contrast-agent 6.6.4 → 6.8.0

Sign up to get free protection for your applications and to get access to all the features.
Files changed (340) hide show
  1. checksums.yaml +4 -4
  2. data/.gitignore +3 -2
  3. data/.gitmodules +0 -3
  4. data/.simplecov +0 -1
  5. data/Rakefile +0 -1
  6. data/ext/cs__assess_array/cs__assess_array.c +41 -10
  7. data/ext/cs__assess_array/cs__assess_array.h +4 -1
  8. data/ext/cs__scope/cs__scope.c +1 -1
  9. data/lib/contrast/agent/assess/contrast_event.rb +2 -24
  10. data/lib/contrast/agent/assess/events/source_event.rb +7 -61
  11. data/lib/contrast/agent/assess/finalizers/hash.rb +11 -0
  12. data/lib/contrast/agent/assess/policy/dynamic_source_factory.rb +0 -55
  13. data/lib/contrast/agent/assess/policy/policy_node.rb +3 -3
  14. data/lib/contrast/agent/assess/policy/policy_node_utils.rb +0 -1
  15. data/lib/contrast/agent/assess/policy/propagation_node.rb +4 -4
  16. data/lib/contrast/agent/assess/policy/source_method.rb +24 -1
  17. data/lib/contrast/agent/assess/policy/trigger/reflected_xss.rb +7 -5
  18. data/lib/contrast/agent/assess/policy/trigger/xpath.rb +6 -1
  19. data/lib/contrast/agent/assess/policy/trigger_method.rb +40 -121
  20. data/lib/contrast/agent/assess/policy/trigger_node.rb +3 -3
  21. data/lib/contrast/agent/assess/policy/trigger_validation/redos_validator.rb +1 -1
  22. data/lib/contrast/agent/assess/policy/trigger_validation/ssrf_validator.rb +1 -1
  23. data/lib/contrast/agent/assess/policy/trigger_validation/xss_validator.rb +1 -1
  24. data/lib/contrast/agent/assess/property/evented.rb +2 -12
  25. data/lib/contrast/agent/assess/rule/provider/hardcoded_value_rule.rb +42 -82
  26. data/lib/contrast/agent/assess/rule/response/base_rule.rb +11 -27
  27. data/lib/contrast/agent/assess/rule/response/body_rule.rb +1 -3
  28. data/lib/contrast/agent/assess/rule/response/cache_control_header_rule.rb +77 -62
  29. data/lib/contrast/agent/assess/rule/response/csp_header_insecure_rule.rb +1 -1
  30. data/lib/contrast/agent/assess/rule/response/framework/rails_support.rb +6 -1
  31. data/lib/contrast/agent/assess/rule/response/header_rule.rb +5 -5
  32. data/lib/contrast/agent/assess/rule/response/hsts_header_rule.rb +1 -1
  33. data/lib/contrast/agent/assess/rule/response/x_xss_protection_header_rule.rb +1 -1
  34. data/lib/contrast/agent/assess/tracker.rb +1 -7
  35. data/lib/contrast/agent/at_exit_hook.rb +1 -7
  36. data/lib/contrast/agent/excluder.rb +224 -0
  37. data/lib/contrast/agent/exclusion_matcher.rb +25 -7
  38. data/lib/contrast/agent/inventory/database_config.rb +18 -23
  39. data/lib/contrast/agent/middleware.rb +4 -5
  40. data/lib/contrast/agent/patching/policy/after_load_patcher.rb +6 -0
  41. data/lib/contrast/agent/protect/input_analyzer/input_analyzer.rb +146 -127
  42. data/lib/contrast/agent/protect/policy/applies_command_injection_rule.rb +4 -0
  43. data/lib/contrast/agent/protect/policy/applies_path_traversal_rule.rb +20 -0
  44. data/lib/contrast/agent/protect/policy/applies_sqli_rule.rb +1 -0
  45. data/lib/contrast/agent/protect/policy/rule_applicator.rb +1 -1
  46. data/lib/contrast/agent/protect/rule/base.rb +98 -66
  47. data/lib/contrast/agent/protect/rule/base_service.rb +49 -24
  48. data/lib/contrast/agent/protect/rule/bot_blocker/bot_blocker_input_classification.rb +98 -0
  49. data/lib/contrast/agent/protect/rule/bot_blocker.rb +81 -0
  50. data/lib/contrast/agent/protect/rule/cmd_injection.rb +30 -99
  51. data/lib/contrast/agent/protect/rule/cmdi/cmdi_backdoors.rb +132 -0
  52. data/lib/contrast/agent/protect/rule/cmdi/cmdi_base_rule.rb +169 -0
  53. data/lib/contrast/agent/protect/rule/cmdi/cmdi_chained_command.rb +69 -0
  54. data/lib/contrast/agent/protect/rule/cmdi/cmdi_dangerous_path.rb +68 -0
  55. data/lib/contrast/agent/protect/rule/cmdi/cmdi_input_classification.rb +2 -58
  56. data/lib/contrast/agent/protect/rule/default_scanner.rb +1 -1
  57. data/lib/contrast/agent/protect/rule/deserialization.rb +10 -19
  58. data/lib/contrast/agent/protect/rule/http_method_tampering/http_method_tampering_input_classification.rb +2 -2
  59. data/lib/contrast/agent/protect/rule/http_method_tampering.rb +0 -11
  60. data/lib/contrast/agent/protect/rule/no_sqli/no_sqli_input_classification.rb +29 -34
  61. data/lib/contrast/agent/protect/rule/no_sqli.rb +25 -18
  62. data/lib/contrast/agent/protect/rule/path_traversal/path_traversal_input_classification.rb +61 -0
  63. data/lib/contrast/agent/protect/rule/path_traversal/path_traversal_semantic_security_bypass.rb +114 -0
  64. data/lib/contrast/agent/protect/rule/path_traversal.rb +46 -18
  65. data/lib/contrast/agent/protect/rule/sql_sample_builder.rb +49 -29
  66. data/lib/contrast/agent/protect/rule/sqli/sqli_base_rule.rb +37 -0
  67. data/lib/contrast/agent/protect/rule/sqli/sqli_input_classification.rb +2 -62
  68. data/lib/contrast/agent/protect/rule/sqli/sqli_semantic/sqli_dangerous_functions.rb +67 -0
  69. data/lib/contrast/agent/protect/rule/sqli.rb +67 -22
  70. data/lib/contrast/agent/protect/rule/unsafe_file_upload/unsafe_file_upload_input_classification.rb +39 -63
  71. data/lib/contrast/agent/protect/rule/unsafe_file_upload.rb +6 -33
  72. data/lib/contrast/agent/protect/rule/xss/reflected_xss_input_classification.rb +58 -0
  73. data/lib/contrast/agent/protect/rule/xss.rb +14 -20
  74. data/lib/contrast/agent/protect/rule/xxe.rb +15 -30
  75. data/lib/contrast/agent/protect/rule.rb +3 -1
  76. data/lib/contrast/agent/reporting/attack_result/attack_result.rb +8 -0
  77. data/lib/contrast/agent/reporting/attack_result/rasp_rule_sample.rb +70 -36
  78. data/lib/contrast/agent/reporting/attack_result/response_type.rb +9 -9
  79. data/lib/contrast/agent/reporting/attack_result/user_input.rb +11 -0
