contrast-agent 4.3.2 → 4.7.0

Sign up to get free protection for your applications and to get access to all the features.
Files changed (317) hide show
  1. checksums.yaml +4 -4
  2. data/.gitmodules +1 -1
  3. data/.simplecov +1 -1
  4. data/Gemfile +1 -1
  5. data/LICENSE.txt +1 -1
  6. data/Rakefile +2 -3
  7. data/exe/contrast_service +1 -1
  8. data/ext/build_funchook.rb +4 -4
  9. data/ext/cs__assess_active_record_named/cs__active_record_named.c +1 -1
  10. data/ext/cs__assess_active_record_named/extconf.rb +1 -1
  11. data/ext/cs__assess_array/cs__assess_array.c +1 -1
  12. data/ext/cs__assess_array/extconf.rb +1 -1
  13. data/ext/cs__assess_basic_object/cs__assess_basic_object.c +1 -1
  14. data/ext/cs__assess_basic_object/extconf.rb +1 -1
  15. data/ext/cs__assess_fiber_track/cs__assess_fiber_track.c +1 -1
  16. data/ext/cs__assess_fiber_track/extconf.rb +1 -1
  17. data/ext/cs__assess_hash/cs__assess_hash.c +4 -2
  18. data/ext/cs__assess_hash/extconf.rb +1 -1
  19. data/ext/cs__assess_kernel/cs__assess_kernel.c +1 -1
  20. data/ext/cs__assess_kernel/extconf.rb +1 -1
  21. data/ext/cs__assess_marshal_module/cs__assess_marshal_module.c +1 -1
  22. data/ext/cs__assess_marshal_module/extconf.rb +1 -1
  23. data/ext/cs__assess_module/cs__assess_module.c +1 -1
  24. data/ext/cs__assess_module/extconf.rb +1 -1
  25. data/ext/cs__assess_regexp/cs__assess_regexp.c +1 -1
  26. data/ext/cs__assess_regexp/extconf.rb +1 -1
  27. data/ext/cs__assess_string/cs__assess_string.c +1 -1
  28. data/ext/cs__assess_string/extconf.rb +1 -1
  29. data/ext/cs__assess_string_interpolation26/cs__assess_string_interpolation26.c +1 -1
  30. data/ext/cs__assess_string_interpolation26/extconf.rb +1 -1
  31. data/ext/cs__assess_yield_track/cs__assess_yield_track.c +1 -1
  32. data/ext/cs__assess_yield_track/extconf.rb +1 -1
  33. data/ext/cs__common/cs__common.c +5 -5
  34. data/ext/cs__common/cs__common.h +4 -4
  35. data/ext/cs__common/extconf.rb +1 -1
  36. data/ext/cs__contrast_patch/cs__contrast_patch.c +22 -25
  37. data/ext/cs__contrast_patch/extconf.rb +1 -1
  38. data/ext/cs__protect_kernel/cs__protect_kernel.c +1 -1
  39. data/ext/cs__protect_kernel/extconf.rb +1 -1
  40. data/ext/extconf_common.rb +2 -6
  41. data/lib/contrast-agent.rb +1 -1
  42. data/lib/contrast.rb +20 -1
  43. data/lib/contrast/agent.rb +6 -4
  44. data/lib/contrast/agent/assess.rb +2 -11
  45. data/lib/contrast/agent/assess/contrast_event.rb +54 -71
  46. data/lib/contrast/agent/assess/contrast_object.rb +7 -4
  47. data/lib/contrast/agent/assess/events/event_factory.rb +3 -2
  48. data/lib/contrast/agent/assess/events/source_event.rb +7 -2
  49. data/lib/contrast/agent/assess/finalizers/freeze.rb +1 -1
  50. data/lib/contrast/agent/assess/finalizers/hash.rb +33 -34
  51. data/lib/contrast/agent/assess/policy/dynamic_source_factory.rb +34 -16
  52. data/lib/contrast/agent/assess/policy/patcher.rb +11 -18
  53. data/lib/contrast/agent/assess/policy/policy.rb +1 -1
  54. data/lib/contrast/agent/assess/policy/policy_node.rb +26 -34
  55. data/lib/contrast/agent/assess/policy/policy_scanner.rb +1 -1
  56. data/lib/contrast/agent/assess/policy/preshift.rb +4 -2
  57. data/lib/contrast/agent/assess/policy/propagation_method.rb +32 -30
  58. data/lib/contrast/agent/assess/policy/propagation_node.rb +20 -9
  59. data/lib/contrast/agent/assess/policy/propagator.rb +1 -1
  60. data/lib/contrast/agent/assess/policy/propagator/append.rb +29 -14
  61. data/lib/contrast/agent/assess/policy/propagator/base.rb +1 -1
  62. data/lib/contrast/agent/assess/policy/propagator/center.rb +3 -2
  63. data/lib/contrast/agent/assess/policy/propagator/custom.rb +1 -1
  64. data/lib/contrast/agent/assess/policy/propagator/database_write.rb +22 -17
  65. data/lib/contrast/agent/assess/policy/propagator/insert.rb +4 -2
  66. data/lib/contrast/agent/assess/policy/propagator/keep.rb +1 -1
  67. data/lib/contrast/agent/assess/policy/propagator/match_data.rb +3 -2
  68. data/lib/contrast/agent/assess/policy/propagator/next.rb +1 -1
  69. data/lib/contrast/agent/assess/policy/propagator/prepend.rb +1 -1
  70. data/lib/contrast/agent/assess/policy/propagator/remove.rb +23 -19
  71. data/lib/contrast/agent/assess/policy/propagator/replace.rb +1 -1
  72. data/lib/contrast/agent/assess/policy/propagator/reverse.rb +1 -1
  73. data/lib/contrast/agent/assess/policy/propagator/select.rb +3 -13
  74. data/lib/contrast/agent/assess/policy/propagator/splat.rb +24 -14
  75. data/lib/contrast/agent/assess/policy/propagator/split.rb +18 -15
  76. data/lib/contrast/agent/assess/policy/propagator/substitution.rb +32 -22
  77. data/lib/contrast/agent/assess/policy/propagator/trim.rb +64 -45
  78. data/lib/contrast/agent/assess/policy/rewriter_patch.rb +7 -4
  79. data/lib/contrast/agent/assess/policy/source_method.rb +92 -81
  80. data/lib/contrast/agent/assess/policy/source_node.rb +1 -1
  81. data/lib/contrast/agent/assess/policy/source_validation/cross_site_validator.rb +8 -6
