contrast-agent 4.6.0 → 4.9.1

Sign up to get free protection for your applications and to get access to all the features.
Files changed (190) hide show
  1. checksums.yaml +4 -4
  2. data/.gitignore +6 -1
  3. data/.gitmodules +1 -1
  4. data/.simplecov +1 -0
  5. data/Rakefile +1 -2
  6. data/ext/build_funchook.rb +3 -3
  7. data/ext/extconf_common.rb +1 -5
  8. data/lib/contrast.rb +24 -14
  9. data/lib/contrast/agent/assess.rb +1 -1
  10. data/lib/contrast/agent/assess/contrast_event.rb +1 -4
  11. data/lib/contrast/agent/assess/contrast_object.rb +2 -2
  12. data/lib/contrast/agent/assess/events/event_factory.rb +2 -1
  13. data/lib/contrast/agent/assess/finalizers/hash.rb +2 -4
  14. data/lib/contrast/agent/assess/policy/dynamic_source_factory.rb +6 -3
  15. data/lib/contrast/agent/assess/policy/patcher.rb +16 -21
  16. data/lib/contrast/agent/assess/policy/policy.rb +1 -1
  17. data/lib/contrast/agent/assess/policy/policy_node.rb +25 -33
  18. data/lib/contrast/agent/assess/policy/policy_scanner.rb +3 -5
  19. data/lib/contrast/agent/assess/policy/preshift.rb +7 -5
  20. data/lib/contrast/agent/assess/policy/propagation_method.rb +10 -19
  21. data/lib/contrast/agent/assess/policy/propagation_node.rb +19 -8
  22. data/lib/contrast/agent/assess/policy/propagator.rb +1 -0
  23. data/lib/contrast/agent/assess/policy/propagator/center.rb +2 -1
  24. data/lib/contrast/agent/assess/policy/propagator/database_write.rb +3 -6
  25. data/lib/contrast/agent/assess/policy/propagator/insert.rb +3 -1
  26. data/lib/contrast/agent/assess/policy/propagator/match_data.rb +2 -1
  27. data/lib/contrast/agent/assess/policy/propagator/rack_protection.rb +73 -0
  28. data/lib/contrast/agent/assess/policy/propagator/select.rb +2 -12
  29. data/lib/contrast/agent/assess/policy/propagator/split.rb +12 -13
  30. data/lib/contrast/agent/assess/policy/propagator/substitution.rb +3 -10
  31. data/lib/contrast/agent/assess/policy/propagator/trim.rb +3 -15
  32. data/lib/contrast/agent/assess/policy/rewriter_patch.rb +13 -10
  33. data/lib/contrast/agent/assess/policy/source_method.rb +12 -12
  34. data/lib/contrast/agent/assess/policy/source_validation/source_validation.rb +1 -3
  35. data/lib/contrast/agent/assess/policy/trigger/reflected_xss.rb +5 -1
  36. data/lib/contrast/agent/assess/policy/trigger/xpath.rb +0 -3
  37. data/lib/contrast/agent/assess/policy/trigger_method.rb +8 -18
  38. data/lib/contrast/agent/assess/policy/trigger_node.rb +3 -2
  39. data/lib/contrast/agent/assess/policy/trigger_validation/redos_validator.rb +4 -3
  40. data/lib/contrast/agent/assess/policy/trigger_validation/ssrf_validator.rb +1 -2
  41. data/lib/contrast/agent/assess/policy/trigger_validation/xss_validator.rb +1 -8
  42. data/lib/contrast/agent/assess/property/evented.rb +8 -5
  43. data/lib/contrast/agent/assess/rule/provider/hardcoded_key.rb +11 -5
  44. data/lib/contrast/agent/assess/rule/provider/hardcoded_password.rb +4 -1
  45. data/lib/contrast/agent/assess/rule/provider/hardcoded_value_rule.rb +7 -9
  46. data/lib/contrast/agent/at_exit_hook.rb +3 -3
  47. data/lib/contrast/agent/class_reopener.rb +9 -6
  48. data/lib/contrast/agent/disable_reaction.rb +4 -7
  49. data/lib/contrast/agent/exclusion_matcher.rb +7 -14
  50. data/lib/contrast/agent/inventory/dependencies.rb +2 -0
  51. data/lib/contrast/agent/inventory/dependency_analysis.rb +2 -6
  52. data/lib/contrast/agent/inventory/dependency_usage_analysis.rb +3 -5
  53. data/lib/contrast/agent/inventory/policy/datastores.rb +3 -4
  54. data/lib/contrast/agent/inventory/policy/policy.rb +1 -1
  55. data/lib/contrast/agent/middleware.rb +17 -18
  56. data/lib/contrast/agent/module_data.rb +3 -3
  57. data/lib/contrast/agent/patching/policy/after_load_patch.rb +3 -3
  58. data/lib/contrast/agent/patching/policy/after_load_patcher.rb +9 -9
  59. data/lib/contrast/agent/patching/policy/method_policy.rb +6 -2
  60. data/lib/contrast/agent/patching/policy/module_policy.rb +14 -7
  61. data/lib/contrast/agent/patching/policy/patch.rb +20 -25
  62. data/lib/contrast/agent/patching/policy/patch_status.rb +6 -7
