GuardianUnivalle-Benito-Yucra 0.1.4__py3-none-any.whl → 0.1.6__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of GuardianUnivalle-Benito-Yucra might be problematic. Click here for more details.

@@ -1,88 +1,112 @@
1
- # middleware_sql_defense.py
2
1
  import re
3
2
  import json
3
+ import time
4
4
  from typing import Tuple
5
5
  from django.http import JsonResponse
6
6
  from django.utils.deprecation import MiddlewareMixin
7
7
 
8
- # ---------- Patrones y normalización ----------
9
- _literal_single = re.compile(r"'([^'\\]|\\.)*'")
10
- _literal_double = re.compile(r'"([^"\\]|\\.)*"')
11
- _comment_sql = re.compile(r"(--[^\n]*|/\*.*?\*/)", re.S)
12
-
8
+ # ---------- Patrones de ataques SQL ----------
13
9
  PATTERNS = [
14
- (re.compile(r"\bunion\b\s+(all\s+)?\bselect\b", re.I), 0.95),
15
- (re.compile(r"(?<!\w)or(?=\s+1=1)", re.I), 0.99),
16
- (re.compile(r"\b(select\b.*\bfrom\b.*\bwhere\b.*\b(or|and)\b.*=)", re.I), 0.7),
17
- (re.compile(r"\b(drop|truncate|delete|insert|update)\b", re.I), 0.8),
18
- (re.compile(r"(--|#|;)", re.I), 0.4),
10
+ (
11
+ re.compile(r"\bunion\b\s+(all\s+)?\bselect\b", re.I),
12
+ "Intento de UNION SELECT detectado",
13
+ ),
14
+ (
15
+ re.compile(r"\bselect\b.*\bfrom\b.*\bwhere\b.*\b(or|and)\b.*=", re.I),
16
+ "Intento de SELECT con OR/AND detectado",
17
+ ),
18
+ (
19
+ re.compile(r"\b(or|and)\s+\d+\s*=\s*\d+", re.I),
20
+ "Intento de OR/AND 1=1 detectado",
21
+ ),
22
+ (
23
+ re.compile(r"\b(drop|truncate|delete|insert|update)\b", re.I),
24
+ "Intento de manipulación de tabla detectado",
25
+ ),
26
+ (
27
+ re.compile(r"(--|#|;)", re.I),
28
+ "Comentario o terminador de sentencia sospechoso detectado",
29
+ ),
30
+ (re.compile(r"exec\s*\(", re.I), "Intento de ejecución de procedimiento detectado"),
19
31
  ]
20
32
 
21
-
22
- # ---------- Helpers ----------
23
- def normalize_text(s: str) -> str:
24
- """Quita literales y comentarios para reducir falsos positivos"""
25
- if not s:
26
- return ""
27
- s = _comment_sql.sub(" ", s)
28
- s = _literal_single.sub("''", s)
29
- s = _literal_double.sub('""', s)
30
- s = re.sub(r"\s+", " ", s).strip()
31
- return s
33
+ # ---------- Bloqueo temporal por IP ----------
34
+ TEMP_BLOCK = {} # {ip: timestamp}
35
+ BLOCK_DURATION = 30 # segundos
32
36
 
