Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Taint gson sources (deserialization) v1.1 #6082

Conversation

jandro996
Copy link
Member

@jandro996 jandro996 commented Oct 23, 2023

What Does This Do

Add instrumentation to com.google.gson.JsonParser

Motivation

Add gson source propagation for v1.1

Additional Notes

related with #6056

This PR is not completed, for ReInit method instrumentation we need to check if the input is tainted and if check if the JsonParser instance is tainted and remove it from the tainted objects.
Right now there is no mechanism to allow the removal of tainted objects (This will impact performance)

Jira ticket: APPSEC-11794

jandro996 and others added 21 commits October 11, 2023 13:59
Redacts values based on a list of predefined words
name are normalized in lower case and by removing special characters:
`@`, `$`, `-` and `_`
Redaction happening at:
 - expression language for reference, index and getmember operations
 - serialization for snapshot or template values including maps
 - capture of the values from instrumentation
For conditions (log or span decoration probes) evaluation of a
redacted values triggers an evaluation exception that will be reported
as evaluation error into a snapshot.
@jandro996 jandro996 closed this Oct 23, 2023
@jandro996
Copy link
Member Author

This PR will be resumed one we are able to remove elements from tainted objects

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants