GuardianUnivalle-Benito-Yucra 0.1.3__tar.gz → 0.1.5__tar.gz
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of GuardianUnivalle-Benito-Yucra might be problematic. Click here for more details.
- guardianunivalle_benito_yucra-0.1.5/GuardianUnivalle_Benito_Yucra/detectores/detector_sql.py +79 -0
- {guardianunivalle_benito_yucra-0.1.3 → guardianunivalle_benito_yucra-0.1.5}/GuardianUnivalle_Benito_Yucra.egg-info/PKG-INFO +1 -1
- {guardianunivalle_benito_yucra-0.1.3 → guardianunivalle_benito_yucra-0.1.5}/PKG-INFO +1 -1
- {guardianunivalle_benito_yucra-0.1.3 → guardianunivalle_benito_yucra-0.1.5}/pyproject.toml +1 -1
- guardianunivalle_benito_yucra-0.1.3/GuardianUnivalle_Benito_Yucra/detectores/detector_sql.py +0 -89
- {guardianunivalle_benito_yucra-0.1.3 → guardianunivalle_benito_yucra-0.1.5}/GuardianUnivalle_Benito_Yucra/__init__.py +0 -0
- {guardianunivalle_benito_yucra-0.1.3 → guardianunivalle_benito_yucra-0.1.5}/GuardianUnivalle_Benito_Yucra/auditoria/registro_auditoria.py +0 -0
- {guardianunivalle_benito_yucra-0.1.3 → guardianunivalle_benito_yucra-0.1.5}/GuardianUnivalle_Benito_Yucra/criptografia/cifrado_aead.py +0 -0
- {guardianunivalle_benito_yucra-0.1.3 → guardianunivalle_benito_yucra-0.1.5}/GuardianUnivalle_Benito_Yucra/criptografia/intercambio_claves.py +0 -0
- {guardianunivalle_benito_yucra-0.1.3 → guardianunivalle_benito_yucra-0.1.5}/GuardianUnivalle_Benito_Yucra/criptografia/kdf.py +0 -0
- {guardianunivalle_benito_yucra-0.1.3 → guardianunivalle_benito_yucra-0.1.5}/GuardianUnivalle_Benito_Yucra/detectores/detector_csrf.py +0 -0
- {guardianunivalle_benito_yucra-0.1.3 → guardianunivalle_benito_yucra-0.1.5}/GuardianUnivalle_Benito_Yucra/detectores/detector_dos.py +0 -0
- {guardianunivalle_benito_yucra-0.1.3 → guardianunivalle_benito_yucra-0.1.5}/GuardianUnivalle_Benito_Yucra/detectores/detector_keylogger.py +0 -0
- {guardianunivalle_benito_yucra-0.1.3 → guardianunivalle_benito_yucra-0.1.5}/GuardianUnivalle_Benito_Yucra/detectores/detector_xss.py +0 -0
- {guardianunivalle_benito_yucra-0.1.3 → guardianunivalle_benito_yucra-0.1.5}/GuardianUnivalle_Benito_Yucra/middleware_web/middleware_web.py +0 -0
- {guardianunivalle_benito_yucra-0.1.3 → guardianunivalle_benito_yucra-0.1.5}/GuardianUnivalle_Benito_Yucra/mitigacion/limitador_peticion.py +0 -0
- {guardianunivalle_benito_yucra-0.1.3 → guardianunivalle_benito_yucra-0.1.5}/GuardianUnivalle_Benito_Yucra/mitigacion/lista_bloqueo.py +0 -0
- {guardianunivalle_benito_yucra-0.1.3 → guardianunivalle_benito_yucra-0.1.5}/GuardianUnivalle_Benito_Yucra/puntuacion/puntuacion_amenaza.py +0 -0
- {guardianunivalle_benito_yucra-0.1.3 → guardianunivalle_benito_yucra-0.1.5}/GuardianUnivalle_Benito_Yucra/utilidades.py +0 -0
- {guardianunivalle_benito_yucra-0.1.3 → guardianunivalle_benito_yucra-0.1.5}/GuardianUnivalle_Benito_Yucra.egg-info/SOURCES.txt +0 -0
- {guardianunivalle_benito_yucra-0.1.3 → guardianunivalle_benito_yucra-0.1.5}/GuardianUnivalle_Benito_Yucra.egg-info/dependency_links.txt +0 -0
- {guardianunivalle_benito_yucra-0.1.3 → guardianunivalle_benito_yucra-0.1.5}/GuardianUnivalle_Benito_Yucra.egg-info/requires.txt +0 -0
- {guardianunivalle_benito_yucra-0.1.3 → guardianunivalle_benito_yucra-0.1.5}/GuardianUnivalle_Benito_Yucra.egg-info/top_level.txt +0 -0
- {guardianunivalle_benito_yucra-0.1.3 → guardianunivalle_benito_yucra-0.1.5}/LICENSE +0 -0
- {guardianunivalle_benito_yucra-0.1.3 → guardianunivalle_benito_yucra-0.1.5}/README.md +0 -0
- {guardianunivalle_benito_yucra-0.1.3 → guardianunivalle_benito_yucra-0.1.5}/setup.cfg +0 -0
|
@@ -0,0 +1,79 @@
|
|
|
1
|
+
# middleware_sql_defense.py
|
|
2
|
+
import re
|
|
3
|
+
import json
|
|
4
|
+
from typing import Tuple
|
|
5
|
+
from django.http import JsonResponse
|
|
6
|
+
from django.utils.deprecation import MiddlewareMixin
|
|
7
|
+
|
|
8
|
+
# ---------- Patrones de ataques SQL ----------
|
|
9
|
+
PATTERNS = [
|
|
10
|
+
(
|
|
11
|
+
re.compile(r"\bunion\b\s+(all\s+)?\bselect\b", re.I),
|
|
12
|
+
"Intento de UNION SELECT detectado",
|
|
13
|
+
),
|
|
14
|
+
(re.compile(r"or\s+\d+\s*=\s*\d+", re.I), "Intento de OR 1=1 detectado"),
|
|
15
|
+
(
|
|
16
|
+
re.compile(r"\b(select\b.*\bfrom\b.*\bwhere\b.*\b(or|and)\b.*=)", re.I),
|
|
17
|
+
"Intento de SELECT con OR/AND detectado",
|
|
18
|
+
),
|
|
19
|
+
(
|
|
20
|
+
re.compile(r"\b(drop|truncate|delete|insert|update)\b", re.I),
|
|
21
|
+
"Intento de manipulación de tabla detectado",
|
|
22
|
+
),
|
|
23
|
+
(
|
|
24
|
+
re.compile(r"(--|#|;)", re.I),
|
|
25
|
+
"Comentario o terminador de sentencia sospechoso detectado",
|
|
26
|
+
),
|
|
27
|
+
]
|
|
28
|
+
|
|
29
|
+
|
|
30
|
+
# ---------- Helpers ----------
|
|
31
|
+
def extract_payload_text(request) -> str:
|
|
32
|
+
"""Extrae texto potencialmente peligroso del request"""
|
|
33
|
+
parts = []
|
|
34
|
+
# Query params
|
|
35
|
+
if request.META.get("QUERY_STRING"):
|
|
36
|
+
parts.append(request.META.get("QUERY_STRING"))
|
|
37
|
+
# Body
|
|
38
|
+
try:
|
|
39
|
+
content_type = request.META.get("CONTENT_TYPE", "")
|
|
40
|
+
if "application/json" in content_type:
|
|
41
|
+
body_json = json.loads(request.body.decode("utf-8") or "{}")
|
|
42
|
+
parts.append(json.dumps(body_json))
|
|
43
|
+
else:
|
|
44
|
+
parts.append(request.body.decode("utf-8", errors="ignore"))
|
|
45
|
+
except Exception:
|
|
46
|
+
pass
|
|
47
|
+
# Headers
|
|
48
|
+
parts.append(request.META.get("HTTP_USER_AGENT", ""))
|
|
49
|
+
parts.append(request.META.get("HTTP_REFERER", ""))
|
|
50
|
+
return " ".join([p for p in parts if p])
|
|
51
|
+
|
|
52
|
+
|
|
53
|
+
def detect_sqli_text(text: str) -> Tuple[bool, list]:
|
|
54
|
+
