-
Notifications
You must be signed in to change notification settings - Fork 474
feat(iast): unvalidated redirect vulnerability #13481
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
|
Bootstrap import analysisComparison of import times between this PR and base. SummaryThe average import time from this PR is: 236 ± 3 ms. The average import time from base is: 239 ± 8 ms. The import time difference between this PR and base is: -2.7 ± 0.3 ms. Import time breakdownThe following import paths have shrunk:
|
BenchmarksBenchmark execution time: 2025-05-27 11:48:38 Comparing candidate commit c417c69 in PR branch Found 2 performance improvements and 3 performance regressions! Performance is the same for 508 metrics, 7 unstable metrics. scenario:iast_aspects-ospathsplitdrive_aspect
scenario:iast_aspects-split_aspect
scenario:iast_aspects-splitlines_aspect
scenario:iastdjangostartup-appsec
scenario:iastdjangostartup-tracer
|
This PR adds IAST detection capabilities for unvalidated redirect vulnerabilities in major Python web frameworks:
Unvalidated redirects occur when an application redirects users to URLs that are controlled by user input without proper validation, which can lead to phishing attacks and other security issues.
Implementation Details
Documentation
Added docstrings explaining the vulnerability detection logic
Updated IAST documentation to include unvalidated redirect checks
Tasks
APPSEC-11498
APPSEC-11502
APPSEC-57164
Checklist
Reviewer Checklist