  63. data/lib/contrast/agent/patching/policy/patcher.rb +21 -18
  64. data/lib/contrast/agent/patching/policy/policy.rb +2 -4
  65. data/lib/contrast/agent/patching/policy/policy_node.rb +16 -7
  66. data/lib/contrast/agent/patching/policy/trigger_node.rb +21 -8
  67. data/lib/contrast/agent/protect/policy/applies_command_injection_rule.rb +1 -1
  68. data/lib/contrast/agent/protect/policy/applies_deserialization_rule.rb +1 -1
  69. data/lib/contrast/agent/protect/policy/applies_no_sqli_rule.rb +1 -1
  70. data/lib/contrast/agent/protect/policy/applies_path_traversal_rule.rb +2 -3
  71. data/lib/contrast/agent/protect/policy/applies_sqli_rule.rb +1 -1
  72. data/lib/contrast/agent/protect/policy/applies_xxe_rule.rb +5 -9
  73. data/lib/contrast/agent/protect/policy/policy.rb +1 -1
  74. data/lib/contrast/agent/protect/policy/rule_applicator.rb +7 -9
  75. data/lib/contrast/agent/protect/rule/base.rb +20 -23
  76. data/lib/contrast/agent/protect/rule/base_service.rb +9 -5
  77. data/lib/contrast/agent/protect/rule/cmd_injection.rb +18 -23
  78. data/lib/contrast/agent/protect/rule/deserialization.rb +6 -13
  79. data/lib/contrast/agent/protect/rule/http_method_tampering.rb +3 -14
  80. data/lib/contrast/agent/protect/rule/no_sqli.rb +6 -2
  81. data/lib/contrast/agent/protect/rule/no_sqli/mongo_no_sql_scanner.rb +1 -3
  82. data/lib/contrast/agent/protect/rule/path_traversal.rb +6 -10
  83. data/lib/contrast/agent/protect/rule/sqli.rb +1 -1
  84. data/lib/contrast/agent/protect/rule/unsafe_file_upload.rb +1 -1
  85. data/lib/contrast/agent/protect/rule/xss.rb +1 -1
  86. data/lib/contrast/agent/protect/rule/xxe.rb +5 -12
  87. data/lib/contrast/agent/protect/rule/xxe/entity_wrapper.rb +1 -2
  88. data/lib/contrast/agent/reaction_processor.rb +13 -13
  89. data/lib/contrast/agent/request.rb +27 -26
  90. data/lib/contrast/agent/request_context.rb +17 -22
  91. data/lib/contrast/agent/request_handler.rb +5 -3
  92. data/lib/contrast/agent/response.rb +2 -3
  93. data/lib/contrast/agent/rewriter.rb +9 -6
  94. data/lib/contrast/agent/rule_set.rb +5 -4
  95. data/lib/contrast/agent/service_heartbeat.rb +4 -6
  96. data/lib/contrast/agent/static_analysis.rb +6 -5
  97. data/lib/contrast/agent/thread.rb +2 -4
  98. data/lib/contrast/agent/thread_watcher.rb +3 -4
  99. data/lib/contrast/agent/tracepoint_hook.rb +5 -5
  100. data/lib/contrast/agent/version.rb +1 -1
  101. data/lib/contrast/api/communication/messaging_queue.rb +4 -5
  102. data/lib/contrast/api/communication/response_processor.rb +11 -13
  103. data/lib/contrast/api/communication/service_lifecycle.rb +9 -6
  104. data/lib/contrast/api/communication/socket_client.rb +22 -31
  105. data/lib/contrast/api/communication/speedracer.rb +8 -13
  106. data/lib/contrast/api/decorators/address.rb +2 -3
  107. data/lib/contrast/api/decorators/agent_startup.rb +7 -9
  108. data/lib/contrast/api/decorators/application_startup.rb +12 -10
  109. data/lib/contrast/api/decorators/application_update.rb +0 -4
  110. data/lib/contrast/api/decorators/http_request.rb +3 -7
  111. data/lib/contrast/api/decorators/instrumentation_mode.rb +3 -5
  112. data/lib/contrast/api/decorators/library.rb +8 -6
  113. data/lib/contrast/api/decorators/message.rb +9 -9
  114. data/lib/contrast/api/decorators/trace_event.rb +3 -1
  115. data/lib/contrast/api/decorators/trace_event_object.rb +3 -6
  116. data/lib/contrast/api/decorators/trace_taint_range_tags.rb +1 -6
  117. data/lib/contrast/components/agent.rb +17 -17
  118. data/lib/contrast/components/app_context.rb +11 -15
  119. data/lib/contrast/components/assess.rb +16 -16
  120. data/lib/contrast/components/base.rb +40 -0
  121. data/lib/contrast/components/config.rb +2 -3
  122. data/lib/contrast/components/contrast_service.rb +12 -18
  123. data/lib/contrast/components/heap_dump.rb +5 -4
  124. data/lib/contrast/components/inventory.rb +2 -7
  125. data/lib/contrast/components/logger.rb +1 -2
  126. data/lib/contrast/components/protect.rb +10 -13
  127. data/lib/contrast/components/sampling.rb +13 -7
  128. data/lib/contrast/components/scope.rb +0 -4
