contrast-agent 6.0.0 → 6.1.2

Sign up to get free protection for your applications and to get access to all the features.
Files changed (260) hide show
  1. checksums.yaml +4 -4
  2. data/.simplecov +1 -1
  3. data/Rakefile +1 -1
  4. data/ext/build_funchook.rb +3 -3
  5. data/ext/cs__assess_basic_object/cs__assess_basic_object.c +5 -1
  6. data/ext/cs__assess_regexp/cs__assess_regexp.c +15 -2
  7. data/ext/cs__assess_regexp/cs__assess_regexp.h +2 -0
  8. data/ext/cs__assess_string/cs__assess_string.c +8 -0
  9. data/ext/cs__assess_test/cs__assess_test.h +9 -0
  10. data/ext/cs__assess_test/cs__assess_tests.c +22 -0
  11. data/ext/cs__assess_test/extconf.rb +5 -0
  12. data/ext/cs__common/cs__common.c +101 -0
  13. data/ext/cs__common/cs__common.h +29 -5
  14. data/ext/cs__contrast_patch/cs__contrast_patch.c +1 -1
  15. data/ext/cs__tests/cs__tests.c +12 -0
  16. data/ext/cs__tests/cs__tests.h +3 -0
  17. data/ext/cs__tests/extconf.rb +5 -0
  18. data/ext/extconf_common.rb +1 -1
  19. data/lib/contrast/agent/assess/contrast_object.rb +16 -16
  20. data/lib/contrast/agent/assess/events/source_event.rb +17 -19
  21. data/lib/contrast/agent/assess/finalizers/hash.rb +2 -2
  22. data/lib/contrast/agent/assess/policy/policy.rb +9 -10
  23. data/lib/contrast/agent/assess/policy/policy_node.rb +9 -10
  24. data/lib/contrast/agent/assess/policy/policy_scanner.rb +2 -16
  25. data/lib/contrast/agent/assess/policy/propagation_method.rb +3 -3
  26. data/lib/contrast/agent/assess/policy/propagation_node.rb +2 -3
  27. data/lib/contrast/agent/assess/policy/propagator/base.rb +1 -1
  28. data/lib/contrast/agent/assess/policy/propagator/buffer.rb +2 -1
  29. data/lib/contrast/agent/assess/policy/propagator/database_write.rb +1 -1
  30. data/lib/contrast/agent/assess/policy/propagator/splat.rb +1 -1
  31. data/lib/contrast/agent/assess/policy/propagator/split.rb +17 -21
  32. data/lib/contrast/agent/assess/policy/propagator/trim.rb +1 -1
  33. data/lib/contrast/agent/assess/policy/source_node.rb +1 -1
  34. data/lib/contrast/agent/assess/policy/trigger_method.rb +10 -18
  35. data/lib/contrast/agent/assess/policy/trigger_node.rb +16 -16
  36. data/lib/contrast/agent/assess/policy/trigger_validation/redos_validator.rb +1 -1
  37. data/lib/contrast/agent/assess/property/evented.rb +2 -2
  38. data/lib/contrast/agent/assess/property/tagged.rb +2 -2
  39. data/lib/contrast/agent/assess/rule/provider/hardcoded_key.rb +6 -8
  40. data/lib/contrast/agent/assess/rule/provider/hardcoded_password.rb +6 -7
  41. data/lib/contrast/agent/assess/rule/provider/hardcoded_value_rule.rb +12 -7
  42. data/lib/contrast/agent/assess/rule/response/base_rule.rb +13 -6
  43. data/lib/contrast/agent/assess/rule/response/cache_control_header_rule.rb +66 -43
  44. data/lib/contrast/agent/assess/rule/response/click_jacking_header_rule.rb +4 -4
  45. data/lib/contrast/agent/assess/rule/response/csp_header_insecure_rule.rb +6 -6
  46. data/lib/contrast/agent/assess/rule/response/csp_header_missing_rule.rb +4 -4
  47. data/lib/contrast/agent/assess/rule/response/hsts_header_rule.rb +4 -4
  48. data/lib/contrast/agent/assess/rule/response/x_content_type_header_rule.rb +4 -4
  49. data/lib/contrast/agent/assess/rule/response/x_xss_protection_header_rule.rb +3 -4
  50. data/lib/contrast/agent/assess/tag.rb +13 -14
  51. data/lib/contrast/agent/at_exit_hook.rb +12 -1
  52. data/lib/contrast/agent/inventory/database_config.rb +22 -7
  53. data/lib/contrast/agent/middleware.rb +9 -6
  54. data/lib/contrast/agent/patching/policy/after_load_patch.rb +3 -5
  55. data/lib/contrast/agent/patching/policy/after_load_patcher.rb +2 -2
  56. data/lib/contrast/agent/patching/policy/method_policy_extend.rb +4 -4
  57. data/lib/contrast/agent/patching/policy/patch.rb +20 -19
  58. data/lib/contrast/agent/patching/policy/patch_status.rb +10 -3
  59. data/lib/contrast/agent/patching/policy/patcher.rb +1 -1
  60. data/lib/contrast/agent/patching/policy/policy.rb +13 -15
  61. data/lib/contrast/agent/patching/policy/policy_node.rb +19 -21
  62. data/lib/contrast/agent/patching/policy/trigger_node.rb +1 -1
  63. data/lib/contrast/agent/protect/input_analyzer/input_analyzer.rb +126 -122
  64. data/lib/contrast/agent/protect/policy/applies_no_sqli_rule.rb +2 -2
  65. data/lib/contrast/agent/protect/policy/applies_path_traversal_rule.rb +1 -1
  66. data/lib/contrast/agent/protect/policy/applies_xxe_rule.rb +1 -1
  67. data/lib/contrast/agent/protect/policy/rule_applicator.rb +4 -4
  68. data/lib/contrast/agent/protect/rule/base.rb +30 -18