"""Detecta ataques SQL en el texto"""
|
|
55
|
+
matches = []
|
|
56
|
+
for patt, message in PATTERNS:
|
|
57
|
+
if patt.search(text):
|
|
58
|
+
matches.append(message)
|
|
59
|
+
return (len(matches) > 0, matches)
|
|
60
|
+
|
|
61
|
+
|
|
62
|
+
# ---------- Middleware ----------
|
|
63
|
+
class SQLIDefenseMiddleware(MiddlewareMixin):
|
|
64
|
+
def process_request(self, request):
|
|
65
|
+
text = extract_payload_text(request)
|
|
66
|
+
if not text:
|
|
67
|
+
return None
|
|
68
|
+
|
|
69
|
+
flagged, matches = detect_sqli_text(text)
|
|
70
|
+
if flagged:
|
|
71
|
+
# Mensaje estandarizado
|
|
72
|
+
return JsonResponse(
|
|
73
|
+
{
|
|
74
|
+
"detail": "Request bloqueado: posible intento de inyección SQL detectado",
|
|
75
|
+
"alerts": matches,
|
|
76
|
+
},
|
|
77
|
+
status=403,
|
|
78
|
+
)
|
|
79
|
+
return None
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
Metadata-Version: 2.4
|
|
2
2
|
Name: GuardianUnivalle-Benito-Yucra
|
|
3
|
-
Version: 0.1.
|
|
3
|
+
Version: 0.1.5
|
|
4
4
|
Summary: Middleware y detectores de seguridad (SQLi, XSS, CSRF, DoS, Keylogger) para Django/Flask
|
|
5
5
|
Author-email: Andres Benito Calle Yucra <benitoandrescalle035@gmail.com>
|
|
6
6
|
License: MIT
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
Metadata-Version: 2.4
|
|
2
2
|
Name: GuardianUnivalle-Benito-Yucra
|
|
3
|
-
Version: 0.1.
|
|
3
|
+
Version: 0.1.5
|
|
4
4
|
Summary: Middleware y detectores de seguridad (SQLi, XSS, CSRF, DoS, Keylogger) para Django/Flask
|
|
5
5
|
Author-email: Andres Benito Calle Yucra <benitoandrescalle035@gmail.com>
|
|
6
6
|
License: MIT
|
|
@@ -4,7 +4,7 @@ build-backend = "setuptools.build_meta"
|
|
|
4
4
|
|
|
5
5
|
[project]
|
|
6
6
|
name = "GuardianUnivalle-Benito-Yucra" # usar mayúsculas consistente
|
|
7
|
-
version = "0.1.
|
|
7
|
+
version = "0.1.5"
|
|
8
8
|
description = "Middleware y detectores de seguridad (SQLi, XSS, CSRF, DoS, Keylogger) para Django/Flask"
|
|
9
9
|
authors = [
|
|
10
10
|
{ name = "Andres Benito Calle Yucra", email = "benitoandrescalle035@gmail.com" }
|
guardianunivalle_benito_yucra-0.1.3/GuardianUnivalle_Benito_Yucra/detectores/detector_sql.py
DELETED
|
@@ -1,89 +0,0 @@
|
|
|
1
|
-
# middleware_sql_defense.py
|
|
2
|
-
import re
|
|
3
|
-
import json
|
|
4
|
-
from typing import Tuple
|
|
5
|
-
from django.http import JsonResponse
|
|
6
|
-
from django.utils.deprecation import MiddlewareMixin
|
|
7
|
-
|
|
8
|
-
# ---------- Patrones y normalización ----------
|
|
9
|
-
_literal_single = re.compile(r"'([^'\\]|\\.)*'")
|
|
10
|
-
_literal_double = re.compile(r'"([^"\\]|\\.)*"')
|
|
11
|
-
_comment_sql = re.compile(r"(--[^\n]*|/\*.*?\*/)", re.S)
|
|
12
|
-
|
|
13
|
-
PATTERNS = [
|
|
14
|
-
(re.compile(r"\bunion\b\s+(all\s+)?\bselect\b", re.I), 0.95),
|
|
15
|
-
(re.compile(r"(?<!\w)or(?=\s+1=1)", re.I), 0.99),
