Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[AppSec] Fixed Play/Akka double instrumentation #3517

Merged
merged 1 commit into from
Apr 21, 2022

Conversation

ValentinZakharov
Copy link
Contributor

What Does This Do

When setting the same data in the context of the request, the same data will be ignored for further analysis using AppSec WAF.

Motivation

Issue reported by customer: #3484

Additional Notes

Different instrumentations (Play and Akka) populate same data to distinct spans, but all of them consolidates in same AppSecRequestContext, which cause forbidden data replacement. As a workaround we ignores replacement if the values are the same.

@ValentinZakharov ValentinZakharov requested a review from a team as a code owner April 21, 2022 12:39
@ValentinZakharov ValentinZakharov merged commit 3b24186 into master Apr 21, 2022
@ValentinZakharov ValentinZakharov deleted the vzakharov/double_instr branch April 21, 2022 14:44
@github-actions github-actions bot added this to the 0.100.0 milestone Apr 21, 2022
@ValentinZakharov ValentinZakharov added the comp: asm waf Application Security Management (WAF) label Apr 21, 2022
@ValentinZakharov ValentinZakharov changed the title [AppSec] Play/Akka double instrumentation [AppSec] Fixed Play/Akka double instrumentation Apr 21, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
comp: asm waf Application Security Management (WAF)
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants