GuardianUnivalle-Benito-Yucra 0.1.19__tar.gz → 0.1.21__tar.gz

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of GuardianUnivalle-Benito-Yucra might be problematic. Click here for more details.

Files changed (25) hide show
  1. {guardianunivalle_benito_yucra-0.1.19 → guardianunivalle_benito_yucra-0.1.21}/GuardianUnivalle_Benito_Yucra/detectores/detector_sql.py +17 -14
  2. {guardianunivalle_benito_yucra-0.1.19 → guardianunivalle_benito_yucra-0.1.21}/GuardianUnivalle_Benito_Yucra.egg-info/PKG-INFO +1 -1
  3. {guardianunivalle_benito_yucra-0.1.19 → guardianunivalle_benito_yucra-0.1.21}/PKG-INFO +1 -1
  4. {guardianunivalle_benito_yucra-0.1.19 → guardianunivalle_benito_yucra-0.1.21}/pyproject.toml +1 -1
  5. {guardianunivalle_benito_yucra-0.1.19 → guardianunivalle_benito_yucra-0.1.21}/GuardianUnivalle_Benito_Yucra/__init__.py +0 -0
  6. {guardianunivalle_benito_yucra-0.1.19 → guardianunivalle_benito_yucra-0.1.21}/GuardianUnivalle_Benito_Yucra/auditoria/registro_auditoria.py +0 -0
  7. {guardianunivalle_benito_yucra-0.1.19 → guardianunivalle_benito_yucra-0.1.21}/GuardianUnivalle_Benito_Yucra/criptografia/cifrado_aead.py +0 -0
  8. {guardianunivalle_benito_yucra-0.1.19 → guardianunivalle_benito_yucra-0.1.21}/GuardianUnivalle_Benito_Yucra/criptografia/intercambio_claves.py +0 -0
  9. {guardianunivalle_benito_yucra-0.1.19 → guardianunivalle_benito_yucra-0.1.21}/GuardianUnivalle_Benito_Yucra/criptografia/kdf.py +0 -0
  10. {guardianunivalle_benito_yucra-0.1.19 → guardianunivalle_benito_yucra-0.1.21}/GuardianUnivalle_Benito_Yucra/detectores/detector_csrf.py +0 -0
  11. {guardianunivalle_benito_yucra-0.1.19 → guardianunivalle_benito_yucra-0.1.21}/GuardianUnivalle_Benito_Yucra/detectores/detector_dos.py +0 -0
  12. {guardianunivalle_benito_yucra-0.1.19 → guardianunivalle_benito_yucra-0.1.21}/GuardianUnivalle_Benito_Yucra/detectores/detector_keylogger.py +0 -0
  13. {guardianunivalle_benito_yucra-0.1.19 → guardianunivalle_benito_yucra-0.1.21}/GuardianUnivalle_Benito_Yucra/detectores/detector_xss.py +0 -0
  14. {guardianunivalle_benito_yucra-0.1.19 → guardianunivalle_benito_yucra-0.1.21}/GuardianUnivalle_Benito_Yucra/middleware_web/middleware_web.py +0 -0
  15. {guardianunivalle_benito_yucra-0.1.19 → guardianunivalle_benito_yucra-0.1.21}/GuardianUnivalle_Benito_Yucra/mitigacion/limitador_peticion.py +0 -0
  16. {guardianunivalle_benito_yucra-0.1.19 → guardianunivalle_benito_yucra-0.1.21}/GuardianUnivalle_Benito_Yucra/mitigacion/lista_bloqueo.py +0 -0
  17. {guardianunivalle_benito_yucra-0.1.19 → guardianunivalle_benito_yucra-0.1.21}/GuardianUnivalle_Benito_Yucra/puntuacion/puntuacion_amenaza.py +0 -0
  18. {guardianunivalle_benito_yucra-0.1.19 → guardianunivalle_benito_yucra-0.1.21}/GuardianUnivalle_Benito_Yucra/utilidades.py +0 -0
  19. {guardianunivalle_benito_yucra-0.1.19 → guardianunivalle_benito_yucra-0.1.21}/GuardianUnivalle_Benito_Yucra.egg-info/SOURCES.txt +0 -0
  20. {guardianunivalle_benito_yucra-0.1.19 → guardianunivalle_benito_yucra-0.1.21}/GuardianUnivalle_Benito_Yucra.egg-info/dependency_links.txt +0 -0
  21. {guardianunivalle_benito_yucra-0.1.19 → guardianunivalle_benito_yucra-0.1.21}/GuardianUnivalle_Benito_Yucra.egg-info/requires.txt +0 -0
  22. {guardianunivalle_benito_yucra-0.1.19 → guardianunivalle_benito_yucra-0.1.21}/GuardianUnivalle_Benito_Yucra.egg-info/top_level.txt +0 -0
  23. {guardianunivalle_benito_yucra-0.1.19 → guardianunivalle_benito_yucra-0.1.21}/LICENSE +0 -0
  24. {guardianunivalle_benito_yucra-0.1.19 → guardianunivalle_benito_yucra-0.1.21}/README.md +0 -0
  25. {guardianunivalle_benito_yucra-0.1.19 → guardianunivalle_benito_yucra-0.1.21}/setup.cfg +0 -0
@@ -1,4 +1,3 @@
1
- from django.http import JsonResponse
2
1
  from django.utils.deprecation import MiddlewareMixin
3
2
  from django.conf import settings
4
3
  import logging, re, json
@@ -10,7 +9,7 @@ if not logger.handlers:
10
9
  handler.setFormatter(logging.Formatter("%(asctime)s - %(levelname)s - %(message)s"))
11
10
  logger.addHandler(handler)
12
11
 