|
|
16
|
-
(re.compile(r"\b(select\b.*\bfrom\b.*\bwhere\b.*\b(or|and)\b.*=)", re.I), 0.7),
|
|
17
|
-
(re.compile(r"\b(drop|truncate|delete|insert|update)\b", re.I), 0.8),
|
|
18
|
-
(re.compile(r"(--|#|;)", re.I), 0.4),
|
|
19
|
-
]
|
|
20
|
-
|
|
21
|
-
|
|
22
|
-
# ---------- Helpers ----------
|
|
23
|
-
def normalize_text(s: str) -> str:
|
|
24
|
-
"""Quita literales y comentarios para reducir falsos positivos"""
|
|
25
|
-
if not s:
|
|
26
|
-
return ""
|
|
27
|
-
s = _comment_sql.sub(" ", s)
|
|
28
|
-
s = _literal_single.sub("''", s)
|
|
29
|
-
s = _literal_double.sub('""', s)
|
|
30
|
-
s = re.sub(r"\s+", " ", s).strip()
|
|
31
|
-
return s
|
|
32
|
-
|
|
33
|
-
|
|
34
|
-
def extract_payload_text(request) -> str:
|
|
35
|
-
"""Extrae texto potencialmente peligroso del request"""
|
|
36
|
-
parts = []
|
|
37
|
-
try:
|
|
38
|
-
# query params
|
|
39
|
-
if request.META.get("QUERY_STRING"):
|
|
40
|
-
parts.append(request.META.get("QUERY_STRING"))
|
|
41
|
-
# body
|
|
42
|
-
content_type = request.META.get("CONTENT_TYPE", "")
|
|
43
|
-
if "application/json" in content_type:
|
|
44
|
-
try:
|
|
45
|
-
body_json = json.loads(request.body.decode("utf-8") or "{}")
|
|
46
|
-
parts.append(json.dumps(body_json))
|
|
47
|
-
except Exception:
|
|
48
|
-
parts.append((request.body or b"").decode("utf-8", errors="ignore"))
|
|
49
|
-
else:
|
|
50
|
-
try:
|
|
51
|
-
parts.append(request.body.decode("utf-8", errors="ignore"))
|
|
52
|
-
except Exception:
|
|
53
|
-
pass
|
|
54
|
-
# headers sospechosos
|
|
55
|
-
parts.append(request.META.get("HTTP_USER_AGENT", ""))
|
|
56
|
-
parts.append(request.META.get("HTTP_REFERER", ""))
|
|
57
|
-
except Exception:
|
|
58
|
-
pass
|
|
59
|
-
return " ".join([p for p in parts if p])
|
|
60
|
-
|
|
61
|
-
|
|
62
|
-
def detect_sqli_text(text: str) -> Tuple[bool, list]:
|
|
63
|
-
"""Detecta patrones en un texto normalizado"""
|
|
64
|
-
q = normalize_text(text)
|
|
65
|
-
matches = []
|
|
66
|
-
for patt, sev in PATTERNS:
|
|
67
|
-
if patt.search(q):
|
|
68
|
-
matches.append((patt.pattern, float(sev)))
|
|
69
|
-
return (len(matches) > 0, matches)
|
|
70
|
-
|
|
71
|
-
|
|
72
|
-
# ---------- Middleware ----------
|
|
73
|
-
class SQLIDefenseMiddleware(MiddlewareMixin):
|
|
74
|
-
def process_request(self, request):
|
|
75
|
-
text = extract_payload_text(request)
|
|
76
|
-
if not text:
|
|
77
|
-
return None
|
|
78
|
-
|
|
79
|
-
flagged, matches = detect_sqli_text(text)
|
|
80
|
-
if flagged:
|
|
81
|
-
# Bloqueo inmediato solo para pruebas
|
|
82
|
-
return JsonResponse(
|
|
83
|
-
{
|
|
84
|
-
"detail": "Request bloqueado: posible inyección SQL detectada",
|
|
85
|
-
"matches": matches,
|
|
86
|
-
},
|
|
87
|
-
status=403,
|
|
88
|
-
)
|
|
89
|
-
return None
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|