33
37
 
38
+ # ---------- Helpers ----------
34
39
  def extract_payload_text(request) -> str:
35
- """Extrae texto potencialmente peligroso del request"""
40
+ """Extrae todo el contenido que podría contener inyecciones"""
36
41
  parts = []
42
+ # Query params
43
+ if request.META.get("QUERY_STRING"):
44
+ parts.append(request.META.get("QUERY_STRING"))
45
+ # Body
37
46
  try:
38
- # query params
39
- if request.META.get("QUERY_STRING"):
40
- parts.append(request.META.get("QUERY_STRING"))
41
- # body
42
47
  content_type = request.META.get("CONTENT_TYPE", "")
43
48
  if "application/json" in content_type:
44
- try:
45
- body_json = json.loads(request.body.decode("utf-8") or "{}")
46
- parts.append(json.dumps(body_json))
47
- except Exception:
48
- parts.append((request.body or b"").decode("utf-8", errors="ignore"))
49
+ body_json = json.loads(request.body.decode("utf-8") or "{}")
50
+ parts.append(json.dumps(body_json))
49
51
  else:
50
- try:
51
- parts.append(request.body.decode("utf-8", errors="ignore"))
52
- except Exception:
53
- pass
54
- # headers sospechosos
55
- parts.append(request.META.get("HTTP_USER_AGENT", ""))
56
- parts.append(request.META.get("HTTP_REFERER", ""))
52
+ parts.append(request.body.decode("utf-8", errors="ignore"))
57
53
  except Exception:
58
54
  pass
55
+ # Headers
56
+ parts.append(request.META.get("HTTP_USER_AGENT", ""))
57
+ parts.append(request.META.get("HTTP_REFERER", ""))
59
58
  return " ".join([p for p in parts if p])
60
59
 
61
60
 
62
61
  def detect_sqli_text(text: str) -> Tuple[bool, list]:
63
- """Detecta patrones en un texto normalizado"""
64
- q = normalize_text(text)
62
+ """Detecta ataques SQL en el texto"""
65
63
  matches = []
66
- for patt, sev in PATTERNS:
67
- if patt.search(q):
68
- matches.append((patt.pattern, float(sev)))
64
+ for patt, message in PATTERNS:
65
+ if patt.search(text):
66
+ matches.append(message)
69
67
  return (len(matches) > 0, matches)
70
68
 
71
69
 
70
+ def get_client_ip(request):
71
+ """Obtiene la IP del cliente"""
72
+ x_forwarded_for = request.META.get("HTTP_X_FORWARDED_FOR")
73
+ if x_forwarded_for:
74
+ ip = x_forwarded_for.split(",")[0]
75
+ else:
76
+ ip = request.META.get("REMOTE_ADDR")
77
+ return ip
78
+
79
+
72
80
  # ---------- Middleware ----------
73
- class SQLIDefenseMiddleware(MiddlewareMixin):
81
+ class SQLIDefenseStrongMiddleware(MiddlewareMixin):
74
82
  def process_request(self, request):
83
+ client_ip = get_client_ip(request)
84
+
85
+ # Revisa si la IP está temporalmente bloqueada
86
+ if client_ip in TEMP_BLOCK:
87
+ if time.time() - TEMP_BLOCK[client_ip] < BLOCK_DURATION:
88
+ return JsonResponse(
89
+ {
90
+ "detail": "Acceso temporalmente bloqueado por actividad sospechosa",
91
+ "alerts": ["IP bloqueada temporalmente"],
92
+ },
93
+ status=403,
94
+ )
95
+ else:
96
+ del TEMP_BLOCK[client_ip]
97
+
75
98
  text = extract_payload_text(request)
76
99
  if not text:
77
100
  return None
78
101
 