  69. data/lib/contrast/agent/protect/rule/base_service.rb +31 -14
  70. data/lib/contrast/agent/protect/rule/cmd_injection.rb +16 -9
  71. data/lib/contrast/agent/protect/rule/cmdi/cmdi_input_classification.rb +3 -3
  72. data/lib/contrast/agent/protect/rule/default_scanner.rb +2 -1
  73. data/lib/contrast/agent/protect/rule/deserialization.rb +18 -7
  74. data/lib/contrast/agent/protect/rule/http_method_tampering/http_method_tampering_input_classification.rb +74 -74
  75. data/lib/contrast/agent/protect/rule/http_method_tampering.rb +71 -53
  76. data/lib/contrast/agent/protect/rule/no_sqli/no_sqli_input_classification.rb +3 -3
  77. data/lib/contrast/agent/protect/rule/no_sqli.rb +15 -16
  78. data/lib/contrast/agent/protect/rule/path_traversal.rb +13 -3
  79. data/lib/contrast/agent/protect/rule/sqli/sqli_input_classification.rb +2 -2
  80. data/lib/contrast/agent/protect/rule/sqli/sqli_worth_watching.rb +1 -1
  81. data/lib/contrast/agent/protect/rule/sqli.rb +16 -23
  82. data/lib/contrast/agent/protect/rule/unsafe_file_upload/unsafe_file_upload_input_classification.rb +61 -61
  83. data/lib/contrast/agent/protect/rule/unsafe_file_upload/unsafe_file_upload_matcher.rb +29 -29
  84. data/lib/contrast/agent/protect/rule/unsafe_file_upload.rb +32 -32
  85. data/lib/contrast/agent/protect/rule/xss.rb +17 -0
  86. data/lib/contrast/agent/protect/rule/xxe/entity_wrapper.rb +14 -13
  87. data/lib/contrast/agent/protect/rule/xxe.rb +25 -3
  88. data/lib/contrast/agent/reaction_processor.rb +1 -1
  89. data/lib/contrast/agent/reporting/attack_result/rasp_rule_sample.rb +36 -36
  90. data/lib/contrast/agent/reporting/masker/masker.rb +18 -21
  91. data/lib/contrast/agent/reporting/masker/masker_utils.rb +10 -6
  92. data/lib/contrast/agent/reporting/reporter.rb +11 -16
  93. data/lib/contrast/agent/reporting/reporter_heartbeat.rb +49 -0
  94. data/lib/contrast/agent/reporting/reporting_events/agent_startup.rb +6 -2
  95. data/lib/contrast/agent/reporting/reporting_events/application_activity.rb +51 -0
  96. data/lib/contrast/agent/reporting/reporting_events/application_defend_activity.rb +96 -0
  97. data/lib/contrast/agent/reporting/reporting_events/application_defend_attack_activity.rb +70 -0
  98. data/lib/contrast/agent/reporting/reporting_events/application_defend_attack_sample.rb +182 -0
  99. data/lib/contrast/agent/reporting/reporting_events/application_defend_attack_sample_activity.rb +56 -0
  100. data/lib/contrast/agent/reporting/reporting_events/application_defend_attack_sample_stack.rb +22 -0
  101. data/lib/contrast/agent/reporting/reporting_events/application_defend_attacker_activity.rb +70 -0
  102. data/lib/contrast/agent/reporting/reporting_events/application_inventory.rb +6 -2
  103. data/lib/contrast/agent/reporting/reporting_events/application_inventory_activity.rb +60 -0
  104. data/lib/contrast/agent/reporting/reporting_events/application_reporting_event.rb +27 -0
  105. data/lib/contrast/agent/reporting/reporting_events/application_startup.rb +15 -11
  106. data/lib/contrast/agent/reporting/reporting_events/application_update.rb +7 -12
  107. data/lib/contrast/agent/reporting/reporting_events/discovered_route.rb +1 -1
  108. data/lib/contrast/agent/reporting/reporting_events/finding.rb +9 -3
  109. data/lib/contrast/agent/reporting/reporting_events/finding_event.rb +2 -4
  110. data/lib/contrast/agent/reporting/reporting_events/finding_event_object.rb +3 -3
  111. data/lib/contrast/agent/reporting/reporting_events/observed_library_usage.rb +6 -2
  112. data/lib/contrast/agent/reporting/reporting_events/observed_route.rb +7 -3
  113. data/lib/contrast/agent/reporting/reporting_events/poll.rb +6 -2
  114. data/lib/contrast/agent/reporting/reporting_events/preflight.rb +10 -8
  115. data/lib/contrast/agent/reporting/reporting_events/preflight_message.rb +6 -10
  116. data/lib/contrast/agent/reporting/reporting_events/server_activity.rb +12 -20
  117. data/lib/contrast/agent/reporting/reporting_events/server_reporting_event.rb +27 -0
  118. data/lib/contrast/agent/reporting/reporting_utilities/audit.rb +17 -27
  119. data/lib/contrast/agent/reporting/reporting_utilities/build_preflight.rb +38 -0
  120. data/lib/contrast/agent/reporting/reporting_utilities/dtm_message.rb +8 -0
  121. data/lib/contrast/agent/reporting/reporting_utilities/endpoints.rb +6 -0
  122. data/lib/contrast/agent/reporting/reporting_utilities/headers.rb +1 -2
  123. data/lib/contrast/agent/reporting/reporting_utilities/reporter_client.rb +15 -10
  124. data/lib/contrast/agent/reporting/reporting_utilities/reporter_client_utils.rb +54 -67