  82. data/lib/contrast/agent/assess/policy/source_validation/source_validation.rb +2 -4
  83. data/lib/contrast/agent/assess/policy/trigger/reflected_xss.rb +7 -3
  84. data/lib/contrast/agent/assess/policy/trigger/xpath.rb +7 -8
  85. data/lib/contrast/agent/assess/policy/trigger_method.rb +109 -76
  86. data/lib/contrast/agent/assess/policy/trigger_node.rb +33 -11
  87. data/lib/contrast/agent/assess/policy/trigger_validation/redos_validator.rb +60 -0
  88. data/lib/contrast/agent/assess/policy/trigger_validation/ssrf_validator.rb +3 -5
  89. data/lib/contrast/agent/assess/policy/trigger_validation/trigger_validation.rb +7 -5
  90. data/lib/contrast/agent/assess/policy/trigger_validation/xss_validator.rb +4 -13
  91. data/lib/contrast/agent/assess/properties.rb +1 -3
  92. data/lib/contrast/agent/assess/property/evented.rb +9 -6
  93. data/lib/contrast/agent/assess/property/tagged.rb +38 -20
  94. data/lib/contrast/agent/assess/property/updated.rb +1 -1
  95. data/lib/contrast/agent/assess/rule/provider.rb +1 -1
  96. data/lib/contrast/agent/assess/rule/provider/hardcoded_key.rb +12 -6
  97. data/lib/contrast/agent/assess/rule/provider/hardcoded_password.rb +5 -2
  98. data/lib/contrast/agent/assess/rule/provider/hardcoded_value_rule.rb +4 -6
  99. data/lib/contrast/agent/assess/tag.rb +1 -1
  100. data/lib/contrast/agent/assess/tracker.rb +2 -2
  101. data/lib/contrast/agent/at_exit_hook.rb +1 -1
  102. data/lib/contrast/agent/class_reopener.rb +4 -2
  103. data/lib/contrast/agent/deadzone/policy/deadzone_node.rb +1 -1
  104. data/lib/contrast/agent/deadzone/policy/policy.rb +7 -3
  105. data/lib/contrast/agent/disable_reaction.rb +2 -4
  106. data/lib/contrast/agent/exclusion_matcher.rb +6 -12
  107. data/lib/contrast/agent/inventory.rb +1 -2
  108. data/lib/contrast/agent/inventory/dependencies.rb +3 -1
  109. data/lib/contrast/agent/inventory/dependency_analysis.rb +1 -1
  110. data/lib/contrast/agent/inventory/dependency_usage_analysis.rb +35 -23
  111. data/lib/contrast/agent/inventory/policy/datastores.rb +1 -1
  112. data/lib/contrast/agent/inventory/policy/policy.rb +1 -1
  113. data/lib/contrast/agent/inventory/policy/trigger_node.rb +1 -1
  114. data/lib/contrast/agent/middleware.rb +111 -110
  115. data/lib/contrast/agent/module_data.rb +4 -4
  116. data/lib/contrast/agent/patching/policy/after_load_patch.rb +1 -1
  117. data/lib/contrast/agent/patching/policy/after_load_patcher.rb +9 -4
  118. data/lib/contrast/agent/patching/policy/method_policy.rb +7 -3
  119. data/lib/contrast/agent/patching/policy/module_policy.rb +15 -8
  120. data/lib/contrast/agent/patching/policy/patch.rb +23 -29
  121. data/lib/contrast/agent/patching/policy/patch_status.rb +8 -9
  122. data/lib/contrast/agent/patching/policy/patcher.rb +72 -64
  123. data/lib/contrast/agent/patching/policy/policy.rb +14 -21
  124. data/lib/contrast/agent/patching/policy/policy_node.rb +15 -5
  125. data/lib/contrast/agent/patching/policy/trigger_node.rb +26 -10
  126. data/lib/contrast/agent/protect/policy/applies_command_injection_rule.rb +2 -2
  127. data/lib/contrast/agent/protect/policy/applies_deserialization_rule.rb +2 -2
  128. data/lib/contrast/agent/protect/policy/applies_no_sqli_rule.rb +2 -2
  129. data/lib/contrast/agent/protect/policy/applies_path_traversal_rule.rb +3 -4
  130. data/lib/contrast/agent/protect/policy/applies_sqli_rule.rb +2 -2
  131. data/lib/contrast/agent/protect/policy/applies_xxe_rule.rb +6 -10
  132. data/lib/contrast/agent/protect/policy/policy.rb +1 -1
  133. data/lib/contrast/agent/protect/policy/rule_applicator.rb +6 -6
  134. data/lib/contrast/agent/protect/policy/trigger_node.rb +1 -1
  135. data/lib/contrast/agent/protect/rule.rb +1 -1
  136. data/lib/contrast/agent/protect/rule/base.rb +19 -33
  137. data/lib/contrast/agent/protect/rule/base_service.rb +10 -6
  138. data/lib/contrast/agent/protect/rule/cmd_injection.rb +15 -19
  139. data/lib/contrast/agent/protect/rule/default_scanner.rb +1 -1
  140. data/lib/contrast/agent/protect/rule/deserialization.rb +7 -14
  141. data/lib/contrast/agent/protect/rule/http_method_tampering.rb +4 -15
  142. data/lib/contrast/agent/protect/rule/no_sqli.rb +7 -3
  143. data/lib/contrast/agent/protect/rule/no_sqli/mongo_no_sql_scanner.rb +2 -4
  144. data/lib/contrast/agent/protect/rule/path_traversal.rb +6 -6
  145. data/lib/contrast/agent/protect/rule/sqli.rb +19 -13
  146. data/lib/contrast/agent/protect/rule/sqli/default_sql_scanner.rb +1 -1
  147. data/lib/contrast/agent/protect/rule/sqli/mysql_sql_scanner.rb +1 -1
  148. data/lib/contrast/agent/protect/rule/sqli/postgres_sql_scanner.rb +2 -2
  149. data/lib/contrast/agent/protect/rule/sqli/sqlite_sql_scanner.rb +1 -1
  150. data/lib/contrast/agent/protect/rule/unsafe_file_upload.rb +2 -2
  151. data/lib/contrast/agent/protect/rule/xss.rb +2 -2
  152. data/lib/contrast/agent/protect/rule/xxe.rb +6 -13