79
102
  flagged, matches = detect_sqli_text(text)
80
103
  if flagged:
81
- # Bloqueo inmediato solo para pruebas
104
+ # Bloquea temporalmente la IP
105
+ TEMP_BLOCK[client_ip] = time.time()
82
106
  return JsonResponse(
83
107
  {
84
- "detail": "Request bloqueado: posible inyección SQL detectada",
85
- "matches": matches,
108
+ "detail": "Request bloqueado: posible intento de inyección SQL detectado",
109
+ "alerts": matches,
86
110
  },
87
111
  status=403,
88
112
  )
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.4
2
2
  Name: GuardianUnivalle-Benito-Yucra
3
- Version: 0.1.4
3
+ Version: 0.1.6
4
4
  Summary: Middleware y detectores de seguridad (SQLi, XSS, CSRF, DoS, Keylogger) para Django/Flask
5
5
  Author-email: Andres Benito Calle Yucra <benitoandrescalle035@gmail.com>
6
6
  License: MIT
@@ -7,14 +7,14 @@ GuardianUnivalle_Benito_Yucra/criptografia/kdf.py,sha256=_sbepEY1qHEKga0ExrX2WRg
7
7
  GuardianUnivalle_Benito_Yucra/detectores/detector_csrf.py,sha256=EAYfLkHuxGC5rXSu4mZJ4yZDCbwBpTX8xZWGKz7i5wA,692
8
8
  GuardianUnivalle_Benito_Yucra/detectores/detector_dos.py,sha256=lMWmCw6nccCEnek53nVjpoBCeiBqLdrSXxqRuI7VP2I,696
9
9
  GuardianUnivalle_Benito_Yucra/detectores/detector_keylogger.py,sha256=rEDG-Q_R56OsG2ypfHVBK7erolYjdvATnAxB3yvPXts,729
10
- GuardianUnivalle_Benito_Yucra/detectores/detector_sql.py,sha256=5p4ZvBIDzU6Ak0PneM0jm75RKddncAI5NUhGipdsqlU,3049
10
+ GuardianUnivalle_Benito_Yucra/detectores/detector_sql.py,sha256=3_K2H5Sg_cqfQvXdLdgyiyKEipUk-L6qtQIluGA_MKs,3706
11
11
  GuardianUnivalle_Benito_Yucra/detectores/detector_xss.py,sha256=66V_xuxNOZEwluvWOT4-6pk5MJ3zWE1IwcVkBl7MZSg,719
12
12
  GuardianUnivalle_Benito_Yucra/middleware_web/middleware_web.py,sha256=23pLLYqliUoMrIC6ZEwz3hKXeDjWfHSm9vYPWGmDDik,495
13
13
  GuardianUnivalle_Benito_Yucra/mitigacion/limitador_peticion.py,sha256=ipMOebYhql-6mSyHs0ddYXOcXq9w8P_IXLlpiIqGncw,246
14
14
  GuardianUnivalle_Benito_Yucra/mitigacion/lista_bloqueo.py,sha256=6AYWII4mrmwCLHCvGTyoBxR4Oasr4raSHpFbVjqn7d8,193
15
15
  GuardianUnivalle_Benito_Yucra/puntuacion/puntuacion_amenaza.py,sha256=Wx5XfcII4oweLvZsTBEJ7kUc9pMpP5-36RfI5C5KJXo,561
16
- guardianunivalle_benito_yucra-0.1.4.dist-info/licenses/LICENSE,sha256=5e4IdL542v1E8Ft0A24GZjrxZeTsVK7XrS3mZEUhPtM,37
17
- guardianunivalle_benito_yucra-0.1.4.dist-info/METADATA,sha256=Ogc6eE6ffX5Ggrer7ZSgQfPdIV6kv_ofhhxxosxbYp4,1892
18
- guardianunivalle_benito_yucra-0.1.4.dist-info/WHEEL,sha256=_zCd3N1l69ArxyTb8rzEoP9TpbYXkqRFSNOD5OuxnTs,91
19
- guardianunivalle_benito_yucra-0.1.4.dist-info/top_level.txt,sha256=HTWfZM64WAV_QYr5cnXnLuabQt92dvlxqlR3pCwpbDQ,30
20
- guardianunivalle_benito_yucra-0.1.4.dist-info/RECORD,,
16
+ guardianunivalle_benito_yucra-0.1.6.dist-info/licenses/LICENSE,sha256=5e4IdL542v1E8Ft0A24GZjrxZeTsVK7XrS3mZEUhPtM,37
17
+ guardianunivalle_benito_yucra-0.1.6.dist-info/METADATA,sha256=5PIlLNaTr3QBkvwsKtICnplyOzwmTvyDMP9i6IbbF68,1892
18
+ guardianunivalle_benito_yucra-0.1.6.dist-info/WHEEL,sha256=_zCd3N1l69ArxyTb8rzEoP9TpbYXkqRFSNOD5OuxnTs,91
19
+ guardianunivalle_benito_yucra-0.1.6.dist-info/top_level.txt,sha256=HTWfZM64WAV_QYr5cnXnLuabQt92dvlxqlR3pCwpbDQ,30
20
+ guardianunivalle_benito_yucra-0.1.6.dist-info/RECORD,,