  129. data/lib/contrast/components/settings.rb +5 -7
  130. data/lib/contrast/config/assess_rules_configuration.rb +1 -3
  131. data/lib/contrast/config/base_configuration.rb +4 -5
  132. data/lib/contrast/config/exception_configuration.rb +1 -5
  133. data/lib/contrast/config/heap_dump_configuration.rb +12 -6
  134. data/lib/contrast/config/logger_configuration.rb +1 -5
  135. data/lib/contrast/configuration.rb +6 -18
  136. data/lib/contrast/extension/assess/array.rb +3 -10
  137. data/lib/contrast/extension/assess/erb.rb +1 -7
  138. data/lib/contrast/extension/assess/eval_trigger.rb +4 -9
  139. data/lib/contrast/extension/assess/exec_trigger.rb +3 -9
  140. data/lib/contrast/extension/assess/fiber.rb +8 -17
  141. data/lib/contrast/extension/assess/hash.rb +3 -3
  142. data/lib/contrast/extension/assess/kernel.rb +4 -13
  143. data/lib/contrast/extension/assess/marshal.rb +6 -10
  144. data/lib/contrast/extension/assess/regexp.rb +6 -10
  145. data/lib/contrast/extension/assess/string.rb +8 -6
  146. data/lib/contrast/extension/kernel.rb +2 -2
  147. data/lib/contrast/extension/protect/kernel.rb +0 -5
  148. data/lib/contrast/framework/manager.rb +3 -5
  149. data/lib/contrast/framework/rack/patch/session_cookie.rb +11 -24
  150. data/lib/contrast/framework/rack/patch/support.rb +6 -4
  151. data/lib/contrast/framework/rails/patch/assess_configuration.rb +12 -9
  152. data/lib/contrast/framework/rails/patch/support.rb +41 -35
  153. data/lib/contrast/framework/rails/railtie.rb +34 -0
  154. data/lib/contrast/framework/rails/rewrite/action_controller_railties_helper_inherited.rb +4 -1
  155. data/lib/contrast/framework/rails/rewrite/active_record_attribute_methods_read.rb +2 -0
  156. data/lib/contrast/framework/rails/rewrite/active_record_named.rb +5 -4
  157. data/lib/contrast/framework/rails/rewrite/active_record_time_zone_inherited.rb +2 -0
  158. data/lib/contrast/framework/rails/support.rb +2 -2
  159. data/lib/contrast/framework/sinatra/support.rb +3 -1
  160. data/lib/contrast/funchook/funchook.rb +5 -8
  161. data/lib/contrast/logger/application.rb +13 -15
  162. data/lib/contrast/logger/format.rb +2 -5
  163. data/lib/contrast/logger/log.rb +26 -9
  164. data/lib/contrast/logger/request.rb +1 -6
  165. data/lib/contrast/security_exception.rb +1 -1
  166. data/lib/contrast/tasks/config.rb +0 -1
  167. data/lib/contrast/tasks/service.rb +6 -7
  168. data/lib/contrast/utils/assess/sampling_util.rb +2 -3
  169. data/lib/contrast/utils/assess/tracking_util.rb +3 -6
  170. data/lib/contrast/utils/class_util.rb +0 -8
  171. data/lib/contrast/utils/hash_digest.rb +2 -5
  172. data/lib/contrast/utils/heap_dump_util.rb +5 -3
  173. data/lib/contrast/utils/invalid_configuration_util.rb +4 -3
  174. data/lib/contrast/utils/inventory_util.rb +2 -3
  175. data/lib/contrast/utils/io_util.rb +3 -5
  176. data/lib/contrast/utils/job_servers_running.rb +13 -7
  177. data/lib/contrast/utils/os.rb +4 -4
  178. data/lib/contrast/utils/ruby_ast_rewriter.rb +2 -1
  179. data/lib/contrast/utils/string_utils.rb +2 -3
  180. data/lib/contrast/utils/tag_util.rb +25 -19
  181. data/resources/assess/policy.json +55 -0
  182. data/ruby-agent.gemspec +17 -16
  183. data/service_executables/VERSION +1 -1
  184. data/service_executables/linux/contrast-service +0 -0
  185. data/service_executables/mac/contrast-service +0 -0
  186. data/sonar-project.properties +9 -0
  187. metadata +61 -46
  188. data/lib/contrast/agent/railtie.rb +0 -31
  189. data/lib/contrast/components/interface.rb +0 -195
  190. data/lib/contrast/delegators/input_analysis.rb +0 -12
@@ -12,7 +12,6 @@ module Contrast
12
12
  # right' state soon.
13
13
  module Trim
14
14
  class << self
15
-
16
15
  # @param policy_node [Contrast::Agent::Assess::Policy::PropagationNode] the node that governs this
17
16
  # propagation event.
18
17
  # @param preshift [Contrast::Agent::Assess::PreShift] The capture of the state of the code just prior to
@@ -26,13 +25,7 @@ module Contrast
26
25
  properties.copy_from(preshift.object, ret)
27
26
  handle_tr(policy_node, preshift, ret, properties)
28
27
 