  153. data/lib/contrast/agent/protect/rule/xxe/entity_wrapper.rb +2 -3
  154. data/lib/contrast/agent/railtie.rb +1 -1
  155. data/lib/contrast/agent/reaction_processor.rb +12 -11
  156. data/lib/contrast/agent/request.rb +25 -24
  157. data/lib/contrast/agent/request_context.rb +25 -23
  158. data/lib/contrast/agent/request_handler.rb +1 -1
  159. data/lib/contrast/agent/response.rb +1 -1
  160. data/lib/contrast/agent/rewriter.rb +6 -4
  161. data/lib/contrast/agent/rule_set.rb +3 -3
  162. data/lib/contrast/agent/scope.rb +1 -1
  163. data/lib/contrast/agent/service_heartbeat.rb +3 -4
  164. data/lib/contrast/agent/static_analysis.rb +1 -1
  165. data/lib/contrast/agent/thread.rb +2 -2
  166. data/lib/contrast/agent/thread_watcher.rb +21 -6
  167. data/lib/contrast/agent/tracepoint_hook.rb +2 -2
  168. data/lib/contrast/agent/version.rb +2 -2
  169. data/lib/contrast/agent/worker_thread.rb +1 -1
  170. data/lib/contrast/api.rb +1 -1
  171. data/lib/contrast/api/communication.rb +1 -1
  172. data/lib/contrast/api/communication/connection_status.rb +1 -1
  173. data/lib/contrast/api/communication/messaging_queue.rb +19 -22
  174. data/lib/contrast/api/communication/response_processor.rb +13 -8
  175. data/lib/contrast/api/communication/service_lifecycle.rb +5 -3
  176. data/lib/contrast/api/communication/socket.rb +1 -1
  177. data/lib/contrast/api/communication/socket_client.rb +30 -35
  178. data/lib/contrast/api/communication/speedracer.rb +6 -10
  179. data/lib/contrast/api/communication/tcp_socket.rb +1 -1
  180. data/lib/contrast/api/communication/unix_socket.rb +1 -1
  181. data/lib/contrast/api/decorators.rb +3 -1
  182. data/lib/contrast/api/decorators/address.rb +1 -1
  183. data/lib/contrast/api/decorators/agent_startup.rb +58 -0
  184. data/lib/contrast/api/decorators/application_settings.rb +1 -1
  185. data/lib/contrast/api/decorators/application_startup.rb +57 -0
  186. data/lib/contrast/api/decorators/application_update.rb +1 -1
  187. data/lib/contrast/api/decorators/http_request.rb +1 -1
  188. data/lib/contrast/api/decorators/input_analysis.rb +1 -1
  189. data/lib/contrast/api/decorators/instrumentation_mode.rb +37 -0
  190. data/lib/contrast/api/decorators/library.rb +9 -7
  191. data/lib/contrast/api/decorators/library_usage_update.rb +1 -1
  192. data/lib/contrast/api/decorators/message.rb +4 -4
  193. data/lib/contrast/api/decorators/rasp_rule_sample.rb +1 -1
  194. data/lib/contrast/api/decorators/route_coverage.rb +16 -6
  195. data/lib/contrast/api/decorators/server_features.rb +1 -1
  196. data/lib/contrast/api/decorators/trace_event.rb +46 -16
  197. data/lib/contrast/api/decorators/trace_event_object.rb +2 -4
  198. data/lib/contrast/api/decorators/trace_event_signature.rb +1 -1
  199. data/lib/contrast/api/decorators/trace_taint_range.rb +1 -1
  200. data/lib/contrast/api/decorators/trace_taint_range_tags.rb +2 -7
  201. data/lib/contrast/api/decorators/user_input.rb +1 -1
  202. data/lib/contrast/components/agent.rb +16 -15
  203. data/lib/contrast/components/app_context.rb +11 -29
  204. data/lib/contrast/components/assess.rb +6 -11
  205. data/lib/contrast/components/config.rb +3 -2
  206. data/lib/contrast/components/contrast_service.rb +8 -9
  207. data/lib/contrast/components/heap_dump.rb +1 -1
  208. data/lib/contrast/components/interface.rb +4 -3
  209. data/lib/contrast/components/inventory.rb +1 -1
  210. data/lib/contrast/components/logger.rb +1 -1
  211. data/lib/contrast/components/protect.rb +11 -14
  212. data/lib/contrast/components/sampling.rb +55 -7
  213. data/lib/contrast/components/scope.rb +2 -1
  214. data/lib/contrast/components/settings.rb +29 -99
  215. data/lib/contrast/config.rb +1 -1
  216. data/lib/contrast/config/agent_configuration.rb +1 -1
  217. data/lib/contrast/config/application_configuration.rb +1 -1
  218. data/lib/contrast/config/assess_configuration.rb +1 -1
  219. data/lib/contrast/config/assess_rules_configuration.rb +2 -4
  220. data/lib/contrast/config/base_configuration.rb +5 -6
  221. data/lib/contrast/config/default_value.rb +1 -1
  222. data/lib/contrast/config/exception_configuration.rb +2 -6
  223. data/lib/contrast/config/heap_dump_configuration.rb +13 -7
  224. data/lib/contrast/config/inventory_configuration.rb +1 -1
  225. data/lib/contrast/config/logger_configuration.rb +2 -6
  226. data/lib/contrast/config/protect_configuration.rb +1 -1
  227. data/lib/contrast/config/protect_rule_configuration.rb +23 -1
  228. data/lib/contrast/config/protect_rules_configuration.rb +1 -1
  229. data/lib/contrast/config/root_configuration.rb +1 -1
  230. data/lib/contrast/config/ruby_configuration.rb +1 -1
  231. data/lib/contrast/config/sampling_configuration.rb +1 -1
  232. data/lib/contrast/config/server_configuration.rb +1 -1
  233. data/lib/contrast/config/service_configuration.rb +1 -1
  234. data/lib/contrast/configuration.rb +4 -15
  235. data/lib/contrast/delegators/input_analysis.rb +12 -0
  236. data/lib/contrast/extension/assess.rb +1 -1
