Skip to content
This repository has been archived by the owner on Nov 2, 2023. It is now read-only.

RASP: add shellshock protection #142

Merged
merged 1 commit into from Jul 31, 2020
Merged

RASP: add shellshock protection #142

merged 1 commit into from Jul 31, 2020

Conversation

Julio-Guerra
Copy link
Collaborator

The shellshock protection is attached to os.StartProcess() and checks the environment variables against a list of regular expressions. When matching, the call is aborted and the request blocked.

The shellshock callback is targets `os.StartProcess()` and checks the
environment variables against a list of regular expression provided by the
backend rule. When matching, the call is aborted and the request is blocked.
@Julio-Guerra Julio-Guerra added the enhancement New feature or request label Jul 30, 2020
@Julio-Guerra Julio-Guerra added this to the v0.14.0 milestone Jul 30, 2020
@Julio-Guerra Julio-Guerra self-assigned this Jul 30, 2020
@Julio-Guerra Julio-Guerra merged commit 065ccf4 into dev Jul 31, 2020
@Julio-Guerra Julio-Guerra deleted the feature/shellshock branch July 31, 2020 08:00
@Julio-Guerra Julio-Guerra mentioned this pull request Sep 2, 2020
Julio-Guerra added a commit that referenced this pull request Sep 2, 2020
New Feature

- (#142) RASP: add Shellshock protection support. This protection is currently
  attached to `os.StartProcess()` which is the common function of the Go
  standard library to execute a process. This protection can be configured at
  <https://my.sqreen.com/application/goto/modules/rasp/details/shellshock>.

Fixes

- (#145) In-App WAF: always recover from panics as this in the way the `reflect`
  package handles usage errors.

- (#144) Backend client: avoid dropping HTTP traces in case of `Host` header
  parsing errors.
Julio-Guerra added a commit that referenced this pull request Sep 2, 2020
New Feature:

- (#142) RASP: add Shellshock protection support. This protection is currently
  attached to `os.StartProcess()` which is the common function of the Go
  standard library to execute a process. This protection can be configured at
  <https://my.sqreen.com/application/goto/modules/rasp/details/shellshock>.

Fixes:

- (#145) In-App WAF: always recover from panics as this in the way the `reflect`
  package handles usage errors.

- (#144) Backend client: avoid dropping HTTP traces in case of `Host` header
  parsing errors.
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
enhancement New feature or request
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

1 participant