  80. data/lib/contrast/agent/reporting/details/bot_blocker_details.rb +29 -0
  81. data/lib/contrast/agent/reporting/details/cmd_injection_details.rb +30 -0
  82. data/lib/contrast/agent/reporting/details/details.rb +18 -0
  83. data/lib/contrast/agent/reporting/details/http_method_tempering_details.rb +27 -0
  84. data/lib/contrast/agent/reporting/details/ip_denylist_details.rb +35 -0
  85. data/lib/contrast/agent/reporting/details/no_sqli_details.rb +36 -0
  86. data/lib/contrast/agent/reporting/details/path_traversal_details.rb +24 -0
  87. data/lib/contrast/agent/reporting/details/path_traversal_semantic_analysis_details.rb +32 -0
  88. data/lib/contrast/agent/reporting/details/protect_rule_details.rb +17 -0
  89. data/lib/contrast/agent/reporting/details/sqli_dangerous_functions.rb +22 -0
  90. data/lib/contrast/agent/reporting/details/sqli_details.rb +36 -0
  91. data/lib/contrast/agent/reporting/details/untrusted_deserialization_details.rb +27 -0
  92. data/lib/contrast/agent/reporting/details/virtual_patch_details.rb +30 -0
  93. data/lib/contrast/agent/reporting/details/xss_details.rb +33 -0
  94. data/lib/contrast/agent/reporting/details/xss_match.rb +30 -0
  95. data/lib/contrast/agent/reporting/details/xxe_details.rb +36 -0
  96. data/lib/contrast/agent/reporting/details/xxe_match.rb +25 -0
  97. data/lib/contrast/agent/reporting/details/xxe_wrapper.rb +25 -0
  98. data/lib/contrast/agent/reporting/input_analysis/details/bot_blocker_details.rb +27 -0
  99. data/lib/contrast/agent/reporting/input_analysis/details/protect_rule_details.rb +15 -0
  100. data/lib/contrast/agent/reporting/input_analysis/input_analysis.rb +1 -2
  101. data/lib/contrast/agent/reporting/input_analysis/input_analysis_result.rb +17 -3
  102. data/lib/contrast/agent/reporting/masker/masker.rb +80 -65
  103. data/lib/contrast/agent/reporting/masker/masker_utils.rb +1 -30
  104. data/lib/contrast/agent/reporting/reporter.rb +1 -15
  105. data/lib/contrast/agent/reporting/reporting_events/agent_startup.rb +2 -2
  106. data/lib/contrast/agent/reporting/reporting_events/application_activity.rb +84 -15
  107. data/lib/contrast/agent/reporting/reporting_events/application_defend_activity.rb +13 -25
  108. data/lib/contrast/agent/reporting/reporting_events/application_defend_attack_activity.rb +19 -24
  109. data/lib/contrast/agent/reporting/reporting_events/application_defend_attack_sample.rb +46 -126
  110. data/lib/contrast/agent/reporting/reporting_events/application_defend_attack_sample_activity.rb +5 -16
  111. data/lib/contrast/agent/reporting/reporting_events/application_defend_attacker_activity.rb +10 -18
  112. data/lib/contrast/agent/reporting/reporting_events/application_inventory_activity.rb +6 -14
  113. data/lib/contrast/agent/reporting/reporting_events/application_startup.rb +1 -1
  114. data/lib/contrast/agent/reporting/reporting_events/application_update.rb +0 -2
  115. data/lib/contrast/agent/reporting/reporting_events/architecture_component.rb +7 -22
  116. data/lib/contrast/agent/reporting/reporting_events/finding.rb +23 -53
  117. data/lib/contrast/agent/reporting/reporting_events/finding_event.rb +12 -9
  118. data/lib/contrast/agent/reporting/reporting_events/finding_event_signature.rb +1 -1
  119. data/lib/contrast/agent/reporting/reporting_events/finding_event_source.rb +23 -21
  120. data/lib/contrast/agent/reporting/reporting_events/finding_event_stack.rb +5 -18
  121. data/lib/contrast/agent/reporting/reporting_events/finding_event_taint_range.rb +1 -0
  122. data/lib/contrast/{api/decorators/trace_taint_range_tags.rb → agent/reporting/reporting_events/finding_event_taint_range_tags.rb} +7 -6
  123. data/lib/contrast/agent/reporting/reporting_events/finding_request.rb +40 -10
  124. data/lib/contrast/agent/reporting/reporting_events/library_discovery.rb +0 -1
  125. data/lib/contrast/agent/reporting/reporting_events/library_usage_observation.rb +1 -1
  126. data/lib/contrast/agent/reporting/reporting_events/observed_route.rb +2 -2
  127. data/lib/contrast/agent/reporting/reporting_events/poll.rb +1 -11
  128. data/lib/contrast/agent/reporting/reporting_events/preflight_message.rb +10 -14
  129. data/lib/contrast/agent/reporting/reporting_events/reporting_event.rb +11 -0
  130. data/lib/contrast/agent/reporting/reporting_events/route_coverage.rb +3 -1
  131. data/lib/contrast/agent/reporting/reporting_events/route_discovery.rb +12 -25
  132. data/lib/contrast/agent/reporting/reporting_events/route_discovery_observation.rb +8 -27
  133. data/lib/contrast/agent/reporting/reporting_utilities/audit.rb +3 -3
  134. data/lib/contrast/agent/reporting/reporting_utilities/build_preflight.rb +4 -7
  135. data/lib/contrast/agent/reporting/reporting_utilities/headers.rb +1 -1
  136. data/lib/contrast/agent/reporting/reporting_utilities/reporter_client.rb +2 -1
  137. data/lib/contrast/agent/reporting/reporting_utilities/reporter_client_utils.rb +3 -3
  138. data/lib/contrast/agent/reporting/reporting_utilities/response.rb +1 -1
  139. data/lib/contrast/agent/reporting/reporting_utilities/response_handler.rb +0 -3
  140. data/lib/contrast/agent/reporting/reporting_utilities/response_handler_utils.rb +1 -0
  141. data/lib/contrast/agent/reporting/settings/code_exclusion.rb +6 -1
  142. data/lib/contrast/agent/reporting/settings/exclusion_base.rb +18 -0
  143. data/lib/contrast/agent/reporting/settings/exclusions.rb +2 -1
  144. data/lib/contrast/agent/reporting/settings/input_exclusion.rb +9 -3
  145. data/lib/contrast/agent/reporting/settings/protect.rb +15 -15
  146. data/lib/contrast/agent/request.rb +4 -14
  147. data/lib/contrast/agent/request_context.rb +18 -24
  148. data/lib/contrast/agent/request_context_extend.rb +23 -164
  149. data/lib/contrast/agent/request_handler.rb +1 -11