  125. data/lib/contrast/agent/reporting/reporting_utilities/response.rb +17 -7
  126. data/lib/contrast/agent/reporting/reporting_utilities/response_extractor.rb +9 -6
  127. data/lib/contrast/agent/reporting/reporting_utilities/response_handler.rb +17 -17
  128. data/lib/contrast/agent/reporting/reporting_utilities/response_handler_utils.rb +47 -32
  129. data/lib/contrast/agent/reporting/settings/application_settings.rb +1 -1
  130. data/lib/contrast/agent/reporting/settings/assess.rb +5 -5
  131. data/lib/contrast/agent/reporting/settings/assess_server_feature.rb +3 -3
  132. data/lib/contrast/agent/reporting/settings/exclusions.rb +3 -3
  133. data/lib/contrast/agent/reporting/settings/protect.rb +21 -6
  134. data/lib/contrast/agent/reporting/settings/protect_server_feature.rb +6 -6
  135. data/lib/contrast/agent/reporting/settings/reaction.rb +3 -3
  136. data/lib/contrast/agent/reporting/settings/sensitive_data_masking.rb +2 -2
  137. data/lib/contrast/agent/reporting/settings/sensitive_data_masking_rule.rb +2 -2
  138. data/lib/contrast/agent/reporting/settings/server_features.rb +2 -2
  139. data/lib/contrast/agent/request.rb +5 -5
  140. data/lib/contrast/agent/request_context.rb +23 -19
  141. data/lib/contrast/agent/request_context_extend.rb +11 -24
  142. data/lib/contrast/agent/request_handler.rb +4 -4
  143. data/lib/contrast/agent/response.rb +2 -0
  144. data/lib/contrast/agent/rule_set.rb +2 -2
  145. data/lib/contrast/agent/scope.rb +1 -1
  146. data/lib/contrast/agent/service_heartbeat.rb +6 -48
  147. data/lib/contrast/agent/static_analysis.rb +1 -1
  148. data/lib/contrast/agent/telemetry/base.rb +155 -0
  149. data/lib/contrast/agent/telemetry/events/event.rb +35 -0
  150. data/lib/contrast/agent/telemetry/events/exceptions/obfuscate.rb +119 -0
  151. data/lib/contrast/agent/telemetry/events/exceptions/telemetry_exception_base.rb +44 -36
  152. data/lib/contrast/agent/telemetry/events/exceptions/telemetry_exception_event.rb +29 -21
  153. data/lib/contrast/agent/telemetry/events/exceptions/telemetry_exception_message.rb +91 -73
  154. data/lib/contrast/agent/telemetry/events/exceptions/telemetry_exception_message_exception.rb +62 -44
  155. data/lib/contrast/agent/telemetry/events/exceptions/telemetry_exception_stack_frame.rb +50 -33
  156. data/lib/contrast/agent/telemetry/events/exceptions/telemetry_exceptions.rb +20 -0
  157. data/lib/contrast/agent/telemetry/events/exceptions/telemetry_exceptions_report.rb +30 -0
  158. data/lib/contrast/agent/telemetry/events/metric_event.rb +28 -0
  159. data/lib/contrast/agent/telemetry/events/startup_metrics_event.rb +123 -0
  160. data/lib/contrast/agent/thread_watcher.rb +52 -68
  161. data/lib/contrast/agent/version.rb +1 -1
  162. data/lib/contrast/agent/worker_thread.rb +8 -0
  163. data/lib/contrast/agent.rb +1 -3
  164. data/lib/contrast/api/communication/messaging_queue.rb +29 -12
  165. data/lib/contrast/api/communication/response_processor.rb +7 -10
  166. data/lib/contrast/api/communication/service_lifecycle.rb +1 -1
  167. data/lib/contrast/api/communication/socket.rb +1 -1
  168. data/lib/contrast/api/communication/socket_client.rb +1 -1
  169. data/lib/contrast/api/communication/speedracer.rb +3 -3
  170. data/lib/contrast/api/decorators/activity.rb +33 -0
  171. data/lib/contrast/api/decorators/agent_startup.rb +10 -9
  172. data/lib/contrast/api/decorators/application_settings.rb +1 -1
  173. data/lib/contrast/api/decorators/application_startup.rb +4 -4
  174. data/lib/contrast/api/decorators/http_request.rb +1 -1
  175. data/lib/contrast/api/decorators/response_type.rb +4 -17
  176. data/lib/contrast/components/agent.rb +1 -1
  177. data/lib/contrast/components/base.rb +1 -1
  178. data/lib/contrast/components/config.rb +19 -28
  179. data/lib/contrast/components/contrast_service.rb +13 -1
  180. data/lib/contrast/components/sampling.rb +1 -1
  181. data/lib/contrast/components/settings.rb +58 -24
  182. data/lib/contrast/config/agent_configuration.rb +21 -11
  183. data/lib/contrast/config/api_configuration.rb +12 -8
  184. data/lib/contrast/config/api_proxy_configuration.rb +7 -3
  185. data/lib/contrast/config/application_configuration.rb +15 -11
  186. data/lib/contrast/config/assess_configuration.rb +13 -9
  187. data/lib/contrast/config/assess_rules_configuration.rb +6 -2
  188. data/lib/contrast/config/base_configuration.rb +3 -35
  189. data/lib/contrast/config/certification_configuration.rb +9 -5
  190. data/lib/contrast/config/exception_configuration.rb +10 -7
  191. data/lib/contrast/config/heap_dump_configuration.rb +13 -9