  237. data/lib/contrast/extension/assess/array.rb +2 -7
  238. data/lib/contrast/extension/assess/erb.rb +2 -8
  239. data/lib/contrast/extension/assess/eval_trigger.rb +3 -11
  240. data/lib/contrast/extension/assess/exec_trigger.rb +4 -14
  241. data/lib/contrast/extension/assess/fiber.rb +3 -13
  242. data/lib/contrast/extension/assess/hash.rb +1 -1
  243. data/lib/contrast/extension/assess/kernel.rb +3 -10
  244. data/lib/contrast/extension/assess/marshal.rb +3 -11
  245. data/lib/contrast/extension/assess/regexp.rb +2 -7
  246. data/lib/contrast/extension/assess/string.rb +4 -2
  247. data/lib/contrast/extension/delegator.rb +1 -1
  248. data/lib/contrast/extension/inventory.rb +1 -1
  249. data/lib/contrast/extension/kernel.rb +5 -3
  250. data/lib/contrast/extension/module.rb +1 -1
  251. data/lib/contrast/extension/protect.rb +1 -1
  252. data/lib/contrast/extension/protect/kernel.rb +1 -1
  253. data/lib/contrast/extension/protect/psych.rb +1 -1
  254. data/lib/contrast/extension/thread.rb +1 -1
  255. data/lib/contrast/framework/base_support.rb +1 -1
  256. data/lib/contrast/framework/manager.rb +14 -17
  257. data/lib/contrast/framework/platform_version.rb +1 -1
  258. data/lib/contrast/framework/rack/patch/session_cookie.rb +6 -19
  259. data/lib/contrast/framework/rack/patch/support.rb +7 -5
  260. data/lib/contrast/framework/rack/support.rb +1 -1
  261. data/lib/contrast/framework/rails/patch/action_controller_live_buffer.rb +1 -1
  262. data/lib/contrast/framework/rails/patch/assess_configuration.rb +8 -3
  263. data/lib/contrast/framework/rails/patch/rails_application_configuration.rb +4 -4
  264. data/lib/contrast/framework/rails/patch/support.rb +5 -3
  265. data/lib/contrast/framework/rails/rewrite/action_controller_railties_helper_inherited.rb +5 -2
  266. data/lib/contrast/framework/rails/rewrite/active_record_attribute_methods_read.rb +3 -1
  267. data/lib/contrast/framework/rails/rewrite/active_record_named.rb +3 -1
  268. data/lib/contrast/framework/rails/rewrite/active_record_time_zone_inherited.rb +3 -1
  269. data/lib/contrast/framework/rails/support.rb +45 -46
  270. data/lib/contrast/framework/sinatra/support.rb +103 -42
  271. data/lib/contrast/funchook/funchook.rb +2 -6
  272. data/lib/contrast/logger/application.rb +13 -10
  273. data/lib/contrast/logger/format.rb +3 -6
  274. data/lib/contrast/logger/log.rb +36 -19
  275. data/lib/contrast/logger/request.rb +2 -3
  276. data/lib/contrast/logger/time.rb +1 -1
  277. data/lib/contrast/security_exception.rb +2 -2
  278. data/lib/contrast/tasks/config.rb +1 -1
  279. data/lib/contrast/tasks/service.rb +6 -2
  280. data/lib/contrast/utils/assess/sampling_util.rb +1 -1
  281. data/lib/contrast/utils/assess/tracking_util.rb +2 -3
  282. data/lib/contrast/utils/class_util.rb +18 -12
  283. data/lib/contrast/utils/duck_utils.rb +1 -1
  284. data/lib/contrast/utils/env_configuration_item.rb +1 -1
  285. data/lib/contrast/utils/hash_digest.rb +16 -24
  286. data/lib/contrast/utils/heap_dump_util.rb +104 -88
  287. data/lib/contrast/utils/invalid_configuration_util.rb +22 -13
  288. data/lib/contrast/utils/inventory_util.rb +1 -1
  289. data/lib/contrast/utils/io_util.rb +2 -2
  290. data/lib/contrast/utils/job_servers_running.rb +10 -5
  291. data/lib/contrast/utils/object_share.rb +1 -1
  292. data/lib/contrast/utils/os.rb +3 -2
  293. data/lib/contrast/utils/preflight_util.rb +1 -1
  294. data/lib/contrast/utils/resource_loader.rb +1 -1
  295. data/lib/contrast/utils/ruby_ast_rewriter.rb +3 -2
  296. data/lib/contrast/utils/sha256_builder.rb +1 -1
  297. data/lib/contrast/utils/stack_trace_utils.rb +1 -1
  298. data/lib/contrast/utils/string_utils.rb +1 -1
  299. data/lib/contrast/utils/tag_util.rb +1 -1
  300. data/lib/contrast/utils/thread_tracker.rb +1 -1
  301. data/lib/contrast/utils/timer.rb +1 -1
  302. data/resources/assess/policy.json +8 -11
  303. data/resources/deadzone/policy.json +7 -17
  304. data/ruby-agent.gemspec +66 -27
  305. data/service_executables/VERSION +1 -1
  306. data/service_executables/linux/contrast-service +0 -0
  307. data/service_executables/mac/contrast-service +0 -0
  308. data/sonar-project.properties +9 -0
  309. metadata +154 -156
  310. data/lib/contrast/agent/assess/rule.rb +0 -18
  311. data/lib/contrast/agent/assess/rule/base.rb +0 -52
  312. data/lib/contrast/agent/assess/rule/redos.rb +0 -67
  313. data/lib/contrast/agent/inventory/gemfile_digest_cache.rb +0 -38
  314. data/lib/contrast/common_agent_configuration.rb +0 -87
  315. data/lib/contrast/framework/sinatra/patch/base.rb +0 -83
  316. data/lib/contrast/framework/sinatra/patch/support.rb +0 -27
  317. data/lib/contrast/utils/prevent_serialization.rb +0 -52
@@ -1,4 +1,4 @@
1
- # Copyright (c) 2020 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
1
+ # Copyright (c) 2021 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
2
2
  # frozen_string_literal: true
3
3
 
4
4
  require 'contrast/agent/protect/rule/base'
@@ -10,7 +10,7 @@ module Contrast
10
10
  # Encapsulate common code for protect rules that do their
11
11
  # input analysis on Speedracer rather in ruby code
12
12
  class BaseService < Contrast::Agent::Protect::Rule::Base
13
- def name
13
+ def rule_name
14
14
  'base-service'
15
15
  end
16
16
 
@@ -32,7 +32,11 @@ module Contrast
32
32
  # streamed responses will break
33
33
  def postfilter context
34
34
  return unless enabled? && POSTFILTER_MODES.include?(mode)
35
- return if mode == :NO_ACTION || mode == :PERMIT
35
+ if mode == Contrast::Api::Settings::ProtectionRule::Mode::NO_ACTION ||
36
+ mode == Contrast::Api::Settings::ProtectionRule::Mode::PERMIT
37
+
38
+ return
39
+ end
36
40
 
37
41
  result = find_postfilter_attacker(context, nil)
38
42
  return unless result&.samples&.any?
@@ -40,14 +44,14 @@ module Contrast
40
44
  append_to_activity(context, result)
41
45
  return unless result.response == :BLOCKED
42
46
 
43
- raise Contrast::SecurityException.new(self, "#{ name } triggered in postfilter. Response blocked.")
47
+ raise Contrast::SecurityException.new(self, "#{ rule_name } triggered in postfilter. Response blocked.")
44
48
  end
45
49
 
46
50
  protected
47
51
 
48
52
  def gather_ia_results context
49
53
  context.speedracer_input_analysis.results.select do |ia_result|
50
- ia_result.rule_id == name
54
+ ia_result.rule_id == rule_name
51
55
  end
52
56
  end
53
57
 
@@ -58,7 +62,7 @@ module Contrast
58
62
 
59
63
  # Allows for the InputAnalysis from service to be extracted early
60
64
  def find_attacker_with_results context, potential_attack_string, ia_results, **kwargs
61
- logger.trace('Checking vectors for attacks', rule: name, input: potential_attack_string)
65
+ logger.trace('Checking vectors for attacks', rule: rule_name, input: potential_attack_string)
62
66
 
63
67
  result = nil
64
68
  ia_results.each do |ia_result|
@@ -1,4 +1,4 @@
1
- # Copyright (c) 2020 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
1
+ # Copyright (c) 2021 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
2
2
  # frozen_string_literal: true
3
3
 
4
4
  require 'contrast/agent/protect/rule/base_service'
@@ -18,7 +18,7 @@ module Contrast
18
18
  NAME = 'cmd-injection'
19
19
  CHAINED_COMMAND_CHARS = /[;&|<>]/.cs__freeze
20
20
 
21
- def name
21
+ def rule_name
22
22
  NAME
23
23
  end
24
24
 
@@ -34,20 +34,25 @@ module Contrast
34
34
  Contrast::Agent::REQUEST_TRACKER.update_current_context(context)
35
35
  end
36
36
 
37
- result = find_attacker_with_results(context, command, ia_results, **{ classname: classname, method: method })
37
+ result = find_attacker_with_results(context, command, ia_results,
38
+ **{ classname: classname, method: method })
38
39
  result ||= report_command_execution(context, command, **{ classname: classname, method: method })
39
40
  return unless result
40
41
 
41
42
  append_to_activity(context, result)
42
43
  return unless blocked?
43
44
 
44
- raise Contrast::SecurityException.new(
45
- self,
46
- "Command Injection rule triggered. Call to #{ classname }.#{ method } blocked.")
45
+ raise Contrast::SecurityException.new(self,
46
+ 'Command Injection rule triggered. '\
47
+ "Call to #{ classname }.#{ method } blocked.")
47
48
  end
48
49
 
49
50
  def build_attack_with_match context, input_analysis_result, result, candidate_string, **kwargs
50
- return result if mode == :NO_ACTION || mode == :PERMIT
51
+ if mode == Contrast::Api::Settings::ProtectionRule::Mode::NO_ACTION ||
52
+ mode == Contrast::Api::Settings::ProtectionRule::Mode::PERMIT
53
+
54
+ return result
55
+ end
51
56
 