13
- # Patrones de ataque SQL
12
+ # 🔹 Patrones de ataque SQL
14
13
  PATTERNS = [
15
14
  (re.compile(r"\bunion\b\s+(all\s+)?\bselect\b", re.I), "UNION SELECT"),
16
15
  (
@@ -44,12 +43,12 @@ def extract_payload_text(request):
44
43
  return " ".join([p for p in parts if p])
45
44
 
46
45
 
47
- def detect_sqli_text(text):
48
- matches = []
49
- for patt, message in PATTERNS:
46
+ def detect_sql_attack(text):
47
+ descripcion = []
48
+ for patt, msg in PATTERNS:
50
49
  if patt.search(text):
51
- matches.append(message)
52
- return (len(matches) > 0, matches)
50
+ descripcion.append(msg)
51
+ return (len(descripcion) > 0, descripcion)
53
52
 
54
53
 
55
54
  def get_client_ip(request):
@@ -63,26 +62,30 @@ class SQLIDefenseMiddleware(MiddlewareMixin):
63
62
  def process_request(self, request):
64
63
  client_ip = get_client_ip(request)
65
64
  trusted_ips = getattr(settings, "SQLI_DEFENSE_TRUSTED_IPS", [])
65
+ exempt_paths = getattr(settings, "SQLI_DEFENSE_EXEMPT_PATHS", [])
66
66
 
67
67
  if client_ip in trusted_ips:
68
68
  return None
69
+ # 2️⃣ Permitir rutas exentas
70
+ for path in exempt_paths:
71
+ if request.path.startswith(path):
72
+ return None
69
73
 
70
74
  text = extract_payload_text(request)
71
75
  if not text:
72
76
  return None
73
77
 
74
- flagged, matches = detect_sqli_text(text)
78
+ flagged, descripcion = detect_sql_attack(text)
75
79
  if flagged:
76
- # Guardamos los datos del ataque en el request
80
+ # Solo tipo SQL, descripción con los patrones detectados
77
81
  request.sql_attack_info = {
78
82
  "ip": client_ip,
79
- "tipos": matches,
83
+ "tipos": ["SQL"],
84
+ "descripcion": descripcion,
80
85
  "payload": text,
81
86
  }
82
-
83
87
  logger.warning(
84
- f"Ataque SQL detectado desde IP {client_ip}: {matches}, payload: {text}"
88
+ f"Ataque SQL detectado desde IP {client_ip}: {descripcion}, payload: {text}"
85
89
  )
86
-
87
- # 👉 Aquí ya NO devolvemos JsonResponse
90
+ # No devolvemos JsonResponse, solo marcamos el ataque
88
91
  return None
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.4
2
2
  Name: GuardianUnivalle-Benito-Yucra
3
- Version: 0.1.19
3
+ Version: 0.1.21
4
4
  Summary: Middleware y detectores de seguridad (SQLi, XSS, CSRF, DoS, Keylogger) para Django/Flask
5
5
  Author-email: Andres Benito Calle Yucra <benitoandrescalle035@gmail.com>
6
6
  License: MIT
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.4
2
2
  Name: GuardianUnivalle-Benito-Yucra
3
- Version: 0.1.19
3
+ Version: 0.1.21
4
4
  Summary: Middleware y detectores de seguridad (SQLi, XSS, CSRF, DoS, Keylogger) para Django/Flask
5
5
  Author-email: Andres Benito Calle Yucra <benitoandrescalle035@gmail.com>
6
6
  License: MIT
@@ -4,7 +4,7 @@ build-backend = "setuptools.build_meta"
4
4
 
5
5
  [project]
6
6
  name = "GuardianUnivalle-Benito-Yucra" # usar mayúsculas consistente
7
- version = "0.1.19"
7
+ version = "0.1.21"
8
8
  description = "Middleware y detectores de seguridad (SQLi, XSS, CSRF, DoS, Keylogger) para Django/Flask"
9
9
  authors = [
10
10
  { name = "Andres Benito Calle Yucra", email = "benitoandrescalle035@gmail.com" }