lib/contrast/agent/protect/rule/cmd_injection.rb in contrast-agent-4.4.1 vs lib/contrast/agent/protect/rule/cmd_injection.rb in contrast-agent-4.5.0
- old
+ new
@@ -1,6 +1,6 @@
-# Copyright (c) 2020 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
+# Copyright (c) 2021 Contrast Security, Inc. See https://www.contrastsecurity.com/enduser-terms-0317a for more details.
# frozen_string_literal: true
require 'contrast/agent/protect/rule/base_service'
require 'contrast/utils/stack_trace_utils'
require 'contrast/utils/object_share'
@@ -45,10 +45,10 @@
self,
"Command Injection rule triggered. Call to #{ classname }.#{ method } blocked.")
end
def build_attack_with_match context, input_analysis_result, result, candidate_string, **kwargs
- return result if mode == :NO_ACTION || mode == :PERMIT
+ return result if mode == Contrast::Api::Settings::ProtectionRule::Mode::NO_ACTION || mode == Contrast::Api::Settings::ProtectionRule::Mode::PERMIT
result ||= build_attack_result(context)
update_successful_attack_response(context, input_analysis_result, result, candidate_string)
append_sample(context, input_analysis_result, result, candidate_string, **kwargs)
result