52
57
  result ||= build_attack_result(context)
53
58
  update_successful_attack_response(context, input_analysis_result, result, candidate_string)
@@ -60,14 +65,10 @@ module Contrast
60
65
  # Because results are not necessarily on the context across
61
66
  # processes; extract early and pass into the method
62
67
  def find_attacker_with_results context, potential_attack_string, ia_results, **kwargs
63
- logger.trace('Checking vectors for attacks', rule: name, input: potential_attack_string)
68
+ logger.trace('Checking vectors for attacks', rule: rule_name, input: potential_attack_string)
64
69
  result = super(context, potential_attack_string, ia_results, **kwargs)
65
70
  if result.nil? && potential_attack_string
66
- result = find_probable_attacker(
67
- context,
68
- potential_attack_string,
69
- ia_results,
70
- **kwargs)
71
+ result = find_probable_attacker(context, potential_attack_string, ia_results, **kwargs)
71
72
  end
72
73
  result
73
74
  end
@@ -109,12 +110,7 @@ module Contrast
109
110
  likely_attacker = ia_results.find { |input_analysis_result| chained_command?(input_analysis_result.value) }
110
111
  return unless likely_attacker
111
112
 
112
- build_attack_with_match(
113
- context,
114
- likely_attacker,
115
- nil,
116
- potential_attack_string,
117
- **kwargs)
113
+ build_attack_with_match(context, likely_attacker, nil, potential_attack_string, **kwargs)
118
114
  end
119
115
 
120
116
  def chained_command? command
@@ -1,4 +1,4 @@
1
- # Copyright (c) 2020 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
1
+ # Copyright (c) 2021 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
2
2
  # frozen_string_literal: true
3
3
 
4
4
  # The base class used to determine if a user input crosses a token boundary or
@@ -1,4 +1,4 @@
1
- # Copyright (c) 2020 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
1
+ # Copyright (c) 2021 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
2
2
  # frozen_string_literal: true
3
3
 
4
4
  require 'contrast/agent/protect/rule/base'
@@ -17,10 +17,7 @@ module Contrast
17
17
  BLOCK_MESSAGE = 'Untrusted Deserialization rule triggered. Deserialization blocked.'
18
18
 
19
19
  # Gadgets that map to ERB modules
20
- ERB_GADGETS = %W[
21
- object:ERB
22
- o:\bERB
23
- ].cs__freeze
20
+ ERB_GADGETS = %W[object:ERB o:\bERB].cs__freeze
24
21
 
25
22
  # Gadgets that map to ActionDispatch modules
26
23
  ACTION_DISPATCH_GADGETS = %w[
@@ -29,11 +26,7 @@ module Contrast
29
26
  ].cs__freeze
30
27
 
31
28
  # Gadgets that map to Arel Modules
32
- AREL_GADGETS = %w[
33
- string:Arel::Nodes::SqlLiteral
34
- object:Arel::Nodes
35
- o:\bArel::Nodes
36
- ].cs__freeze
29
+ AREL_GADGETS = %w[string:Arel::Nodes::SqlLiteral object:Arel::Nodes o:\bArel::Nodes].cs__freeze
37
30
 
38
31
  # Used to indicate to TeamServer the gadget is an ERB module
39
32
  ERB = 'ERB'
@@ -45,7 +38,7 @@ module Contrast
45
38
 
46
39
  # Return the TeamServer understood id / name of this rule.
47
40
  # @return [String] the TeamServer understood id / name of this rule.
48
- def name
41
+ def rule_name
49
42
  NAME
50
43
  end
51
44
 
@@ -124,8 +117,8 @@ module Contrast
124
117
  sample = build_base_sample(context, input_analysis_result)
125
118
  sample.untrusted_deserialization = Contrast::Api::Dtm::UntrustedDeserializationDetails.new
126
119
 
127
- deserializer = kwargs[:GADGET_TYPE]
128
- sample.untrusted_deserialization.deserializer = Contrast::Utils::StringUtils.protobuf_safe_string(deserializer)
120
+ deserializer = Contrast::Utils::StringUtils.protobuf_safe_string(kwargs[:GADGET_TYPE])
121
+ sample.untrusted_deserialization.deserializer = deserializer
129
122
 
130
123
  command = !!kwargs[:COMMAND_SCOPE]
131
124
  sample.untrusted_deserialization.command = command
@@ -148,7 +141,7 @@ module Contrast
148
141
  # of the analysis done by this rule.
149
142
  def build_evaluation gadget_string
150
143
  ia_result = Contrast::Api::Settings::InputAnalysisResult.new
151
- ia_result.rule_id = name
144
+ ia_result.rule_id = rule_name
152
145
  ia_result.input_type = :UNKNOWN
153
146
  ia_result.key = INPUT_NAME
154
147
  ia_result.value = Contrast::Utils::StringUtils.protobuf_safe_string(gadget_string)
@@ -1,4 +1,4 @@
1
- # Copyright (c) 2020 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
1
+ # Copyright (c) 2021 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
2
2
  # frozen_string_literal: true
3
3
 
4
4
  require 'contrast/agent/protect/rule/base_service'
@@ -12,7 +12,7 @@ module Contrast
12
12
  NAME = 'method-tampering'
13
13
  STANDARD_METHODS = %w[GET HEAD POST PUT DELETE CONNECT OPTIONS TRACE PATCH].cs__freeze
14
14
 
15
- def name
15
+ def rule_name
16
16
  NAME
17
17
  end
18
18
 
@@ -30,20 +30,9 @@ module Contrast
30
30
 
31
31
  method = ia_results.first.value
32
32
  result = if response_code.to_s.start_with?('4', '5')
33
- build_attack_without_match(
34
- context,
35
- nil,
36
- nil,
37
- method: method,
38
- response_code: response_code)
33
+ build_attack_without_match(context, nil, nil, method: method, response_code: response_code)
39
34
  else
40
- build_attack_with_match(
41
- context,
42
- nil,
43
- nil,
44
- nil,
45
- method: method,
46
- response_code: response_code)
35
+ build_attack_with_match(context, nil, nil, nil, method: method, response_code: response_code)
47
36
  end
48
37
  append_to_activity(context, result) if result
49
38
  end
@@ -1,4 +1,4 @@
1
- # Copyright (c) 2020 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
1
+ # Copyright (c) 2021 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
2
2
  # frozen_string_literal: true
3
3
 