  150. data/lib/contrast/agent/response.rb +0 -18
  151. data/lib/contrast/agent/telemetry/events/event.rb +1 -1
  152. data/lib/contrast/agent/telemetry/events/metric_event.rb +1 -1
  153. data/lib/contrast/agent/telemetry/events/startup_metrics_event.rb +3 -3
  154. data/lib/contrast/agent/thread_watcher.rb +3 -18
  155. data/lib/contrast/agent/version.rb +1 -1
  156. data/lib/contrast/agent.rb +0 -11
  157. data/lib/contrast/agent_lib/api/command_injection.rb +46 -0
  158. data/lib/contrast/agent_lib/api/init.rb +101 -0
  159. data/lib/contrast/agent_lib/api/input_tracing.rb +267 -0
  160. data/lib/contrast/agent_lib/api/method_tempering.rb +29 -0
  161. data/lib/contrast/agent_lib/api/panic.rb +87 -0
  162. data/lib/contrast/agent_lib/api/path_semantic_file_security_bypass.rb +40 -0
  163. data/lib/contrast/agent_lib/interface.rb +260 -0
  164. data/lib/contrast/agent_lib/interface_base.rb +118 -0
  165. data/lib/contrast/agent_lib/return_types/eval_result.rb +44 -0
  166. data/lib/contrast/agent_lib/test.rb +29 -0
  167. data/lib/contrast/api/communication/connection_status.rb +5 -5
  168. data/lib/contrast/components/agent.rb +13 -23
  169. data/lib/contrast/components/api.rb +10 -10
  170. data/lib/contrast/components/app_context.rb +9 -11
  171. data/lib/contrast/components/app_context_extend.rb +1 -26
  172. data/lib/contrast/components/assess.rb +92 -38
  173. data/lib/contrast/components/assess_rules.rb +36 -0
  174. data/lib/contrast/components/config.rb +49 -24
  175. data/lib/contrast/components/heap_dump.rb +1 -1
  176. data/lib/contrast/components/protect.rb +9 -6
  177. data/lib/contrast/components/ruby_component.rb +81 -0
  178. data/lib/contrast/components/sampling.rb +1 -1
  179. data/lib/contrast/components/security_logger.rb +23 -0
  180. data/lib/contrast/components/settings.rb +41 -85
  181. data/lib/contrast/config/base_configuration.rb +1 -1
  182. data/lib/contrast/config/protect_rule_configuration.rb +7 -7
  183. data/lib/contrast/config/protect_rules_configuration.rb +24 -48
  184. data/lib/contrast/config/server_configuration.rb +1 -1
  185. data/lib/contrast/config.rb +0 -6
  186. data/lib/contrast/configuration.rb +73 -18
  187. data/lib/contrast/extension/assess/array.rb +9 -0
  188. data/lib/contrast/extension/assess/exec_trigger.rb +3 -1
  189. data/lib/contrast/extension/assess/marshal.rb +3 -2
  190. data/lib/contrast/extension/assess/string.rb +0 -1
  191. data/lib/contrast/extension/delegator.rb +2 -0
  192. data/lib/contrast/extension/extension.rb +1 -1
  193. data/lib/contrast/framework/base_support.rb +0 -5
  194. data/lib/contrast/framework/grape/support.rb +1 -23
  195. data/lib/contrast/framework/manager.rb +3 -11
  196. data/lib/contrast/framework/rails/patch/action_controller_live_buffer.rb +1 -6
  197. data/lib/contrast/framework/rails/railtie.rb +0 -1
  198. data/lib/contrast/framework/rails/support.rb +5 -59
  199. data/lib/contrast/framework/sinatra/support.rb +2 -21
  200. data/lib/contrast/logger/cef_log.rb +21 -3
  201. data/lib/contrast/logger/log.rb +1 -11
  202. data/lib/contrast/tasks/config.rb +5 -10
  203. data/lib/contrast/utils/assess/event_limit_utils.rb +28 -12
  204. data/lib/contrast/utils/assess/trigger_method_utils.rb +10 -18
  205. data/lib/contrast/utils/duck_utils.rb +1 -0
  206. data/lib/contrast/utils/findings.rb +6 -5
  207. data/lib/contrast/utils/hash_digest.rb +9 -24
  208. data/lib/contrast/utils/hash_digest_extend.rb +6 -6
  209. data/lib/contrast/utils/input_classification_base.rb +156 -0
  210. data/lib/contrast/utils/invalid_configuration_util.rb +21 -58
  211. data/lib/contrast/utils/log_utils.rb +47 -17
  212. data/lib/contrast/utils/net_http_base.rb +2 -2
  213. data/lib/contrast/utils/os.rb +0 -20
  214. data/lib/contrast/utils/patching/policy/patch_utils.rb +3 -2
  215. data/lib/contrast/utils/response_utils.rb +0 -16
  216. data/lib/contrast/utils/stack_trace_utils.rb +3 -40
  217. data/lib/contrast/utils/string_utils.rb +19 -7
  218. data/lib/contrast/utils/telemetry_client.rb +13 -7
  219. data/lib/contrast.rb +7 -13
  220. data/resources/protect/policy.json +1 -2
  221. data/ruby-agent.gemspec +2 -5
  222. metadata +78 -137
  223. data/exe/contrast_service +0 -23
  224. data/lib/contrast/agent/protect/rule/cmdi/cmdi_worth_watching.rb +0 -64
  225. data/lib/contrast/agent/protect/rule/sqli/sqli_worth_watching.rb +0 -118
  226. data/lib/contrast/agent/protect/rule/unsafe_file_upload/unsafe_file_upload_matcher.rb +0 -45
  227. data/lib/contrast/agent/reaction_processor.rb +0 -47
  228. data/lib/contrast/agent/reporting/reporting_events/trace_event_source.rb +0 -30
  229. data/lib/contrast/agent/reporting/reporting_utilities/dtm_message.rb +0 -43
  230. data/lib/contrast/agent/service_heartbeat.rb +0 -35
  231. data/lib/contrast/api/communication/messaging_queue.rb +0 -129
  232. data/lib/contrast/api/communication/response_processor.rb +0 -90
  233. data/lib/contrast/api/communication/service_lifecycle.rb +0 -77
  234. data/lib/contrast/api/communication/socket.rb +0 -44
  235. data/lib/contrast/api/communication/socket_client.rb +0 -130
  236. data/lib/contrast/api/communication/speedracer.rb +0 -142
  237. data/lib/contrast/api/communication/tcp_socket.rb +0 -32
  238. data/lib/contrast/api/communication/unix_socket.rb +0 -28
  239. data/lib/contrast/api/communication.rb +0 -20
  240. data/lib/contrast/api/decorators/activity.rb +0 -33
  241. data/lib/contrast/api/decorators/address.rb +0 -59
  242. data/lib/contrast/api/decorators/agent_startup.rb +0 -57
  243. data/lib/contrast/api/decorators/application_settings.rb +0 -42
  244. data/lib/contrast/api/decorators/application_startup.rb +0 -56
  245. data/lib/contrast/api/decorators/architecture_component.rb +0 -36
  246. data/lib/contrast/api/decorators/bot_blocker.rb +0 -37