29
- properties.build_event(
30
- policy_node,
31
- ret,
32
- preshift.object,
33
- ret,
34
- preshift.args,
35
- 1)
28
+ properties.build_event(policy_node, ret, preshift.object, ret, preshift.args, 1)
36
29
  ret
37
30
  end
38
31
 
@@ -43,12 +36,7 @@ module Contrast
43
36
  source = preshift.object
44
37
  args = preshift.args
45
38
  properties.splat_from(source, ret)
46
- properties.build_event(
47
- patcher,
48
- ret,
49
- source,
50
- ret,
51
- args)
39
+ properties.build_event(patcher, ret, source, ret, args)
52
40
  ret
53
41
  end
54
42
 
@@ -72,7 +60,7 @@ module Contrast
72
60
  end
73
61
 
74
62
  # Otherwise, we need to target each insertion point. Based on the spec for #tr & #tr_s, the find is
75
- # treated as a regex range, excepting the `\` character, which we'll need to escape. This converts to
63
+ # treated as a regexp range, excepting the `\` character, which we'll need to escape. This converts to
76
64
  # that form, wrapping the input in `[]`.
77
65
  find_string = preshift.args[0]
78
66
  find_string += '\\' if find_string.end_with?('\\')
@@ -1,10 +1,12 @@
1
1
  # Copyright (c) 2021 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
2
2
  # frozen_string_literal: true
3
3
 
4
+ return unless RUBY_VERSION < '2.6.0' # TODO: RUBY-714 remove guard w/ EOL of 2.5
5
+
4
6
  require 'contrast/agent/patching/policy/patch_status'
5
7
  require 'contrast/agent/module_data'
6
8
  require 'contrast/agent/rewriter'
7
- require 'contrast/components/interface'
9
+ require 'contrast/components/logger'
8
10
  require 'contrast/utils/object_share'
9
11
 
10
12
  module Contrast
@@ -18,8 +20,8 @@ module Contrast
18
20
  # @deprecated Changes to this class are discouraged as this approach is
19
21
  # being phased out with support for those language versions.
20
22
  module RewriterPatch
21
- include Contrast::Components::Interface
22
- access_component :agent, :analysis, :logging
23
+ extend Contrast::Components::Logger::InstanceMethods
24
+
23
25
 
24
26
  class << self
25
27
  def rewrite_interpolations
@@ -41,7 +43,9 @@ module Contrast
41
43
  module_name = mod.cs__name
42
44
  return unless module_name
43
45
 
44
- if module_name.start_with?(Contrast::Utils::ObjectShare::CONTRAST_MODULE_START, Contrast::Utils::ObjectShare::ANONYMOUS_CLASS_MARKER)
46
+ if module_name.start_with?(Contrast::Utils::ObjectShare::CONTRAST_MODULE_START,
47
+ Contrast::Utils::ObjectShare::ANONYMOUS_CLASS_MARKER)
48
+
45
49
  status.no_rewrite!
46
50
  return
47
51
 
@@ -64,21 +68,20 @@ module Contrast
64
68
  # To get around this, we have those methods tell us the class
65
69
  # isn't ready
66
70
  def mid_defining? mod
67
- mod.instance_variable_defined?(:@cs__defining_class) &&
68
- mod.instance_variable_get(:@cs__defining_class)
71
+ mod.instance_variable_defined?(:@cs__defining_class) && mod.instance_variable_get(:@cs__defining_class)
69
72
  end
70
73
 
71
74
  def agent_should_rewrite?
72
- return false unless ASSESS.enabled?
73
- return false unless AGENT.rewrite_interpolation?
74
- return false unless AGENT.interpolation_enabled?
75
+ return false unless ::Contrast::ASSESS.enabled?
76
+ return false unless ::Contrast::AGENT.rewrite_interpolation?
77
+ return false unless ::Contrast::AGENT.interpolation_enabled?
75
78
 