  192. data/lib/contrast/config/inventory_configuration.rb +9 -6
  193. data/lib/contrast/config/logger_configuration.rb +9 -6
  194. data/lib/contrast/config/protect_configuration.rb +9 -6
  195. data/lib/contrast/config/protect_rule_configuration.rb +12 -8
  196. data/lib/contrast/config/protect_rules_configuration.rb +19 -18
  197. data/lib/contrast/config/request_audit_configuration.rb +10 -7
  198. data/lib/contrast/config/root_configuration.rb +29 -12
  199. data/lib/contrast/config/ruby_configuration.rb +14 -11
  200. data/lib/contrast/config/sampling_configuration.rb +11 -8
  201. data/lib/contrast/config/server_configuration.rb +13 -9
  202. data/lib/contrast/config/service_configuration.rb +14 -11
  203. data/lib/contrast/configuration.rb +23 -14
  204. data/lib/contrast/extension/assess/array.rb +1 -1
  205. data/lib/contrast/extension/assess/erb.rb +1 -1
  206. data/lib/contrast/extension/assess/marshal.rb +1 -1
  207. data/lib/contrast/extension/assess/string.rb +1 -1
  208. data/lib/contrast/extension/extension.rb +2 -2
  209. data/lib/contrast/framework/base_support.rb +8 -8
  210. data/lib/contrast/framework/grape/support.rb +3 -3
  211. data/lib/contrast/framework/manager.rb +5 -5
  212. data/lib/contrast/framework/manager_extend.rb +1 -1
  213. data/lib/contrast/framework/rack/patch/session_cookie.rb +1 -1
  214. data/lib/contrast/framework/rails/patch/action_controller_live_buffer.rb +14 -3
  215. data/lib/contrast/framework/rails/patch/assess_configuration.rb +3 -3
  216. data/lib/contrast/framework/rails/patch/rails_application_configuration.rb +1 -1
  217. data/lib/contrast/framework/rails/patch/support.rb +14 -46
  218. data/lib/contrast/framework/rails/support.rb +2 -2
  219. data/lib/contrast/framework/sinatra/support.rb +1 -1
  220. data/lib/contrast/logger/aliased_logging.rb +94 -0
  221. data/lib/contrast/logger/application.rb +0 -4
  222. data/lib/contrast/logger/cef_log.rb +14 -14
  223. data/lib/contrast/logger/format.rb +1 -1
  224. data/lib/contrast/logger/log.rb +8 -8
  225. data/lib/contrast/tasks/config.rb +30 -21
  226. data/lib/contrast/tasks/service.rb +2 -2
  227. data/lib/contrast/utils/assess/tracking_util.rb +4 -4
  228. data/lib/contrast/utils/class_util.rb +6 -10
  229. data/lib/contrast/utils/findings.rb +3 -3
  230. data/lib/contrast/utils/hash_digest.rb +6 -7
  231. data/lib/contrast/utils/head_dump_utils_extend.rb +1 -1
  232. data/lib/contrast/utils/invalid_configuration_util.rb +2 -2
  233. data/lib/contrast/utils/log_utils.rb +6 -4
  234. data/lib/contrast/utils/lru_cache.rb +1 -1
  235. data/lib/contrast/utils/metrics_hash.rb +1 -1
  236. data/lib/contrast/utils/middleware_utils.rb +6 -6
  237. data/lib/contrast/utils/net_http_base.rb +4 -4
  238. data/lib/contrast/utils/object_share.rb +1 -1
  239. data/lib/contrast/utils/os.rb +1 -1
  240. data/lib/contrast/utils/patching/policy/patch_utils.rb +2 -2
  241. data/lib/contrast/utils/request_utils.rb +2 -2
  242. data/lib/contrast/utils/sha256_builder.rb +4 -4
  243. data/lib/contrast/utils/stack_trace_utils.rb +31 -13
  244. data/lib/contrast/utils/telemetry.rb +22 -7
  245. data/lib/contrast/utils/telemetry_client.rb +27 -15
  246. data/lib/contrast/utils/telemetry_hash.rb +41 -0
  247. data/lib/contrast/utils/telemetry_identifier.rb +18 -3
  248. data/lib/contrast/utils/timer.rb +1 -1
  249. data/lib/contrast.rb +9 -0
  250. data/resources/assess/policy.json +1 -1
  251. data/ruby-agent.gemspec +1 -1
  252. data/service_executables/VERSION +1 -1
  253. data/service_executables/linux/contrast-service +0 -0
  254. data/service_executables/mac/contrast-service +0 -0
  255. metadata +41 -16
  256. data/lib/contrast/agent/telemetry/events/metric_telemetry_event.rb +0 -26
  257. data/lib/contrast/agent/telemetry/events/startup_metrics_telemetry_event.rb +0 -121
  258. data/lib/contrast/agent/telemetry/events/telemetry_event.rb +0 -33
  259. data/lib/contrast/agent/telemetry/telemetry.rb +0 -150
  260. data/lib/contrast/utils/exclude_key.rb +0 -20
@@ -69,7 +69,7 @@ module Contrast
69
69
  # @return res [Contrast::Agent::Reporting::InputAnalysisResult]
70
70
  def sqli_create_new_input_result request, rule_id, input_type, value
71
71
  ia_result = new_ia_result(rule_id, input_type, request.path, value)
72
- if sqli_worth_watching? value
72
+ if sqli_worth_watching?(value)
73
73
  ia_result.ids << WORTHWATCHING_MATCH
74
74
  ia_result.score_level = WORTHWATCHING
75
75
  ia_result
@@ -77,7 +77,7 @@ module Contrast
77
77
  ia_result.score_level = IGNORE
78
78
  end
79
79
 
80
- add_needed_key request, ia_result, input_type, value if SQLI_KEYS_NEEDED.include? input_type
80
+ add_needed_key(request, ia_result, input_type, value) if SQLI_KEYS_NEEDED.include?(input_type)
81
81
  ia_result
82
82
  end
83
83
  end
@@ -91,7 +91,7 @@ module Contrast
91
91
  # @param input [String] the user input to be inspected
92
92
  # @return true | false
93
93
  def language_keywords? input
94
- contains_substring? input, SQL_KEYWORDS
94
+ contains_substring?(input, SQL_KEYWORDS)
95
95
  end
96
96
 
97
97
  # Helper method to find a substrings in given input.
@@ -31,6 +31,20 @@ module Contrast
31
31
  NAME = 'sql-injection'
32
32
  BLOCK_MESSAGE = 'SQLi rule triggered. Response blocked.'
33
33
 
34
+ class << self
35
+ # @param attack_sample [Contrast::Api::Dtm::RaspRuleSample]
36
+ # @return [Hash] the details for this specific rule
37
+ def extract_details attack_sample
38
+ {
39
+ start: attack_sample.sqli.start_idx,
40
+ end: attack_sample.sqli.end_idx,
41
+ boundaryOverrunIndex: attack_sample.sqli.boundary_overrun_idx,
42
+ inputBoundaryIndex: attack_sample.sqli.input_boundary_idx,
43
+ query: attack_sample.sqli.query
44
+ }
45
+ end
46
+ end
47
+
34
48
  def rule_name
35
49
  NAME
36
50
  end
@@ -47,29 +61,8 @@ module Contrast
47
61
 