4
4
  require 'contrast/agent/protect/rule/base_service'
@@ -12,7 +12,7 @@ module Contrast
12
12
  NAME = 'nosql-injection'
13
13
  BLOCK_MESSAGE = 'NoSQLi rule triggered. Response blocked.'
14
14
 
15
- def name
15
+ def rule_name
16
16
  NAME
17
17
  end
18
18
 
@@ -32,7 +32,11 @@ module Contrast
32
32
  end
33
33
 
34
34
  def build_attack_with_match context, input_analysis_result, result, query_string, **kwargs
35
- return result if mode == :NO_ACTION || mode == :PERMIT
35
+ if mode == Contrast::Api::Settings::ProtectionRule::Mode::NO_ACTION ||
36
+ mode == Contrast::Api::Settings::ProtectionRule::Mode::PERMIT
37
+
38
+ return result
39
+ end
36
40
 
37
41
  attack_string = input_analysis_result.value
38
42
  regexp = Regexp.new(Regexp.escape(attack_string), Regexp::IGNORECASE)
@@ -1,4 +1,4 @@
1
- # Copyright (c) 2020 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
1
+ # Copyright (c) 2021 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
2
2
  # frozen_string_literal: true
3
3
 
4
4
  module Contrast
@@ -14,9 +14,7 @@ module Contrast
14
14
  # Is the current & next character '//' or are the current and
15
15
  # subsequent characters '<--' ?
16
16
  def start_line_comment? char, index, query
17
- if char == Contrast::Utils::ObjectShare::SLASH &&
18
- query[index + 1] == Contrast::Utils::ObjectShare::SLASH
19
-
17
+ if char == Contrast::Utils::ObjectShare::SLASH && query[index + 1] == Contrast::Utils::ObjectShare::SLASH
20
18
  return true
21
19
  end
22
20
 
@@ -1,4 +1,4 @@
1
- # Copyright (c) 2020 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
1
+ # Copyright (c) 2021 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
2
2
  # frozen_string_literal: true
3
3
 
4
4
  require 'contrast/agent/protect/rule/base_service'
@@ -29,7 +29,7 @@ module Contrast
29
29
  /windows/repair/
30
30
  ].cs__freeze
31
31
 
32
- def name
32
+ def rule_name
33
33
  NAME
34
34
  end
35
35
 
@@ -42,9 +42,8 @@ module Contrast
42
42
  append_to_activity(context, result)
43
43
  return unless blocked?
44
44
 
45
- raise Contrast::SecurityException.new(
46
- self,
47
- "Path Traversal rule triggered. Call to File.#{ method } blocked.")
45
+ raise Contrast::SecurityException.new(self,
46
+ "Path Traversal rule triggered. Call to File.#{ method } blocked.")
48
47
  end
49
48
 
50
49
  protected
@@ -128,7 +127,8 @@ module Contrast
128
127
  # return 'NUL' in str(e) or 'null byte' in str(e) or (PY34 and 'embedded NUL character' == str(e))
129
128
  # except Exception as e:
130
129
  # return 'null byte' in str(e).lower()
131
- # return return any([bypass_markers.lower().rstrip('/') in realpath for bypass_markers in PathTraversalREPMixin.KNOWN_SECURITY_BYPASS_MARKERS])
130
+ # return return any([bypass_markers.lower().rstrip('/') in realpath for bypass_markers in
131
+ # PathTraversalREPMixin.KNOWN_SECURITY_BYPASS_MARKERS])
132
132
  false
133
133
  end
134
134
  end
@@ -1,4 +1,4 @@
1
- # Copyright (c) 2020 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
1
+ # Copyright (c) 2021 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
2
2
  # frozen_string_literal: true
3
3
 
4
4
  require 'contrast/agent/protect/rule/base_service'
@@ -13,7 +13,7 @@ module Contrast
13
13
  NAME = 'sql-injection'
14
14
  BLOCK_MESSAGE = 'SQLi rule triggered. Response blocked.'
15
15
 
16
- def name
16
+ def rule_name
17
17
  NAME
18
18
  end
19
19
 
@@ -50,16 +50,9 @@ module Contrast
50
50
  last_boundary, boundary = scanner.crosses_boundary(query_string, idx, input_analysis_result.value)
51
51
  next unless last_boundary && boundary
52
52
 
53
- input_analysis_result.attack_count = input_analysis_result.attack_count + 1
54
-
55
- kwargs[:start_idx] = idx
56
- kwargs[:end_idx] = idx + length
57
- kwargs[:boundary_overrun_idx] = boundary
58
- kwargs[:input_boundary_idx] = last_boundary
59
-
60
53
  result ||= build_attack_result(context)
61
- update_successful_attack_response(context, input_analysis_result, result, query_string)
62
- append_sample(context, input_analysis_result, result, query_string, **kwargs)
54
+ record_match(idx, length, boundary, last_boundary, kwargs)
55
+ append_match(context, input_analysis_result, result, query_string, **kwargs)
63
56
  end
64
57
 
65
58
  result
@@ -75,13 +68,26 @@ module Contrast
75
68
  sample.sqli.query = Contrast::Utils::StringUtils.protobuf_safe_string(candidate_string)
76
69
  sample.sqli.start_idx = sample.sqli.query.index(input).to_i
77
70
  sample.sqli.end_idx = sample.sqli.start_idx + input.length
78
- sample.sqli.boundary_overrun_idx = kwargs[:boundary].to_i
79
- sample.sqli.input_boundary_idx = kwargs[:last_boundary].to_i
71
+ sample.sqli.boundary_overrun_idx = kwargs[:boundary_overrun_idx].to_i
72
+ sample.sqli.input_boundary_idx = kwargs[:input_boundary_idx].to_i
80
73
  sample
81
74
  end
82
75
 
