_attacker(context, nil)
|
42
45
|
return unless result&.samples&.any?
|
43
46
|
|
47
|
+
cef_logging result
|
44
48
|
append_to_activity(context, result)
|
45
49
|
return unless result.response == :BLOCKED
|
46
50
|
|
@@ -83,7 +87,12 @@ module Contrast
|
|
83
87
|
def find_postfilter_attacker context, potential_attack_string, **kwargs
|
84
88
|
ia_results = gather_ia_results(context)
|
85
89
|
ia_results.select! do |ia_result|
|
86
|
-
ia_result.score_level == Contrast::
|
90
|
+
ia_result.score_level == if ia_result.rule_id == Contrast::Agent::Protect::Rule::Sqli::NAME
|
91
|
+
Contrast::Agent::Reporting::ScoreLevel::WORTHWATCHING
|
92
|
+
else
|
93
|
+
# legacy implementation for DEFINITEATATACK
|
94
|
+
Contrast::Api::Settings::InputAnalysisResult::ScoreLevel::DEFINITEATTACK
|
95
|
+
end
|
87
96
|
end
|
88
97
|
find_attacker_with_results(context, potential_attack_string, ia_results, **kwargs)
|
89
98
|
end
|
@@ -1,4 +1,4 @@
|
|
1
|
-
# Copyright (c)
|
1
|
+
# Copyright (c) 2022 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
|
2
2
|
# frozen_string_literal: true
|
3
3
|
|
4
4
|
require 'contrast/agent/protect/rule/base_service'
|
@@ -39,6 +39,8 @@ module Contrast
|
|
39
39
|
return unless result
|
40
40
|
|
41
41
|
append_to_activity(context, result)
|
42
|
+
cef_logging result, :successful_attack
|
43
|
+
|
42
44
|
return unless blocked?
|
43
45
|
|
44
46
|
raise Contrast::SecurityException.new(self,
|
@@ -1,4 +1,4 @@
|
|
1
|
-
# Copyright (c)
|
1
|
+
# Copyright (c) 2022 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
|
2
2
|
# frozen_string_literal: true
|
3
3
|
|
4
4
|
# The base class used to determine if a user input crosses a token boundary or
|
@@ -1,7 +1,8 @@
|
|
1
|
-
# Copyright (c)
|
1
|
+
# Copyright (c) 2022 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
|
2
2
|
# frozen_string_literal: true
|
3
3
|
|
4
4
|
require 'contrast/agent/protect/rule/base'
|
5
|
+
require 'contrast/components/logger'
|
5
6
|
|
6
7
|
module Contrast
|
7
8
|
module Agent
|
@@ -11,6 +12,8 @@ module Contrast
|
|
11
12
|
# Deserialization Protect rule.
|
12
13
|
class Deserialization < Contrast::Agent::Protect::Rule::Base
|
13
14
|
# The TeamServer recognized name of this rule
|
15
|
+
include Contrast::Components::Logger::InstanceMethods
|
16
|
+
|
14
17
|
NAME = 'untrusted-deserialization'
|
15
18
|
|
16
19
|
# The rule specific reason for raising a security exception.
|
@@ -78,6 +81,8 @@ module Contrast
|
|
78
81
|
result = build_attack_with_match(context, ia_result, nil, serialized_input, **kwargs)
|
79
82
|
append_to_activity(context, result)
|
80
83
|
|
84
|
+
cef_logging result, :successful_attack
|
85
|
+
|
81
86
|
raise Contrast::SecurityException.new(self, block_message) if blocked?
|
82
87
|
end
|
83
88
|
|
@@ -97,6 +102,7 @@ module Contrast
|
|
97
102
|
ia_result = build_evaluation(gadget_command)
|
98
103
|
result = build_attack_with_match(context, ia_result, nil, gadget_command, **kwargs)
|
99
104
|
append_to_activity(context, result)
|
105
|
+
cef_logging result, :successful_attack, gadget_command
|
100
106
|
raise Contrast::SecurityException.new(self, BLOCK_MESSAGE) if blocked?
|
101
107
|
end
|
102
108
|
|
@@ -1,4 +1,4 @@
|
|
1
|
-
# Copyright (c)
|
1
|
+
# Copyright (c) 2022 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
|
2
2
|
# frozen_string_literal: true
|
3
3
|
|
4
4
|
require 'contrast/agent/protect/rule/base_service'
|
@@ -34,7 +34,11 @@ module Contrast
|
|
34
34
|
else
|
35
35
|
build_attack_with_match(context, nil, nil, nil, method: method, response_code: response_code)
|
36
36
|
end
|
37
|
-
|
37
|
+
|
38
|
+
return unless result
|
39
|
+
|
40
|
+
append_to_activity(context, result)
|
41
|
+
cef_logging result, :ineffective_attack
|
38
42
|
end
|
39
43
|
|
40
44
|
protected
|
@@ -1,4 +1,4 @@
|
|
1
|
-
# Copyright (c)
|
1
|
+
# Copyright (c) 2022 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
|
2
2
|
# frozen_string_literal: true
|
3
3
|
|
4
4
|
module Contrast
|
@@ -1,4 +1,4 @@
|
|
1
|
-
# Copyright (c)
|
1
|
+
# Copyright (c) 2022 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
|
2
2
|
# frozen_string_literal: true
|
3
3
|
|
4
4
|
require 'contrast/agent/protect/rule/base_service'
|
@@ -35,6 +35,7 @@ module Contrast
|
|
35
35
|
|
36
36
|
append_to_activity(context, result)
|
37
37
|
|
38
|
+
cef_logging result, :successful_attack
|
38
39
|
raise Contrast::SecurityException.new(self, BLOCK_MESSAGE) if blocked?
|
39
40
|
end
|
40
41
|
|