  247. data/lib/contrast/api/decorators/finding.rb +0 -29
  248. data/lib/contrast/api/decorators/http_request.rb +0 -137
  249. data/lib/contrast/api/decorators/input_analysis.rb +0 -18
  250. data/lib/contrast/api/decorators/instrumentation_mode.rb +0 -35
  251. data/lib/contrast/api/decorators/ip_denylist.rb +0 -37
  252. data/lib/contrast/api/decorators/message.rb +0 -71
  253. data/lib/contrast/api/decorators/rasp_rule_sample.rb +0 -58
  254. data/lib/contrast/api/decorators/response_type.rb +0 -17
  255. data/lib/contrast/api/decorators/route_coverage.rb +0 -91
  256. data/lib/contrast/api/decorators/server_features.rb +0 -25
  257. data/lib/contrast/api/decorators/trace_event.rb +0 -120
  258. data/lib/contrast/api/decorators/trace_event_object.rb +0 -63
  259. data/lib/contrast/api/decorators/trace_event_signature.rb +0 -69
  260. data/lib/contrast/api/decorators/trace_taint_range.rb +0 -52
  261. data/lib/contrast/api/decorators/user_input.rb +0 -51
  262. data/lib/contrast/api/decorators/virtual_patch.rb +0 -34
  263. data/lib/contrast/api/decorators.rb +0 -28
  264. data/lib/contrast/api/dtm.pb.rb +0 -852
  265. data/lib/contrast/api/settings.pb.rb +0 -500
  266. data/lib/contrast/api.rb +0 -16
  267. data/lib/contrast/components/contrast_service.rb +0 -88
  268. data/lib/contrast/config/assess_configuration.rb +0 -93
  269. data/lib/contrast/config/assess_rules_configuration.rb +0 -32
  270. data/lib/contrast/config/root_configuration.rb +0 -90
  271. data/lib/contrast/config/ruby_configuration.rb +0 -81
  272. data/lib/contrast/config/service_configuration.rb +0 -49
  273. data/lib/contrast/tasks/service.rb +0 -84
  274. data/lib/contrast/utils/input_classification.rb +0 -73
  275. data/lib/contrast/utils/preflight_util.rb +0 -13
  276. data/lib/protobuf/code_generator.rb +0 -129
  277. data/lib/protobuf/decoder.rb +0 -28
  278. data/lib/protobuf/deprecation.rb +0 -117
  279. data/lib/protobuf/descriptors/google/protobuf/compiler/plugin.pb.rb +0 -79
  280. data/lib/protobuf/descriptors/google/protobuf/descriptor.pb.rb +0 -360
  281. data/lib/protobuf/descriptors.rb +0 -3
  282. data/lib/protobuf/encoder.rb +0 -11
  283. data/lib/protobuf/enum.rb +0 -365
  284. data/lib/protobuf/exceptions.rb +0 -9
  285. data/lib/protobuf/field/base_field.rb +0 -380
  286. data/lib/protobuf/field/base_field_object_definitions.rb +0 -504
  287. data/lib/protobuf/field/bool_field.rb +0 -64
  288. data/lib/protobuf/field/bytes_field.rb +0 -67
  289. data/lib/protobuf/field/double_field.rb +0 -25
  290. data/lib/protobuf/field/enum_field.rb +0 -56
  291. data/lib/protobuf/field/field_array.rb +0 -102
  292. data/lib/protobuf/field/field_hash.rb +0 -122
  293. data/lib/protobuf/field/fixed32_field.rb +0 -25
  294. data/lib/protobuf/field/fixed64_field.rb +0 -28
  295. data/lib/protobuf/field/float_field.rb +0 -43
  296. data/lib/protobuf/field/int32_field.rb +0 -21
  297. data/lib/protobuf/field/int64_field.rb +0 -34
  298. data/lib/protobuf/field/integer_field.rb +0 -23
  299. data/lib/protobuf/field/message_field.rb +0 -51
  300. data/lib/protobuf/field/sfixed32_field.rb +0 -27
  301. data/lib/protobuf/field/sfixed64_field.rb +0 -28
  302. data/lib/protobuf/field/signed_integer_field.rb +0 -29
  303. data/lib/protobuf/field/sint32_field.rb +0 -21
  304. data/lib/protobuf/field/sint64_field.rb +0 -21
  305. data/lib/protobuf/field/string_field.rb +0 -51
  306. data/lib/protobuf/field/uint32_field.rb +0 -21
  307. data/lib/protobuf/field/uint64_field.rb +0 -21
  308. data/lib/protobuf/field/varint_field.rb +0 -77
  309. data/lib/protobuf/field.rb +0 -74
  310. data/lib/protobuf/generators/base.rb +0 -85
  311. data/lib/protobuf/generators/enum_generator.rb +0 -39
  312. data/lib/protobuf/generators/extension_generator.rb +0 -27
  313. data/lib/protobuf/generators/field_generator.rb +0 -193
  314. data/lib/protobuf/generators/file_generator.rb +0 -262
  315. data/lib/protobuf/generators/group_generator.rb +0 -122
  316. data/lib/protobuf/generators/message_generator.rb +0 -104
  317. data/lib/protobuf/generators/option_generator.rb +0 -17
  318. data/lib/protobuf/generators/printable.rb +0 -160
  319. data/lib/protobuf/generators/service_generator.rb +0 -50
  320. data/lib/protobuf/lifecycle.rb +0 -33
  321. data/lib/protobuf/logging.rb +0 -39
  322. data/lib/protobuf/message/fields.rb +0 -233
  323. data/lib/protobuf/message/serialization.rb +0 -85
  324. data/lib/protobuf/message.rb +0 -241
  325. data/lib/protobuf/optionable.rb +0 -72
  326. data/lib/protobuf/tasks/compile.rake +0 -80
  327. data/lib/protobuf/tasks.rb +0 -1
  328. data/lib/protobuf/varint.rb +0 -20
  329. data/lib/protobuf/varint_pure.rb +0 -31
  330. data/lib/protobuf/version.rb +0 -3
  331. data/lib/protobuf/wire_type.rb +0 -10
  332. data/lib/protobuf.rb +0 -91
  333. data/proto/dynamic_discovery.proto +0 -46
  334. data/proto/google/protobuf/compiler/plugin.proto +0 -183
  335. data/proto/google/protobuf/descriptor.proto +0 -911
  336. data/proto/rpc.proto +0 -71
  337. data/service_executables/.gitkeep +0 -0
  338. data/service_executables/VERSION +0 -1
  339. data/service_executables/linux/contrast-service +0 -0
  340. data/service_executables/mac/contrast-service +0 -0
@@ -6,40 +6,53 @@ require 'contrast/utils/stack_trace_utils'
6
6
  require 'contrast/utils/object_share'
7
7
  require 'contrast/components/logger'
8
8
  require 'contrast/agent/reporting/input_analysis/input_type'
9
+ require 'contrast/agent_lib/interface'
10
+ require 'contrast/agent/protect/rule/cmdi/cmdi_chained_command'
11
+ require 'contrast/agent/protect/rule/cmdi/cmdi_dangerous_path'
12
+ require 'contrast/agent/protect/rule/cmdi/cmdi_base_rule'
13
+ require 'contrast/agent/protect/rule/cmdi/cmdi_backdoors'
9
14
 