48
62
  append_to_activity(context, result)
49
63
 
50
- cef_logging result, :successful_attack, query_string
51
- raise Contrast::SecurityException.new(self, BLOCK_MESSAGE) if blocked?
52
- end
53
-
54
- private
55
-
56
- def find_attacker context, potential_attack_string, **kwargs
57
- ia_results = gather_ia_results(context)
58
- find_attacker_with_results(context, potential_attack_string, ia_results, **kwargs)
59
- end
60
-
61
- def infilter? context
62
- return false unless context&.agent_input_analysis&.results
63
- return false unless enabled?
64
- return false if protect_excluded_by_code?
65
-
66
- true
67
- end
68
-
69
- def gather_ia_results context
70
- context.agent_input_analysis.results.select do |ia_result|
71
- ia_result.rule_id == rule_name
72
- end
64
+ cef_logging(result, :successful_attack, query_string)
65
+ raise(Contrast::SecurityException.new(self, BLOCK_MESSAGE)) if blocked?
73
66
  end
74
67
  end
75
68
  end
@@ -14,67 +14,67 @@ module Contrast
14
14
  # This module will do the Input Classification stage of Unsafe File Upload
15
15
  # rule. As a result input would be marked as DEFINITEATTACK or IGNORE.
16
16
  module UnsafeFileUploadInputClassification
17
- UNSAFE_UPLOAD_MATCH = 'unsafe-file-upload-input-tracing-v1'
18
-
19
- class << self
20
- include InputClassificationBase
21
- include Contrast::Agent::Protect::Rule::UnsafeFileUploadMatcher
22
-
23
- # Input Classification stage is done to determine if an user input is
24
- # DEFINITEATTACK or to be ignored.
25
- #
26
- # @param input_type [Contrast::Agent::Reporting::InputType] The type of the user input.
27
- # @param value [String, Array<String>] the value of the input.
28
- # @param input_analysis [Contrast::Agent::Reporting::InputAnalysis] Holds all the results from the
29
- # agent analysis from the current
30
- # Request.
31
- # @return ia [Contrast::Agent::Reporting::InputAnalysis] with updated results.
32
- def classify input_type, value, input_analysis
33
- unless Contrast::Agent::Protect::Rule::UnsafeFileUpload::APPLICABLE_USER_INPUTS.include?(input_type)
34
- return
35
- end
36
- return unless input_analysis.request
37
-
38
- rule_id = Contrast::Agent::Protect::Rule::UnsafeFileUpload::NAME
39
- results = []
40
-
41
- Array(value).each do |val|
42
- Array(val).each do |v|
43
- results << create_new_input_result(input_analysis.request, rule_id, input_type, v)
44
- end
45
- end
46
-
47
- input_analysis.results = results
48
- input_analysis
49
- end
50
-
51
- private
52
-
53
- # This methods checks if input is tagged DEFINITEATTACK or IGNORE matches value with it's
54
- # key if needed and Creates new isntance of InputAnalysisResult.
55
- #
56
- # @param request [Contrast::Agent::Request] the current request context.
57
- # @param rule_id [String] The name of the Protect Rule.
58
- # @param input_type [Contrast::Agent::Reporting::InputType] The type of the user input.
59
- # @param value [String, Array<String>] the value of the input.
60
- #
61
- # @return res [Contrast::Agent::Reporting::InputAnalysisResult]
62
- def create_new_input_result request, rule_id, input_type, value
63
- ia_result = new_ia_result rule_id, input_type, request.path, value
64
- if unsafe_match? value
65
- ia_result.score_level = DEFINITEATTACK
66
- ia_result.ids << UNSAFE_UPLOAD_MATCH
67
- else
68
- ia_result.score_level = IGNORE
69
- end
70
- ia_result.key = if input_type == MULTIPART_FIELD_NAME
71
- Contrast::Agent::Protect::InputAnalyzer::DISPOSITION_FILENAME
72
- else
73
- Contrast::Agent::Protect::InputAnalyzer::DISPOSITION_NAME
74
- end
75
- ia_result
76
- end
77
- end
17
+ # UNSAFE_UPLOAD_MATCH = 'unsafe-file-upload-input-tracing-v1'
18
+ #
19
+ # class << self
20
+ # include InputClassificationBase
21
+ # include Contrast::Agent::Protect::Rule::UnsafeFileUploadMatcher
22
+ #
23
+ # # Input Classification stage is done to determine if an user input is
24
+ # # DEFINITEATTACK or to be ignored.
25
+ # #
26
+ # # @param input_type [Contrast::Agent::Reporting::InputType] The type of the user input.
27
+ # # @param value [String, Array<String>] the value of the input.
28
+ # # @param input_analysis [Contrast::Agent::Reporting::InputAnalysis] Holds all the results from the
29
+ # # agent analysis from the current
30
+ # # Request.
31
+ # # @return ia [Contrast::Agent::Reporting::InputAnalysis] with updated results.
32
+ # def classify input_type, value, input_analysis
33
+ # unless Contrast::Agent::Protect::Rule::UnsafeFileUpload::APPLICABLE_USER_INPUTS.include?(input_type)
34
+ # return
35
+ # end
36
+ # return unless input_analysis.request
37
+ #
38
+ # rule_id = Contrast::Agent::Protect::Rule::UnsafeFileUpload::NAME
39
+ # results = []
40
+ #
41
+ # Array(value).each do |val|
42
+ # Array(val).each do |v|
43
+ # results << create_new_input_result(input_analysis.request, rule_id, input_type, v)
44
+ # end
45
+ # end
46
+ #
47
+ # input_analysis.results = results
48
+ # input_analysis
49
+ # end
50
+ #
51
+ # private
52
+ #
53
+ # # This methods checks if input is tagged DEFINITEATTACK or IGNORE matches value with it's
54
+ # # key if needed and Creates new isntance of InputAnalysisResult.
55
+ # #
56
+ # # @param request [Contrast::Agent::Request] the current request context.
57
+ # # @param rule_id [String] The name of the Protect Rule.
58
+ # # @param input_type [Contrast::Agent::Reporting::InputType] The type of the user input.
59
+ # # @param value [String, Array<String>] the value of the input.
60
+ # #
61
+ # # @return res [Contrast::Agent::Reporting::InputAnalysisResult]
62
+ # def create_new_input_result request, rule_id, input_type, value
63
+ # ia_result = new_ia_result rule_id, input_type, request.path, value
64
+ # if unsafe_match? value
65
+ # ia_result.score_level = DEFINITEATTACK
66
+ # ia_result.ids << UNSAFE_UPLOAD_MATCH
67
+ # else
68
+ # ia_result.score_level = IGNORE
69
+ # end
70
+ # ia_result.key = if input_type == MULTIPART_FIELD_NAME
71
+ # Contrast::Agent::Protect::InputAnalyzer::DISPOSITION_FILENAME
72
+ # else
73
+ # Contrast::Agent::Protect::InputAnalyzer::DISPOSITION_NAME
74
+ # end
75
+ # ia_result
76
+ # end
77
+ # end
78
78
  end
79
79
  end
80
80
  end
@@ -8,36 +8,36 @@ module Contrast
8
8
  # Here will be made the match of the user input provided by the
9
9
  # Agent InputAnalysis.
10
10
  module UnsafeFileUploadMatcher
11
- EXPLOIT_CHARS = %w[.. ; � < > ~ *].cs__freeze
12
- # Extensions that can be executed on the server side or can be dangerous on the client side:
13
- # https://owasp.org/www-community/vulnerabilities/Unrestricted_File_Upload
14
- EXPLOITABLE_EXTENSIONS = %w[.php .exe .rb .jsp .pht .phtml .shtml .asa .cer .asax .swf .xap].cs__freeze
15
-
16
- # Match the user input to see if the filename
17
- # contains malicious file extension.
11
+ # EXPLOIT_CHARS = %w[.. ; � < > ~ *].cs__freeze # rubocop:disable Style/AsciiComments
12
+ # # Extensions that can be executed on the server side or can be dangerous on the client side:
13
+ # # https://owasp.org/www-community/vulnerabilities/Unrestricted_File_Upload
14
+ # EXPLOITABLE_EXTENSIONS = %w[.php .exe .rb .jsp .pht .phtml .shtml .asa .cer .asax .swf .xap].cs__freeze
18
15
  #
19
- # @param input [String] The filename
20
- # extracted from the current request
21
- # @return true | false
22
- def unsafe_match? input
23
- suspicious_chars?(input) || suspicious_extensions?(input)
24
- end
25
-
26
- private
27
-
28
- # @param input [String] The filename
29
- # extracted from the current request
30
- # @return true | false
31
- def suspicious_chars? input
32
- input.chars.any? { |c| EXPLOIT_CHARS.include? c }
33
- end
34
-
35
- # @param input [String] The filename
36
- # extracted from the current request
37
- # @return true | false
38
- def suspicious_extensions? input
39
- EXPLOITABLE_EXTENSIONS.include? File.extname(input).downcase
40
- end
16
+ # # Match the user input to see if the filename
17
+ # # contains malicious file extension.
18
+ # #
19
+ # # @param input [String] The filename
20
+ # # extracted from the current request
21
+ # # @return true | false
22
+ # def unsafe_match? input
23
+ # suspicious_chars?(input) || suspicious_extensions?(input)
24
+ # end
25
+ #
26
+ # private
27
+ #
28
+ # # @param input [String] The filename
29
+ # # extracted from the current request
30
+ # # @return true | false
31
+ # def suspicious_chars? input
32
+ # input.chars.any? { |c| EXPLOIT_CHARS.include? c }
33
+ # end
34
+ #
35
+ # # @param input [String] The filename
36
+ # # extracted from the current request
37
+ # # @return true | false
38
+ # def suspicious_extensions? input
39
+ # EXPLOITABLE_EXTENSIONS.include? File.extname(input).downcase
40
+ # end
41
41
  end
42
42
  end
43
43
  end
@@ -23,40 +23,40 @@ module Contrast
23
23
  NAME
24
24
  end
25
25
 