76
79
  true
77
80
  end
78
81
 
79
82
  def should_rewrite? mod
80
83
  return false unless agent_should_rewrite?
81
- return false if AGENT.skip_instrumentation? mod.cs__name
84
+ return false if ::Contrast::AGENT.skip_instrumentation? mod.cs__name
82
85
  return false if mod.cs__frozen?
83
86
  return false if mod.singleton_class?
84
87
  return false if mid_defining?(mod)
@@ -3,7 +3,7 @@
3
3
 
4
4
  require 'set'
5
5
  require 'contrast/agent/assess/policy/source_validation/source_validation'
6
- require 'contrast/components/interface'
6
+ require 'contrast/components/logger'
7
7
  require 'contrast/utils/object_share'
8
8
  require 'contrast/utils/sha256_builder'
9
9
 
@@ -15,8 +15,8 @@ module Contrast
15
15
  # actions we should take in order to mark data as User Input and treat it as untrusted, starting the dataflows
16
16
  # used in Assess vulnerability detection.
17
17
  module SourceMethod
18
- include Contrast::Components::Interface
19
- access_component :analysis, :logging
18
+ extend Contrast::Components::Logger::InstanceMethods
19
+
20
20
 
21
21
  PARAMETER_TYPE = 'PARAMETER'
22
22
  PARAMETER_KEY_TYPE = 'PARAMETER_KEY'
@@ -42,7 +42,7 @@ module Contrast
42
42
  target = determine_target(source_node, object, ret, args)
43
43
  restore_frozen_state = false
44
44
  if target.cs__frozen? && !Contrast::Agent::Assess::Tracker.trackable?(target)
45
- return unless ASSESS.track_frozen_sources?
45
+ return unless ::Contrast::ASSESS.track_frozen_sources?
46
46
  return unless source_node.targets[0] == Contrast::Utils::ObjectShare::RETURN_KEY
47
47
 
48
48
  dup = safe_dup(ret)
@@ -56,7 +56,8 @@ module Contrast
56
56
  # double check that we were able to finalize the replaced return
57
57
  return unless Contrast::Agent::Assess::Tracker.trackable?(target)
58
58
  end
59
- apply_source(Contrast::Agent::REQUEST_TRACKER.current, source_node, target, object, ret, source_node.type, nil, *args)
59
+ apply_source(Contrast::Agent::REQUEST_TRACKER.current, source_node, target, object, ret,
60
+ source_node.type, nil, *args)
60
61
  restore_frozen_state ? ret : nil
61
62
  end
62
63
 
@@ -88,7 +89,9 @@ module Contrast
88
89
  # While we don't taint arrays themselves, we may taint the things they hold. Let's pass their keys and
89
90
  # values back to ourselves and try again
90
91
  elsif Contrast::Utils::DuckUtils.iterable_enumerable?(target)
91
- target.each { |value| apply_source(context, source_node, value, object, ret, source_type, source_name, *args) }
92
+ target.each do |value|
93
+ apply_source(context, source_node, value, object, ret, source_type, source_name, *args)
94
+ end
92
95
  end
93
96
  rescue StandardError => e
94
97
  logger.warn('Unable to apply source', e, node_id: source_node.id)
@@ -128,7 +131,7 @@ module Contrast
128
131
  # @param hash [Hash] the hash to which the key belongs.
129
132
  # @return [Boolean] whether replace the key in the hash or not.
130
133
  def replace_hash_key? key, hash
131
- ASSESS.track_frozen_sources? &&
134
+ ::Contrast::ASSESS.track_frozen_sources? &&
132
135
  !hash.cs__frozen? &&
133
136
  key.is_a?(String) &&
134
137
  !Contrast::Agent::Assess::Tracker.trackable?(key)
@@ -169,10 +172,7 @@ module Contrast
169
172
  length = Contrast::Utils::StringUtils.ret_length(target)
170
173
  properties.add_tag(tag, 0...length)
171
174
  properties.add_properties(source_node.properties)
172
- logger.trace('Source detected',
173
- node_id: source_node.id,
174
- target_id: target.__id__,
175
- tag: tag)
175
+ logger.trace('Source detected', node_id: source_node.id, target_id: target.__id__, tag: tag)
176
176
  end
177
177
  # make a representation of this method that TeamServer can render
178
178
  properties.build_event(source_node, target, object, ret, args, source_type, source_name)
@@ -215,7 +215,7 @@ module Contrast
215
215
  # @return [boolean] if the invocation of this method should be analyzed
216
216
  def analyze? method_policy, object, ret, args
217
217
  return false unless method_policy&.source_node
218
- return false unless ASSESS.enabled?
218
+ return false unless ::Contrast::ASSESS.enabled?
219
219
  return false unless Contrast::Agent::REQUEST_TRACKER.current&.analyze_request?
220
220
 