10
15
  module Contrast
11
16
  module Agent
12
17
  module Protect
13
18
  module Rule
14
19
  # The Ruby implementation of the Protect Command Injection rule.
15
- class CmdInjection < Contrast::Agent::Protect::Rule::BaseService
20
+ class CmdInjection < Contrast::Agent::Protect::Rule::CmdiBaseRule
16
21
  include Contrast::Components::Logger::InstanceMethods
17
22
  include Contrast::Agent::Reporting::InputType
18
-
19
23
  NAME = 'cmd-injection'
20
- CHAINED_COMMAND_CHARS = /[;&|<>]/.cs__freeze
24
+
21
25
  APPLICABLE_USER_INPUTS = [
22
26
  BODY, COOKIE_VALUE, HEADER, PARAMETER_NAME,
23
27
  PARAMETER_VALUE, JSON_VALUE, MULTIPART_VALUE,
24
28
  MULTIPART_FIELD_NAME, XML_VALUE, DWR_VALUE
25
29
  ].cs__freeze
26
-
27
- class << self
28
- # @param attack_sample [Contrast::Api::Dtm::RaspRuleSample]
29
- # @return [Hash] the details for this specific rule
30
- def extract_details attack_sample
31
- {
32
- command: attack_sample.cmdi.command,
33
- startIndex: attack_sample.cmdi.start_idx,
34
- endIndex: attack_sample.cmdi.end_idx
35
- }
36
- end
37
- end
30
+ SUB_RULES = [
31
+ Contrast::Agent::Protect::Rule::CmdiBackdoors.new,
32
+ Contrast::Agent::Protect::Rule::CmdiChainedCommand.new,
33
+ Contrast::Agent::Protect::Rule::CmdiDangerousPath.new
34
+ ].cs__freeze
38
35
 
39
36
  def rule_name
40
37
  NAME
41
38
  end
42
39
 
40
+ def sub_rules
41
+ SUB_RULES
42
+ end
43
+
44
+ def applicable_user_inputs
45
+ APPLICABLE_USER_INPUTS
46
+ end
47
+
48
+ # CMDI infilter:
49
+ #
50
+ # @param context [Contrast::Agent::RequestContext] current request context
51
+ # @param classname [String] Name of the class
52
+ # @param method [String] name of the method triggering the rule
53
+ # @param command [String] potential dangerous command executed.
54
+ # @raise [Contrast::SecurityException] if the rule mode is set
55
+ # to BLOCK and valid cdmi is detected.
43
56
  def infilter context, classname, method, command
44
57
  return unless infilter?(context)
45
58
 
@@ -62,90 +75,8 @@ module Contrast
62
75
 
63
76
  return unless blocked?
64
77
 
65
- raise(Contrast::SecurityException.new(self,
66
- 'Command Injection rule triggered. '\
67
- "Call to #{ classname }.#{ method } blocked."))
68
- end
69
-
70
- def build_attack_with_match context, input_analysis_result, result, candidate_string, **kwargs
71
- if mode == Contrast::Api::Settings::ProtectionRule::Mode::NO_ACTION ||
72
- mode == Contrast::Api::Settings::ProtectionRule::Mode::PERMIT
73
-
74
- return result
75
- end
76
-
77
- result ||= build_attack_result(context)
78
- update_successful_attack_response(context, input_analysis_result, result, candidate_string)
79
- append_sample(context, input_analysis_result, result, candidate_string, **kwargs)
80
- result
81
- end
82
-
83
- protected
84
-
85
- # Because results are not necessarily on the context across
86
- # processes; extract early and pass into the method
87
- def find_attacker_with_results context, potential_attack_string, ia_results, **kwargs
88
- logger.trace('Checking vectors for attacks', rule: rule_name, input: potential_attack_string)
89
- result = super(context, potential_attack_string, ia_results, **kwargs)
90
- if result.nil? && potential_attack_string
91
- result = find_probable_attacker(context, potential_attack_string, ia_results, **kwargs)
92
- end
93
- result
94
- end
95
-
96
- # Build a subclass of the RaspRuleSample using the query string and the
97
- # evaluation
98
- def build_sample context, input_analysis_result, candidate_string, **_kwargs
99
- sample = build_base_sample(context, input_analysis_result)
100
- sample.cmdi = Contrast::Api::Dtm::CmdInjectionDetails.new
101
-
102
- command = candidate_string || input_analysis_result.value
103
- command = Contrast::Utils::StringUtils.protobuf_safe_string(command)
104
- sample.cmdi.command = command
105
- sample.cmdi.end_idx = command.length
106
-
107
- # This is a special case where the user input is UNKNOWN_USER_INPUT but
108
- # we want to send the attack value
109
- if input_analysis_result.nil?
110
- ui = Contrast::Api::Dtm::UserInput.new
111
- ui.input_type = :UNKNOWN
112
- ui.value = command
113
- sample.user_input = ui
114
- end
115
-
116
- sample
117
- end
118
-
119
- private
120
-
121
- def report_command_execution context, command, **kwargs
122
- return unless report_any_command_execution?
123
- return if protect_excluded_by_code?
124
-
125
- build_attack_with_match(context, nil, nil, command, **kwargs)
126
- end
127
-
128
- def find_probable_attacker context, potential_attack_string, ia_results, **kwargs
129
- return unless chained_command?(potential_attack_string)
130
-
131
- likely_attacker = ia_results.find { |input_analysis_result| chained_command?(input_analysis_result.value) }
132
- return unless likely_attacker
133
-
134
- build_attack_with_match(context, likely_attacker, nil, potential_attack_string, **kwargs)
135
- end
136
-
137
- def chained_command? command
138
- CHAINED_COMMAND_CHARS.match(command)
139
- end
140
-
141
- # Part of the Hardening for Command Injection detection is the
142
- # ability to detect and prevent any command execution from within the
143
- # application. This check determines if that hardening has been
144
- # enabled.
145
- # @return [Boolean] if the agent should report all command
146
- # executions.
147
- def report_any_command_execution?
148
- ::Contrast::PROTECT.report_any_command_execution?
78
+ # Raise cmdi error
79
+ raise_error(classname, method)
149
80
  end
150
81
  end
151
82
  end
@@ -0,0 +1,132 @@
1
+ # Copyright (c) 2022 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
2
+ # frozen_string_literal: true
3
+
4
+ require 'contrast/agent/protect/rule/base_service'
5
+ require 'contrast/agent/request_context'
6
+ require 'contrast/utils/object_share'
7
+ require 'contrast/agent/protect/rule/cmdi/cmdi_base_rule'
8
+ require 'contrast/agent/protect/rule/cmd_injection'
9
+
10
+ module Contrast
11
+ module Agent
12
+ module Protect
13
+ module Rule
14
+ # The Ruby implementation of the Protect Command Injection Command
15
+ # Backdoors sub-rule.