26
- def block_message
27
- BLOCK_MESSAGE
26
+ # This rule is solely based on input analysis, which the Service handles. When we move from the Service to the
27
+ # agent with protect library, we should re-enable these tests and that rule.
28
+ # TODO: RUBY-1574
29
+ def enabled?
30
+ super && false
28
31
  end
29
32
 
30
- def prefilter context
31
- return unless prefilter?(context)
32
-
33
- ia_results = gather_ia_results context
34
-
35
- ia_results.each do |ia_result|
36
- result = build_attack_result(context)
37
- build_attack_without_match context, ia_result, result
38
- append_to_activity context, result
39
-
40
- cef_logging result, :successful_attack
41
- raise Contrast::SecurityException.new(self, BLOCK_MESSAGE) if blocked?
42
- end
43
- end
44
-
45
- private
46
-
47
- def prefilter? context
48
- return false unless context&.agent_input_analysis&.results
49
- return false unless enabled?
50
- return false if protect_excluded_by_code?
51
-
52
- true
53
- end
54
-
55
- def gather_ia_results context
56
- context.agent_input_analysis.results.select do |ia_result|
57
- ia_result.rule_id == rule_name
58
- end
59
- end
33
+ # def block_message
34
+ # BLOCK_MESSAGE
35
+ # end
36
+ #
37
+ # def prefilter context
38
+ # return unless prefilter?(context)
39
+ #
40
+ # ia_results = gather_ia_results context
41
+ #
42
+ # ia_results.each do |ia_result|
43
+ # result = build_attack_result(context)
44
+ # build_attack_without_match context, ia_result, result
45
+ # append_to_activity context, result
46
+ #
47
+ # cef_logging result, :successful_attack
48
+ # raise Contrast::SecurityException.new(self, BLOCK_MESSAGE) if blocked?
49
+ # end
50
+ # end
51
+ #
52
+ # private
53
+ #
54
+ # def prefilter? _context
55
+ # return false unless enabled?
56
+ # return false if protect_excluded_by_code?
57
+ #
58
+ # true
59
+ # end
60
60
  end
61
61
  end
62
62
  end
@@ -12,6 +12,23 @@ module Contrast
12
12
  NAME = 'reflected-xss'
13
13
  BLOCK_MESSAGE = 'XSS rule triggered. Response blocked.'
14
14
 
15
+ class << self
16
+ # @param attack_sample [Contrast::Api::Dtm::RaspRuleSample]
17
+ # @return [Hash] the details for this specific rule
18
+ def extract_details attack_sample
19
+ {
20
+ input: attack_sample.xss.input,
21
+ matches: attack_sample.xss.matches.map do |match|
22
+ {
23
+ evidenceStart: match.evidence_start_ms,
24
+ evidence: match.evidence,
25
+ offset: match.offset
26
+ }
27
+ end
28
+ }
29
+ end
30
+ end
31
+
15
32
  def rule_name
16
33
  NAME
17
34
  end
@@ -11,6 +11,20 @@ module Contrast
11
11
  class EntityWrapper
12
12
  attr_reader :system_id, :public_id
13
13
 
14
+ DTD_MARKER = '.dtd'
15
+ FILE_START = 'file:'
16
+ FTP_START = 'ftp:'
17
+ GOPHER_START = 'gopher:'
18
+ JAR_START = 'jar:'
19
+ UP_DIR_LINUX = '../'
20
+ UP_DIR_WIN = '..\\'
21
+ # <!ENTITY name SYSTEM "URI">
22
+ SYSTEM_ID_REGEXP = /<!ENTITY\s+(?<name>[a-zA-Z0-f]+)\s+SYSTEM\s+"(?<id>.*?)">/.cs__freeze
23
+ # <!ENTITY name PUBLIC "public_ID" "URI">
24
+ PUBLIC_ID_REGEXP = /<!ENTITY\s+(?<name>[a-zA-Z0-f]+)\s+PUBLIC\s+".*?"\s+"(?<id>.*?)">/.cs__freeze
25
+ # we only use this against lowercase strings, removed A-Z for speed
26
+ FILE_PATTERN_WINDOWS = /^\\*[a-z]{1,3}:.*/.cs__freeze
27
+
14
28
  def initialize entity
15
29
  @system_id = parse_system_id(entity)
16
30
  # an entity cannot be system and public
@@ -30,29 +44,16 @@ module Contrast
30
44
  @_external_entity
31
45
  end
32
46
 
33
- # <!ENTITY name SYSTEM "URI">
34
- SYSTEM_ID_REGEXP = /<!ENTITY\s+(?<name>[a-zA-Z0-f]+)\s+SYSTEM\s+"(?<id>.*?)">/.cs__freeze
35
47
  def parse_system_id entity
36
48
  match = SYSTEM_ID_REGEXP.match(entity)
37
49
  match[:id] if match
38
50
  end
39
51
 
40
- # <!ENTITY name PUBLIC "public_ID" "URI">
41
- PUBLIC_ID_REGEXP = /<!ENTITY\s+(?<name>[a-zA-Z0-f]+)\s+PUBLIC\s+".*?"\s+"(?<id>.*?)">/.cs__freeze
42
52
  def parse_public_id entity
43
53
  match = PUBLIC_ID_REGEXP.match(entity)
44
54
  match[:id] if match
45
55
  end
46
56
 
47
- DTD_MARKER = '.dtd'
48
- FILE_START = 'file:'
49
- FTP_START = 'ftp:'
50
- GOPHER_START = 'gopher:'
51
- JAR_START = 'jar:'
52
- UP_DIR_LINUX = '../'
53
- UP_DIR_WIN = '..\\'
54
- # we only use this against lowercase strings, removed A-Z for speed
55
- FILE_PATTERN_WINDOWS = /^\\*[a-z]{1,3}:.*/.cs__freeze
56
57
  def external_id? entity_id
57
58
  return false unless entity_id
58
59
 