221
221
  !safe_invocation?(method_policy.source_node, object, ret, args)
@@ -11,9 +11,7 @@ module Contrast
11
11
  # certain tags in a given context. This provides a single place from
12
12
  # which those validations can be called.
13
13
  module SourceValidation
14
- VALIDATORS = [
15
- Contrast::Agent::Assess::Policy::SourceValidation::CrossSiteValidator
16
- ].cs__freeze
14
+ VALIDATORS = [Contrast::Agent::Assess::Policy::SourceValidation::CrossSiteValidator].cs__freeze
17
15
 
18
16
  # Determines if the conditions in which this source was called are
19
17
  # valid and should result in the application of a tag
@@ -44,7 +44,11 @@ module Contrast
44
44
  end
45
45
 
46
46
  if Contrast::Agent::Assess::Tracker.tracked?(ret)
47
- Contrast::Agent::Assess::Policy::TriggerMethod.build_finding(trigger_node, ret, erb_template_prerender, ret, interpolated_inputs)
47
+ Contrast::Agent::Assess::Policy::TriggerMethod.build_finding(trigger_node,
48
+ ret,
49
+ erb_template_prerender,
50
+ ret,
51
+ interpolated_inputs)
48
52
  end
49
53
 
50
54
  ret
@@ -1,7 +1,6 @@
1
1
  # Copyright (c) 2021 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
2
2
  # frozen_string_literal: true
3
3
 
4
- require 'contrast/components/interface'
5
4
 
6
5
  module Contrast
7
6
  module Agent
@@ -16,8 +15,6 @@ module Contrast
16
15
  # these objects to see if we were tracking on any of them and report
17
16
  # a finding if so.
18
17
  class Xpath
19
- include Contrast::Components::Interface
20
-
21
18
  class << self
22
19
  def xpath_expression_trigger trigger_node, _source, object, ret, *args
23
20
  return ret unless args
@@ -3,7 +3,7 @@
3
3
 
4
4
  require 'contrast/agent/assess/events/event_factory'
5
5
  require 'contrast/agent/assess/policy/trigger_validation/trigger_validation'
6
- require 'contrast/components/interface'
6
+ require 'contrast/components/logger'
7
7
  require 'contrast/utils/object_share'
8
8
  require 'contrast/utils/sha256_builder'
9
9
 
@@ -17,8 +17,7 @@ module Contrast
17
17
  # order to determine if the call was done safely. In those cases where
18
18
  # it was not, a Finding report is issued to the Service
19
19
  module TriggerMethod
20
- include Contrast::Components::Interface
21
- access_component :analysis, :logging
20
+ extend Contrast::Components::Logger::InstanceMethods
22
21
 
23
22
  # The level of TeamServer compliance our traces meet when in the
24
23
  # abnormal condition of being dataflow rules without routes
@@ -42,18 +41,10 @@ module Contrast
42
41
  if trigger_node.sources&.any?
43
42
  trigger_node.sources.each do |marker|
44
43
  source = determine_source(marker, object, ret, args)
45
- apply_trigger(trigger_node,
46
- source,
47
- object,
48
- ret,
49
- *args)
44
+ apply_trigger(trigger_node, source, object, ret, *args)
50
45
  end
51
46
  else
52
- apply_trigger(trigger_node,
53
- nil,
54
- object,
55
- ret,
56
- *args)
47
+ apply_trigger(trigger_node, nil, object, ret, *args)
57
48
  end
58
49
  end
59
50
 
@@ -87,10 +78,8 @@ module Contrast
87
78
  append_route(finding, request)
88
79
  append_hash(finding, source, request)
89
80
  finding.version = determine_compliance_version(finding)
90
- logger.trace('Finding created',
91
- node_id: trigger_node.id,
92
- source_id: source.__id__,
93
- rule: trigger_node.rule_id)
81
+ logger.trace('Finding created', node_id: trigger_node.id, source_id: source.__id__,
82
+ rule: trigger_node.rule_id)
94
83
  report_finding(finding, request)
95
84
  rescue StandardError => e
96
85
  logger.error('Unable to build a finding', e, rule: trigger_node.rule_id, node_id: trigger_node.id)
@@ -285,7 +274,8 @@ module Contrast
285
274
 
286
275
  def append_events finding, trigger_node, source, object, ret, args
287
276
  append_from_source(finding, source)
288
- finding.events << Contrast::Agent::Assess::Events::EventFactory.build(trigger_node, source, object, ret, args).to_dtm_event
277
+ finding.events << Contrast::Agent::Assess::Events::EventFactory.build(trigger_node, source, object, ret,
278
+ args).to_dtm_event
289
279
  end
290
280
 
291
281
  def append_from_source finding, source
@@ -68,7 +68,7 @@ module Contrast
68
68
  end
69
69
 