83
76
  private
84
77
 
78
+ def record_match idx, length, boundary, last_boundary, kwargs
79
+ kwargs[:start_idx] = idx
80
+ kwargs[:end_idx] = idx + length
81
+ kwargs[:boundary_overrun_idx] = boundary
82
+ kwargs[:input_boundary_idx] = last_boundary
83
+ end
84
+
85
+ def append_match context, input_analysis_result, result, query_string, **kwargs
86
+ input_analysis_result.attack_count = input_analysis_result.attack_count + 1
87
+ update_successful_attack_response(context, input_analysis_result, result, query_string)
88
+ append_sample(context, input_analysis_result, result, query_string, **kwargs)
89
+ end
90
+
85
91
  def select_scanner database
86
92
  @sql_scanners ||= {
87
93
  Contrast::Agent::Protect::Policy::AppliesSqliRule::DATABASE_MYSQL =>
@@ -1,4 +1,4 @@
1
- # Copyright (c) 2020 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
1
+ # Copyright (c) 2021 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
2
2
  # frozen_string_literal: true
3
3
 
4
4
  module Contrast
@@ -1,4 +1,4 @@
1
- # Copyright (c) 2020 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
1
+ # Copyright (c) 2021 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
2
2
  # frozen_string_literal: true
3
3
 
4
4
  # This class is the concrete implementation of the DefaultSqlScanner designed
@@ -1,7 +1,7 @@
1
- # Copyright (c) 2020 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
1
+ # Copyright (c) 2021 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
2
2
  # frozen_string_literal: true
3
3
 
4
- # Copyright (c) 2020 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
4
+ # Copyright (c) 2021 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
5
5
  # frozen_string_literal: true
6
6
 
7
7
  module Contrast
@@ -1,4 +1,4 @@
1
- # Copyright (c) 2020 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
1
+ # Copyright (c) 2021 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
2
2
  # frozen_string_literal: true
3
3
 
4
4
  module Contrast
@@ -1,4 +1,4 @@
1
- # Copyright (c) 2020 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
1
+ # Copyright (c) 2021 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
2
2
  # frozen_string_literal: true
3
3
 
4
4
  require 'contrast/agent/protect/rule/base_service'
@@ -12,7 +12,7 @@ module Contrast
12
12
  NAME = 'unsafe-file-upload'
13
13
  BLOCK_MESSAGE = 'Unsafe file upload rule triggered. Request blocked.'
14
14
 
15
- def name
15
+ def rule_name
16
16
  NAME
17
17
  end
18
18
  end
@@ -1,4 +1,4 @@
1
- # Copyright (c) 2020 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
1
+ # Copyright (c) 2021 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
2
2
  # frozen_string_literal: true
3
3
 
4
4
  require 'contrast/agent/protect/rule/base_service'
@@ -12,7 +12,7 @@ module Contrast
12
12
  NAME = 'reflected-xss'
13
13
  BLOCK_MESSAGE = 'XSS rule triggered. Response blocked.'
14
14
 
15
- def name
15
+ def rule_name
16
16
  NAME
17
17
  end
18
18
 
@@ -1,4 +1,4 @@
1
- # Copyright (c) 2020 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
1
+ # Copyright (c) 2021 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
2
2
  # frozen_string_literal: true
3
3
 
4
4
  require 'contrast/agent/protect/rule/base'
@@ -15,7 +15,7 @@ module Contrast
15
15
  BLOCK_MESSAGE = 'XXE rule triggered. Response blocked.'
16
16
  EXTERNAL_ENTITY_PATTERN = /<!ENTITY\s+[a-zA-Z0-f]+\s+(?:SYSTEM|PUBLIC)\s+(.*?)>/.cs__freeze
17
17
 
18
- def name
18
+ def rule_name
19
19
  NAME
20
20
  end
21
21
 
@@ -59,12 +59,7 @@ module Contrast
59
59
  return unless xxe_details
60
60
 
61
61
  ia_result = build_evaluation(xxe_details.xml)
62
- build_attack_with_match(
63
- context,
64
- ia_result,
65
- nil,
66
- nil,
67
- details: xxe_details)
62
+ build_attack_with_match(context, ia_result, nil, nil, details: xxe_details)
68
63
  end
69
64
 
70
65
  # Given an XML determined to be unsafe, build out the details of the
@@ -118,7 +113,7 @@ module Contrast
118
113
  # supplied by the attacker.
119
114
  def build_evaluation xml
120
115
  ia_result = Contrast::Api::Settings::InputAnalysisResult.new
121
- ia_result.rule_id = name
116
+ ia_result.rule_id = rule_name
122
117
  ia_result.input_type = :UNKNOWN
123
118
  ia_result.value = Contrast::Utils::StringUtils.protobuf_safe_string(xml)
124
119
  ia_result
@@ -133,10 +128,8 @@ module Contrast
133
128
 
134
129
  def build_wrapper entity_wrapper
135
130
  wrapper = Contrast::Api::Dtm::XxeWrapper.new
136
- wrapper.system_id = Contrast::Utils::StringUtils.protobuf_safe_string(
137
- entity_wrapper.system_id)
138
- wrapper.public_id = Contrast::Utils::StringUtils.protobuf_safe_string(
139
- entity_wrapper.public_id)
131
+ wrapper.system_id = Contrast::Utils::StringUtils.protobuf_safe_string(entity_wrapper.system_id)
132
+ wrapper.public_id = Contrast::Utils::StringUtils.protobuf_safe_string(entity_wrapper.public_id)
140
133
  wrapper
141
134
  end
142
135
  end