@@ -13,11 +13,34 @@ module Contrast
13
13
  # of unsafe external entity resolution.
14
14
  class Xxe < Contrast::Agent::Protect::Rule::Base
15
15
  include Contrast::Components::Logger::InstanceMethods
16
+ INPUT_NAME = 'XML Prolog'
16
17
 
17
18
  NAME = 'xxe'
18
19
  BLOCK_MESSAGE = 'XXE rule triggered. Response blocked.'
19
20
  EXTERNAL_ENTITY_PATTERN = /<!ENTITY\s+[a-zA-Z0-f]+\s+(?:SYSTEM|PUBLIC)\s+(.*?)>/.cs__freeze
20
21
 
22
+ class << self
23
+ # @param attack_sample [Contrast::Api::Dtm::RaspRuleSample]
24
+ # @return [Hash] the details for this specific rule
25
+ def extract_details attack_sample
26
+ {
27
+ xml: attack_sample.xxe.xml,
28
+ declaredEntities: attack_sample.xxe.declared_entities.map do |entity|
29
+ {
30
+ start: entity.start_idx,
31
+ end: entity.end_idx
32
+ }
33
+ end,
34
+ entitiesResolved: attack_sample.xxe.entities_resolved.map do |entity|
35
+ {
36
+ systemId: entity.system_id,
37
+ publicId: entity.public_id
38
+ }
39
+ end
40
+ }
41
+ end
42
+ end
43
+
21
44
  def rule_name
22
45
  NAME
23
46
  end
@@ -39,8 +62,8 @@ module Contrast
39
62
  append_to_activity(context, result)
40
63
  return unless blocked?
41
64
 
42
- cef_logging result, :successful_attack, xml
43
- raise Contrast::SecurityException.new(self, BLOCK_MESSAGE)
65
+ cef_logging(result, :successful_attack, xml)
66
+ raise(Contrast::SecurityException.new(self, BLOCK_MESSAGE))
44
67
  end
45
68
 
46
69
  protected
@@ -100,7 +123,6 @@ module Contrast
100
123
  sample
101
124
  end
102
125
 
103
- INPUT_NAME = 'XML Prolog'
104
126
  def build_user_input ia_result
105
127
  input = Contrast::Api::Dtm::UserInput.new
106
128
  input.key = INPUT_NAME
@@ -33,7 +33,7 @@ module Contrast
33
33
 
34
34
  case reaction.operation
35
35
  when Contrast::Api::Settings::Reaction::Operation::DISABLE
36
- Contrast::Agent::DisableReaction.run reaction, level
36
+ Contrast::Agent::DisableReaction.run(reaction, level)
37
37
  when Contrast::Api::Settings::Reaction::Operation::NOOP
38
38
  # NOOP
39
39
  else
@@ -10,42 +10,42 @@ module Contrast
10
10
  module Reporting
11
11
  # This class will hold the new RaspRuleSample.
12
12
  # protect rules.
13
- class RaspRuleSample
14
- def timestamp
15
- @_timestamp ||= 0
16
- end
17
-
18
- def timestamp= timestamp_ms
19
- @_timestamp = timestamp_ms
20
- end
21
-
22
- def user_input
23
- @_user_input ||= Contrast::Agent::Reporting::UserInput.new
24
- end
25
-
26
- def user_input= input
27
- @_user_input = input if input.is_a?(Contrast::Agent::Reporting::UserInput)
28
- end
29
-
30
- def build context, ia_result
31
- sample = self
32
- sample.timestamp = context&.timer&.start_ms
33
- sample.user_input = build_user_input_from_ia(ia_result)
34
- sample.user_input.document_type = if context&.request
35
- Contrast::Utils::StringUtils.force_utf8(context.request.document_type)
36
- end
37
- sample
38
- end
39
-
40
- def build_user_input_from_ia ia_result
41
- user_input = Contrast::Agent::Reporting::UserInput.new
42
- user_input.input_type = ia_result.input_type
43
- user_input.matcher_ids = ia_result.ids
44
- user_input.path = ia_result.path
45
- user_input.key = ia_result.key if ia_result.key
46
- user_input.value = ia_result.value if ia_result.value
47
- user_input
48
- end
13
+ class RaspRuleSample # rubocop:disable Lint/EmptyClass
14
+ # def timestamp
15
+ # @_timestamp ||= 0
16
+ # end
17
+ #
18
+ # def timestamp= timestamp_ms
19
+ # @_timestamp = timestamp_ms
20
+ # end
21
+ #
22
+ # def user_input
23
+ # @_user_input ||= Contrast::Agent::Reporting::UserInput.new
24
+ # end
25
+ #
26
+ # def user_input= input
27
+ # @_user_input = input if input.is_a?(Contrast::Agent::Reporting::UserInput)
28
+ # end
29
+ #
30
+ # def build context, ia_result
31
+ # sample = self
32
+ # sample.timestamp = context&.timer&.start_ms
33
+ # sample.user_input = build_user_input_from_ia(ia_result)
34
+ # sample.user_input.document_type = if context&.request
35
+ # Contrast::Utils::StringUtils.force_utf8(context.request.document_type)
36
+ # end
37
+ # sample
38
+ # end
39
+ #
40
+ # def build_user_input_from_ia ia_result
41
+ # user_input = Contrast::Agent::Reporting::UserInput.new
42
+ # user_input.input_type = ia_result.input_type
43
+ # user_input.matcher_ids = ia_result.ids
44
+ # user_input.path = ia_result.path
45
+ # user_input.key = ia_result.key if ia_result.key
46
+ # user_input.value = ia_result.value if ia_result.value
47
+ # user_input
48
+ # end
49
49
  end
50
50
  end
51
51
  end