70
70
  def rule_disabled?
71
- ASSESS.rule_disabled?(rule_id)
71
+ ::Contrast::ASSESS.rule_disabled?(rule_id)
72
72
  end
73
73
 
74
74
  # Indicate if this is a dataflow based trigger, meaning it has a proper
@@ -104,7 +104,8 @@ module Contrast
104
104
 
105
105
  properties = Contrast::Agent::Assess::Tracker.properties(source)
106
106
  # find the ranges that violate the rule (untrusted, etc)
107
- vulnerable_ranges = ranges_with_all_tags(Contrast::Utils::StringUtils.ret_length(source), properties, required_tags)
107
+ vulnerable_ranges = ranges_with_all_tags(Contrast::Utils::StringUtils.ret_length(source), properties,
108
+ required_tags)
108
109
  # if there aren't any vulnerable ranges, nope out
109
110
  return false if vulnerable_ranges.empty?
110
111
 
@@ -35,9 +35,10 @@ module Contrast
35
35
  # https://bitbucket.org/contrastsecurity/assess-specifications/src/master/rules/dataflow/redos.md
36
36
  def regexp_vulnerable? regexp
37
37
  # A pattern is considered vulnerable if it has 2 or more levels of nested multi-matching.
38
- # A level is defined as any set of opening and closing control characters immediately followed by a multi match control character.
39
- # A control character is defined as one of the OPENING_CHARS, CLOSING_CHARS,
40
- # or MULTI_MATCH_CHARS that is not immediately preceded by an escaping \ character.
38
+ # A level is defined as any set of opening and closing control characters immediately followed by a
39
+ # multi match control character.
40
+ # A control character is defined as one of the OPENING_CHARS, CLOSING_CHARS, or MULTI_MATCH_CHARS that
41
+ # is not immediately preceded by an escaping \ character.
41
42
  # OPENING_CHARS are ( and [ CLOSING_CHARS are ) and ] MULTI_MATCH_CHARS are +, *, and ?
42
43
 
43
44
  # Nota bene about Regexp#to_s: it doesn't necessarily give you the original Regexp back
@@ -10,8 +10,7 @@ module Contrast
10
10
  # before serializing that finding as a DTM to report to the service.
11
11
  module SSRFValidator
12
12
  RULE_NAME = 'ssrf'
13
- URL_PATTERN =
14
- %r{(?<protocol>http|https|ftp|sftp|telnet|gopher|rtsp|rtsps|ssh|svn)://(?<host>[^/?]+)(?<path>/?[^?]*)(?<query_string>\?.*)?}i.cs__freeze
13
+ URL_PATTERN = %r{(?<protocol>http|https|ftp|sftp|telnet|gopher|rtsp|rtsps|ssh|svn)://(?<host>[^/?]+)(?<path>/?[^?]*)(?<query_string>\?.*)?}i.cs__freeze # rubocop:disable Layout/LineLength
15
14
  # The Net::HTTP class validates host format on instantiation. Since
16
15
  # our triggers for that class are on the instance, they already
17
16
  # have this validation done for them. We do not need to apply the
@@ -11,14 +11,7 @@ module Contrast
11
11
  # the service.
12
12
  module XSSValidator
13
13
  RULE_NAME = 'reflected-xss'
14
- SAFE_CONTENT_TYPES = %w[
15
- /csv
16
- /javascript
17
- /json
18
- /pdf
19
- /x-javascript
20
- /x-json
21
- ].cs__freeze
14
+ SAFE_CONTENT_TYPES = %w[/csv /javascript /json /pdf /x-javascript /x-json].cs__freeze
22
15
 
23
16
  # A finding is valid for XSS if the response type is not one of
24
17
  # those assumed to be safe
@@ -14,7 +14,7 @@ module Contrast
14
14
  # @attr_reader event [Contrast::Agent::Assess::ContrastEvent] the
15
15
  # latest event to track
16
16
  module Evented
17
- attr_accessor :event
17
+ attr_reader :event
18
18
 
19
19
  # Create a new event and add it to the event set.
20
20
  #
@@ -31,7 +31,8 @@ module Contrast
31
31
  # the key used to accessed if from a map or nil if a type like
32
32
  # BODY
33
33
  def build_event policy_node, tagged, object, ret, args, source_type = nil, source_name = nil
34
- @event = Contrast::Agent::Assess::Events::EventFactory.build(policy_node, tagged, object, ret, args, source_type, source_name)
34
+ @event = Contrast::Agent::Assess::Events::EventFactory.build(policy_node, tagged, object, ret, args,
35
+ source_type, source_name)
35
36
  report_sources(tagged, event)
36
37
  end
37
38
 
@@ -46,10 +47,12 @@ module Contrast
46
47
  return unless tagged && !tagged.to_s.empty?
47
48
  return unless event.cs__is_a?(Contrast::Agent::Assess::Events::SourceEvent)
48
49
  return unless event.source_type
50
+ return unless (current_request = Contrast::Agent::REQUEST_TRACKER.current)
51
+
52
+ if current_request.observed_route.sources.any? do |source|
53
+ source.type == event.forced_source_type && source.name == event.forced_source_name
54
+ end
49
55
 
