You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Exploit prevention for Shell Injection / Command Injection (#7615)
Added support for Command Injection (CMDI) exploit prevention:
Reused existing instrumentation of java.lang.ProcessImpl.
Added support for Shell Injection (SHI) exploit prevention:
Instrumented java.lang.Runtime#exec(String, String[], File) for detection.
Leveraged SHI heuristics as a workaround for cases where the command is a single String, given that WAF heuristics for CMDI only support String[].
Enhanced RASP metrics mechanism:
Introduced a new rule_variant tag to metrics.
For CMDI: exec.
For SHI: shell.
Both variants are categorized under the ruletype as command_injection.
Copy file name to clipboardExpand all lines: dd-java-agent/agent-tooling/src/main/resources/datadog/trace/agent/tooling/bytebuddy/matcher/ignored_class_name.trie
Copy file name to clipboardExpand all lines: dd-java-agent/appsec/src/test/groovy/com/datadog/appsec/config/AppSecConfigServiceImplSpecification.groovy
Copy file name to clipboardExpand all lines: dd-java-agent/instrumentation/java-lang/src/main/java/datadog/trace/instrumentation/java/lang/ProcessImplStartAdvice.java
+1
Original file line number
Diff line number
Diff line change
@@ -23,6 +23,7 @@ public static AgentSpan startSpan(@Advice.Argument(0) final String[] command) th
0 commit comments