lib/contrast/agent/protect/rule/cmd_injection.rb in contrast-agent-4.4.1 vs lib/contrast/agent/protect/rule/cmd_injection.rb in contrast-agent-4.5.0

- old
+ new

@@ -1,6 +1,6 @@ -# Copyright (c) 2020 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details. +# Copyright (c) 2021 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details. # frozen_string_literal: true require 'contrast/agent/protect/rule/base_service' require 'contrast/utils/stack_trace_utils' require 'contrast/utils/object_share' @@ -45,10 +45,10 @@ self, "Command Injection rule triggered. Call to #{ classname }.#{ method } blocked.") end def build_attack_with_match context, input_analysis_result, result, candidate_string, **kwargs - return result if mode == :NO_ACTION || mode == :PERMIT + return result if mode == Contrast::Api::Settings::ProtectionRule::Mode::NO_ACTION || mode == Contrast::Api::Settings::ProtectionRule::Mode::PERMIT result ||= build_attack_result(context) update_successful_attack_response(context, input_analysis_result, result, candidate_string) append_sample(context, input_analysis_result, result, candidate_string, **kwargs) result