16
+ class CmdiBackdoors < Contrast::Agent::Protect::Rule::CmdiBaseRule
17
+ NAME = 'cmd-injection-command-backdoors'
18
+ MATCHES = %w[/bin/bash-c /bin/sh-c sh-c bash-c].cs__freeze
19
+
20
+ def rule_name
21
+ NAME
22
+ end
23
+
24
+ # CMDI Backdoors infilter:
25
+ # This rule does not have input classification.
26
+ # If a value matches the CMDI applicable input types and it's length is > 2
27
+ # we can check if it's used as command backdoors.
28
+ #
29
+ # @param context [Contrast::Agent::RequestContext] current request contest
30
+ # @param classname [String] Name of the class
31
+ # @param method [String] name of the method triggering the rule
32
+ # @param command [String] potential dangerous command executed.
33
+ # @raise [Contrast::SecurityException] if the rule mode ise set
34
+ # to BLOCK and valid cdmi is detected.
35
+ def infilter context, classname, method, command
36
+ return unless (ia_results = gather_ia_results(context))
37
+ return unless backdoors_match?(command)
38
+ return unless (likely_attacker = match_applicable_input_type(ia_results, command))
39
+ return if protect_excluded_by_code?
40
+ return unless (result = build_attack_with_match(context, likely_attacker, nil, command,
41
+ **{ classname: classname, method: method }))
42
+
43
+ append_to_activity(context, result)
44
+ cef_logging(result, :successful_attack)
45
+ return unless blocked?
46
+
47
+ raise_error(classname, method)
48
+ end
49
+
50
+ # @param context [Contrast::Agent::RequestContext]
51
+ def infilter? context
52
+ return false unless enabled?
53
+ # This rule does not have input tracing stage so we need to check the results of
54
+ # the main rule instead.
55
+ return false unless context&.agent_input_analysis&.results&.any? do |result|
56
+ result.rule_id == Contrast::Agent::Protect::Rule::CmdInjection::NAME
57
+ end
58
+
59
+ return false if protect_excluded_by_code?
60
+
61
+ true
62
+ end
63
+
64
+ protected
65
+
66
+ # Used to customize the raised error message.
67
+ #
68
+ # @param classname [String] Name of the class
69
+ # @param method [String] name of the method triggering the rule
70
+ # @raise [Contrast::SecurityException]
71
+ def raise_error classname, method
72
+ raise(Contrast::SecurityException.new(self,
73
+ 'Command Injection Command Backdoor rule triggered. '\
74
+ "Call to #{ classname }.#{ method } blocked."))
75
+ end
76
+
77
+ private
78
+
79
+ # Check to see if value is backdoor match
80
+ #
81
+ # @param potential_attack_string [String]
82
+ def backdoors_match? potential_attack_string
83
+ return false unless potential_attack_string && potential_attack_string.length > 2
84
+ return false unless matches_shell_parameter?(potential_attack_string)
85
+
86
+ true
87
+ end
88
+
89
+ # Checks to see if input is used as parameter for a shell cmd.
90
+ #
91
+ # @param cmd [String]
92
+ # @return [Boolean]
93
+ def matches_shell_parameter? cmd
94
+ normalize_cmd = cmd.delete(Contrast::Utils::ObjectShare::SPACE)
95
+ MATCHES.each do |match|
96
+ return true if normalize_cmd.include?(match)
97
+ end
98
+ false
99
+ end
100
+
101
+ # Check to see if the user input is one of the applicable types.
102
+ # With Agent_ia if we are here and CMDI is being analyzed then
103
+ # the applicable input type is already checked before input
104
+ # classification. Only thing left is the match check.
105
+ #
106
+ # @param ia_results [Contrast::Agent::Reporting::Settings::InputAnalysisResult] gathered results
107
+ # @param cmd [String] potential attack vector
108
+ # @return [Contrast::Agent::Reporting::Settings::InputAnalysisResult, nil] matched input_type
109
+ def match_applicable_input_type ia_results, cmd
110
+ ia_results.each do |ia_result|
111
+ return ia_result if ia_result.value == cmd
112
+ end
113
+ nil
114
+ end
115
+
116
+ # Backdoors does not have input classification so we check for match within the
117
+ # result for the main rule - CMDI.
118
+ #
119
+ # @param context [Contrast::Agent::RequestContext]
120
+ def gather_ia_results context
121
+ return Contrast::Utils::ObjectShare::EMPTY_ARRAY unless context&.agent_input_analysis&.results
122
+
123
+ context.agent_input_analysis.results.select do |ia_result|
124
+ ia_result.rule_id == Contrast::Agent::Protect::Rule::CmdInjection::NAME &&
125
+ ia_result.score_level != Contrast::Agent::Reporting::ScoreLevel::IGNORE
126
+ end
127
+ end
128
+ end
129
+ end
130
+ end
131
+ end
132
+ end
@@ -0,0 +1,169 @@
1
+ # Copyright (c) 2022 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
2
+ # frozen_string_literal: true
3
+
4
+ require 'contrast/agent/reporting/details/cmd_injection_details'
5
+ require 'contrast/agent/reporting/attack_result/user_input'
6
+
7
+ module Contrast
8
+ module Agent
9
+ module Protect
10
+ module Rule
11
+ # The Ruby implementation of the Protect Command Injection Semantic
12
+ # Dangerous Path sub-rule. This rule should report
13
+ class CmdiBaseRule < Contrast::Agent::Protect::Rule::BaseService
14
+ include Contrast::Components::Logger::InstanceMethods
15
+ include Contrast::Agent::Reporting::InputType
16
+
17
+ CHAINED_COMMAND_CHARS = /[;&|<>]/.cs__freeze
18
+ APPLICABLE_USER_INPUTS = [
19
+ BODY, COOKIE_VALUE, HEADER, PARAMETER_NAME,
20
+ PARAMETER_VALUE, JSON_VALUE, MULTIPART_VALUE,
21
+ MULTIPART_FIELD_NAME, XML_VALUE, DWR_VALUE
22
+ ].cs__freeze
23
+
24
+ # CMDI infilter:
25
+ #
26
+ # @param context [Contrast::Agent::RequestContext] current request contest
27
+ # @param classname [String] Name of the class
28
+ # @param method [String] name of the method triggering the rule
29
+ # @param command [String] potential dangerous command executed.
30
+ # @raise [Contrast::SecurityException] if the rule mode ise set
31
+ # to BLOCK and valid cdmi is detected.
32
+ def infilter context, classname, method, command
33
+ if ::Contrast::APP_CONTEXT.in_new_process?
34
+ logger.trace('Running cmd-injection infilter within new process - creating new context')
35
+ context = Contrast::Agent::RequestContext.new(context.request.rack_request)
36
+ Contrast::Agent::REQUEST_TRACKER.update_current_context(context)
37
+ end
38
+ return unless infilter?(context)
39
+
40
+ result = find_attacker_with_results(context, command, nil, **{ classname: classname, method: method })
41
+ result ||= report_command_execution(context, command, **{ classname: classname, method: method })
42
+ return unless result
43
+
44
+ append_to_activity(context, result)
45
+ cef_logging(result, :successful_attack)
46
+ return unless blocked?
