resources/protect/policy.json in contrast-agent-3.8.5 vs resources/protect/policy.json in contrast-agent-3.9.0
- old
+ new
@@ -1,11 +1,11 @@
{
"rules":[
{
"name": "cmd-injection",
"applicator": "Contrast::CoreExtensions::Protect::AppliesCommandInjectionRule",
- "applicator_method": "cs__patched_apply_command_injection_rule",
+ "applicator_method": "apply_command_injection_rule",
"required_properties": [],
"optional_properties": [],
"triggers": [
{
"class_name":"IO",
@@ -113,11 +113,11 @@
]
},
{
"name": "nosql-injection",
"applicator": "Contrast::CoreExtensions::Protect::AppliesNoSqliRule",
- "applicator_method": "cs__patched_apply_nosql_rule",
+ "applicator_method": "apply_nosql_rule",
"required_properties": ["database"],
"optional_properties": [],
"triggers": [
{
"class_name": "Mongo::Server::Connection",
@@ -155,11 +155,11 @@
]
},
{
"name":"path-traversal",
"applicator": "Contrast::CoreExtensions::Protect::AppliesPathTraversalRule",
- "applicator_method": "cs__patched_apply_path_traversal_rule",
+ "applicator_method": "apply_path_traversal_rule",
"required_properties": ["action"],
"optional_properties": [],
"triggers":[
{
"class_name":"File",
@@ -253,11 +253,11 @@
]
},
{
"name": "sql-injection",
"applicator": "Contrast::CoreExtensions::Protect::AppliesSqliRule",
- "applicator_method": "cs__patched_apply_sql_rule",
+ "applicator_method": "apply_sql_rule",
"required_properties": ["index", "database"],
"optional_properties": [],
"triggers": [
{
"class_name": "Mysql2::Client",
@@ -335,34 +335,36 @@
]
},
{
"name": "untrusted-deserialization",
"applicator": "Contrast::CoreExtensions::Protect::AppliesDeserializationRule",
- "applicator_method": "cs__patched_apply_deserialization_rule",
+ "applicator_method": "apply_deserialization_rule",
"required_properties": [],
"optional_properties": [],
"triggers": [
{
"class_name": "Marshal",
"method_name": "load",
"instance_method": false,
"method_visibility": "public",
+ "scope": "deserialization",
"properties": {}
},
{
"class_name": "Psych",
"method_name": "load",
"instance_method": false,
"method_visibility": "public",
+ "scope": "deserialization",
"properties": {}
}
]
},
{
"name": "xxe",
"applicator": "Contrast::CoreExtensions::Protect::AppliesXxeRule",
- "applicator_method": "cs__patched_apply_xxe_rule",
+ "applicator_method": "apply_xxe_rule",
"required_properties": [],
"optional_properties": [],
"triggers": [
{
"class_name": "Nokogiri::XML::Document",
@@ -373,11 +375,11 @@
}, {
"class_name": "Nokogiri::XML::Document",
"method_name": "read_io",
"instance_method": false,
"method_visibility": "public",
- "applicator_method": "cs__patched_apply_xxe_rule__io",
+ "applicator_method": "apply_xxe_rule__io",
"properties": {}
},{
"class_name": "Nokogiri::XML::SAX::Parser",
"method_name": "parse_memory",
"instance_method": true,
@@ -386,11 +388,11 @@
}, {
"class_name": "Nokogiri::XML::SAX::Parser",
"method_name": "parse_io",
"instance_method": true,
"method_visibility": "public",
- "applicator_method": "cs__patched_apply_xxe_rule__io",
+ "applicator_method": "apply_xxe_rule__io",
"properties": {}
},{
"class_name": "Ox",
"method_name": "parse",
"instance_method": false,
@@ -405,10 +407,10 @@
}, {
"class_name": "Oga::XML::Lexer",
"method_name": "read_data",
"instance_method": true,
"method_visibility": "public",
- "applicator_method": "cs__patched_apply_xxe_rule__lexer",
+ "applicator_method": "apply_xxe_rule__lexer",
"properties": {}
}
]
}