50
- current_request = Contrast::Agent::REQUEST_TRACKER.current
51
- return unless current_request
52
- if current_request.observed_route.sources.any? { |source| source.type == event.forced_source_type && source.name == event.forced_source_name }
53
56
  return
54
57
  end
55
58
 
@@ -55,9 +55,12 @@ module Contrast
55
55
  value_node.children.each do |child|
56
56
  next unless child
57
57
 
58
- return false unless child.cs__is_a?(RubyVM::AbstractSyntaxTree::Node) &&
59
- child.type == :LIT &&
60
- child.children[0]&.cs__is_a?(Integer)
58
+ unless child.cs__is_a?(RubyVM::AbstractSyntaxTree::Node) &&
59
+ child.type == :LIT &&
60
+ child.children[0]&.cs__is_a?(Integer)
61
+
62
+ return false
63
+ end
61
64
  end
62
65
 
63
66
  true
@@ -84,8 +87,11 @@ module Contrast
84
87
  return false unless children.length >= 2
85
88
 
86
89
  potential_string_node = children[0]
87
- return false unless potential_string_node.cs__is_a?(RubyVM::AbstractSyntaxTree::Node) &&
88
- potential_string_node.type == :STR
90
+ unless potential_string_node.cs__is_a?(RubyVM::AbstractSyntaxTree::Node) &&
91
+ potential_string_node.type == :STR
92
+
93
+ return false
94
+ end
89
95
 
90
96
  children[1] == :bytes
91
97
  end
@@ -29,7 +29,10 @@ module Contrast
29
29
  # These are markers whose presence indicates that a field is more
30
30
  # likely to be a descriptor or requirement than an actual password.
31
31
  # We should ignore fields that contain them.
32
- NON_PASSWORD_PARTIAL_NAMES = %w[DATE FORGOT FORM ENCODE PATTERN PREFIX PROP SUFFIX URL BASE FILE URI].cs__freeze
32
+ NON_PASSWORD_PARTIAL_NAMES = %w[
33
+ DATE FORGOT FORM ENCODE PATTERN PREFIX PROP SUFFIX URL BASE FILE
34
+ URI
35
+ ].cs__freeze
33
36
 
34
37
  # If the constant looks like a password and it doesn't look like a
35
38
  # password descriptor, it passes for this rule
@@ -2,7 +2,7 @@
2
2
  # frozen_string_literal: true
3
3
 
4
4
  require 'contrast/agent/assess/policy/trigger_method'
5
- require 'contrast/components/interface'
5
+ require 'contrast/components/logger'
6
6
  require 'contrast/extension/module'
7
7
 
8
8
  module Contrast
@@ -18,18 +18,15 @@ module Contrast
18
18
  # given value set
19
19
  # 3) redacted_marker : the value to plug in for the obfuscated value
20
20
  module HardcodedValueRule
21
- include Contrast::Components::Interface
22
- access_component :analysis, :app_context, :logging
21
+ include Contrast::Components::Logger::InstanceMethods
22
+
23
23
 
24
24
  def disabled?
25
- !ASSESS.enabled? || ASSESS.rule_disabled?(rule_id)
25
+ !::Contrast::ASSESS.enabled? || ::Contrast::ASSESS.rule_disabled?(rule_id)
26
26
  end
27
27
 
28
28
  # TODO: RUBY-1014 - remove `#analyze`
29
- COMMON_CONSTANTS = %i[
30
- CONTRAST_ASSESS_POLICY_STATUS
31
- VERSION
32
- ].cs__freeze
29
+ COMMON_CONSTANTS = %i[CONTRAST_ASSESS_POLICY_STATUS VERSION].cs__freeze
33
30
  def analyze clazz
34
31
  return if disabled?
35
32
 
@@ -171,7 +168,8 @@ module Contrast
171
168
 
172
169
  finding.properties[SOURCE_KEY] = Contrast::Utils::StringUtils.protobuf_safe_string(class_name)
173
170
  finding.properties[CONSTANT_NAME_KEY] = Contrast::Utils::StringUtils.protobuf_safe_string(constant_string)
174
- finding.properties[CODE_SOURCE_KEY] = Contrast::Utils::StringUtils.protobuf_safe_string(constant_string + redacted_marker)
171
+ finding.properties[CODE_SOURCE_KEY] =
172
+ Contrast::Utils::StringUtils.protobuf_safe_string(constant_string + redacted_marker)
175
173
 
176
174
  hash = Contrast::Utils::HashDigest.generate_class_scanning_hash(finding)
177
175
  finding.hash_code = Contrast::Utils::StringUtils.protobuf_safe_string(hash)