47
+
48
+ raise_error(classname, method)
49
+ end
50
+
51
+ def build_attack_with_match(context,
52
+ input_analysis_result,
53
+ result,
54
+ candidate_string,
55
+ **kwargs)
56
+ return result if mode == :NO_ACTION || mode == :PERMIT
57
+
58
+ result ||= build_attack_result(context)
59
+ update_successful_attack_response(context, input_analysis_result, result, candidate_string)
60
+ append_sample(context, input_analysis_result, result, candidate_string, **kwargs)
61
+ result
62
+ end
63
+
64
+ protected
65
+
66
+ # Used to customize the raised error message.
67
+ #
68
+ # @param classname [String] Name of the class
69
+ # @param method [String] name of the method triggering the rule
70
+ # @raise [Contrast::SecurityException]
71
+ def raise_error classname, method
72
+ raise(Contrast::SecurityException.new(self,
73
+ 'Command Injection Rule triggered. '\
74
+ "Call to #{ classname }.#{ method } blocked."))
75
+ end
76
+
77
+ # Allows for the InputAnalysis from service to be extracted early.
78
+ # Because results are not necessarily on the context across
79
+ # processes; extract early and pass into the method
80
+ #
81
+ # @param context [Contrast::Agent::RequestContext]
82
+ # @param potential_attack_string [String, nil]
83
+ # @param ia_results [Array<Contrast::Agent::Reporting::InputAnalysis>]
84
+ # @param **kwargs
85
+ # @return [Contrast::Agent::Reporting, nil]
86
+ def find_attacker_with_results context, potential_attack_string, ia_results, **kwargs
87
+ logger.trace('Checking vectors for attacks', rule: rule_name, input: potential_attack_string)
88
+ result = super(context, potential_attack_string, ia_results, **kwargs) if ia_results
89
+ if result.nil? && potential_attack_string
90
+ result = find_probable_attacker(context, potential_attack_string, ia_results, **kwargs)
91
+ end
92
+ result
93
+ end
94
+
95
+ # Build a subclass of the RaspRuleSample using the query string and the
96
+ # evaluation
97
+ def build_sample context, input_analysis_result, candidate_string, **kwargs
98
+ sample = build_base_sample(context, input_analysis_result)
99
+ sample.details = Contrast::Agent::Reporting::Details::CmdInjectionDetails.new
100
+
101
+ # extract data from kwargs for the agent_lib check
102
+ agent_lib_result_struct = kwargs[:result_struct]
103
+ command = candidate_string || input_analysis_result.value
104
+ command = Contrast::Utils::StringUtils.protobuf_safe_string(command)
105
+ handle_with_agent_lib(sample, agent_lib_result_struct, command)
106
+
107
+ # This is a special case where the user input is UNKNOWN_USER_INPUT but
108
+ # we want to send the attack value
109
+ if input_analysis_result.nil?
110
+ ui = Contrast::Agent::Reporting::UserInput.new
111
+ ui.input_type = :UNKNOWN
112
+ ui.value = command
113
+ sample.user_input = ui
114
+ end
115
+
116
+ sample
117
+ end
118
+
119
+ private
120
+
121
+ def report_command_execution context, command, **kwargs
122
+ return unless report_any_command_execution?
123
+ return if protect_excluded_by_code?
124
+
125
+ build_attack_with_match(context, nil, nil, command, **kwargs)
126
+ end
127
+
128
+ def find_probable_attacker context, potential_attack_string, ia_results, **kwargs
129
+ return unless chained_command?(potential_attack_string)
130
+
131
+ likely_attacker = ia_results.find { |input_analysis_result| chained_command?(input_analysis_result.value) }
132
+ return unless likely_attacker
133
+
134
+ build_attack_with_match(context, likely_attacker, nil, potential_attack_string, **kwargs)
135
+ end
136
+
137
+ def chained_command? command
138
+ CHAINED_COMMAND_CHARS.match(command)
139
+ end
140
+
141
+ # Part of the Hardening for Command Injection detection is the
142
+ # ability to detect and prevent any command execution from within the
143
+ # application. This check determines if that hardening has been
144
+ # enabled.
145
+ # @return [Boolean] if the agent should report all command
146
+ # executions.
147
+ def report_any_command_execution?
148
+ ::Contrast::PROTECT.report_any_command_execution?
149
+ end
150
+
151
+ # handle agent_lib data being attached
152
+ def handle_with_agent_lib sample, agent_lib_result_struct, command
153
+ sample.details.cmd = command
154
+ if agent_lib_result_struct&.cs__is_a?(Hash)
155
+ sample.details.start_idx = agent_lib_result_struct[:start_index]
156
+ sample.details.end_idx = if (agent_lib_result_struct[:end_index]).zero?
157
+ command.length
158
+ else
159
+ agent_lib_result_struct[:end_index]
160
+ end
161
+ else
162
+ sample.details.end_idx = command.length
163
+ end
164
+ end
165
+ end
166
+ end
167
+ end
168
+ end
169
+ end
@@ -0,0 +1,69 @@
1
+ # Copyright (c) 2022 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
2
+ # frozen_string_literal: true
3
+
4
+ require 'contrast/agent/protect/rule/base_service'
5
+ require 'contrast/agent/request_context'
6
+ require 'contrast/utils/object_share'
7
+ require 'contrast/agent/protect/rule/cmdi/cmdi_base_rule'
8
+
9
+ module Contrast
10
+ module Agent
11
+ module Protect
12
+ module Rule
13
+ # The Ruby implementation of the Protect Command Injection Semantic
14
+ # Chained Command sub-rule. This rule should report
15
+ class CmdiChainedCommand < Contrast::Agent::Protect::Rule::CmdiBaseRule
16
+ NAME = 'cmd-injection-semantic-chained-commands'
17
+
18
+ def initialize
19
+ super
20
+ @mode = :MONITOR
21
+ end
22
+
23
+ def rule_name
24
+ NAME
25
+ end
26
+
27
+ def sub_rules
28
+ Contrast::Utils::ObjectShare::EMPTY_ARRAY
29
+ end
30
+
31
+ protected
32
+
33
+ # Used to customize the raised error message.
34
+ #
35
+ # @param classname [String] Name of the class
36
+ # @param method [String] name of the method triggering the rule
37
+ # @raise [Contrast::SecurityException]
38
+ def raise_error classname, method
39
+ raise(Contrast::SecurityException.new(self,
40
+ 'Command Injection Semantic Chained Commands rule triggered. '\
41
+ "Call to #{ classname }.#{ method } blocked."))
42
+ end
43
+
44
+ private
45
+
46
+ def find_probable_attacker context, potential_attack_string, _ia_results, **kwargs
47
+ chained = chained_command?(potential_attack_string)
48
+ return unless chained
49
+
50
+ build_attack_with_match(context, nil, nil, potential_attack_string, **kwargs)
51
+ end
52
+
53
+ # Check if potential chained attack is detected in user input.
54
+ #
55
+ # @param command [String] command to check.
56
+ # @return index[Boolean Returns the index of the command chaining if found.
57
+ # If the chaining index is >= 0, an injection is detected. Returns -1 when no
58
+ # command chaining is found.
59
+ def chained_command? command
60
+ return false unless (agent_lib = Contrast::AGENT_LIB) && command
61
+ return false if agent_lib.chained_cmdi_index(command).negative?
62
+
63
+ true
64
+ end
65
+ end
66
+ end
67
+ end
68
+ end
69
+ end
@@ -0,0 +1,68 @@
1
+ # Copyright (c) 2022 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
2
+ # frozen_string_literal: true
3
+
4
+ require 'contrast/agent/protect/rule/base_service'
5
+ require 'contrast/agent/request_context'
6
+ require 'contrast/utils/object_share'
7
+ require 'contrast/agent/protect/rule/cmdi/cmdi_base_rule'
8
+
9
+ module Contrast
10
+ module Agent
11
+ module Protect
12
+ module Rule
13
+ # The Ruby implementation of the Protect Command Injection Semantic
14
+ # Dangerous Path sub-rule. This rule should report
15
+ class CmdiDangerousPath < Contrast::Agent::Protect::Rule::CmdiBaseRule
16
+ NAME = 'cmd-injection-semantic-dangerous-paths'
17
+
18
+ def initialize
19
+ super
20
+ @mode = :MONITOR
21
+ end
22
+
23
+ def rule_name
24
+ NAME
25
+ end
26
+
27
+ def sub_rules
28
+ Contrast::Utils::ObjectShare::EMPTY_ARRAY
29
+ end
30
+
31
+ protected
32
+
33
+ # Used to customize the raised error message.
34
+ #
35
+ # @param classname [String] Name of the class
36
+ # @param method [String] name of the method triggering the rule
37
+ # @raise [Contrast::SecurityException]
38
+ def raise_error classname, method
39
+ raise(Contrast::SecurityException.new(self,
40
+ 'Command Injection Dangerous Path rule triggered. '\
41
+ "Call to #{ classname }.#{ method } blocked."))
42
+ end
43
+
44
+ private
45
+
46
+ def find_probable_attacker context, potential_attack_string, _ia_results, **kwargs
47
+ dangerous_path = dangerous_path?(potential_attack_string)
48
+ return unless dangerous_path
49
+
50
+ build_attack_with_match(context, nil, nil, potential_attack_string, **kwargs)
51
+ end
52
+
53
+ # Checks if a given shell command is trying to access a dangerous path.
54
+ # This is used for the cmd-injection-semantic-dangerous-paths rule.
55
+ #
56
+ # @param path [String] path to check.
57
+ # @return index[Boolean] Returns true if a dangerous path is found.
58
+ # Returns false if no dangerous paths are found.
59
+ def dangerous_path? path
60
+ return false unless (agent_lib = Contrast::AGENT_LIB) && path
61
+
62
+ agent_lib.dangerous_path?(path)
63
+ end
64
+ end
65
+ end
66
+ end
67
+ end
68
+ end
@@ -1,13 +1,10 @@
1
1
  # Copyright (c) 2022 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
2
2
  # frozen_string_literal: true
3
3
 
4
- require 'contrast/utils/object_share'
5
- require 'contrast/agent/reporting/input_analysis/input_type'
6
4
  require 'contrast/agent/protect/rule/cmd_injection'
7
5
  require 'contrast/agent/reporting/input_analysis/score_level'
8
- require 'contrast/agent/protect/rule/cmdi/cmdi_worth_watching'
9
6
  require 'contrast/agent/protect/input_analyzer/input_analyzer'
10
- require 'contrast/utils/input_classification'
7
+ require 'contrast/utils/input_classification_base'
11
8
  require 'contrast/components/logger'
12
9
 
13
10
  module Contrast
@@ -18,63 +15,10 @@ module Contrast
18
15
  # as a result input would be marked as WORTHWATCHING or IGNORE,
19
16
  # to be analyzed at the sink level.
20
17
  module CmdiInputClassification
18
+ WORTHWATCHING_MATCH = 'cmdi-worth-watching-v2'.cs__freeze
21
19
  class << self
22
20
  include InputClassificationBase
23
- include Contrast::Agent::Protect::Rule::CmdiWorthWatching
24
21
  include Contrast::Components::Logger::InstanceMethods
25
-
26
- WORTHWATCHING_MATCH = 'cmdi-worth-watching-v2'
27
- CMDI_KEYS_NEEDED = [
28
- COOKIE_VALUE, PARAMETER_VALUE, JSON_VALUE, MULTIPART_VALUE, XML_VALUE, DWR_VALUE
29
- ].cs__freeze
30
-
31
- # This method will determine actually if the user input is WORTHWATCHING
32
- #
33
- # @param input_type [Contrast::Agent::Reporting::InputType] the type of the user input
34
- # @param value [String, Array<String>] the value of the input
35
- # @param input_analysis [Contrast::Agent::Reporting::InputAnalysis] Holds all the results from the input
36
- # analysis from the current request.
37
- def classify input_type, value, input_analysis
38
- return unless Contrast::Agent::Protect::Rule::CmdInjection::APPLICABLE_USER_INPUTS.include?(input_type)
39
- return unless super
40
-
41
- rule_id = Contrast::Agent::Protect::Rule::CmdInjection::NAME
42
-
43
- Array(value).each do |val|
44
- Array(val).each do |v|
45
- input_analysis.results << cmdi_create_new_input_result(input_analysis.request, rule_id, input_type, v)
46
- end
47
- end
48
-
49
- input_analysis
50
- rescue StandardError => e
51
- logger.debug('An Error was recorded in the input classification of the cmdi.')
52
- logger.debug(e)
53
- end
54
-
55
- private
56
-
57
- # This methods checks if input is tagged WORTHWATCHING or IGNORE matches value with it's
58
- # key if needed and Creates new instance of InputAnalysisResult.
59
- #
60
- # @param request [Contrast::Agent::Request] the current request context.
61
- # @param rule_id [String] The name of the Protect Rule.
62
- # @param input_type [Contrast::Agent::Reporting::InputType] The type of the user input.
63
- # @param value [String, Array<String>] the value of the input.
64
- #
65
- # @return res [Contrast::Agent::Reporting::InputAnalysisResult]
66
- def cmdi_create_new_input_result request, rule_id, input_type, value
67
- ia_result = new_ia_result(rule_id, input_type, request.path, value)
68
- if cmdi_worth_watching?(value)
69
- ia_result.score_level = WORTHWATCHING
70
- ia_result.ids << WORTHWATCHING_MATCH
71
- else
72
- ia_result.score_level = IGNORE
73
- end
74
-
75
- add_needed_key(request, ia_result, input_type, value) if CMDI_KEYS_NEEDED.include?(input_type)
76
- ia_result
77
- end
78
22
  end
79
23
  end
80
24
  end