Skip to content
This repository was archived by the owner on Apr 24, 2019. It is now read-only.

Commit 4070ca1

Browse files
committed
Updated SQLi to account for new structure with deep-security-py update (v2.1.1)
1 parent 6fe1fb1 commit 4070ca1

File tree

1 file changed

+22
-12
lines changed

1 file changed

+22
-12
lines changed

lib/sqli.py

+22-12
Original file line numberDiff line numberDiff line change
@@ -268,8 +268,8 @@ def does_rule_match_sqli(self, rule):
268268
sqli_recommended = True
269269

270270
if 'application_type_id' in dir(rule):
271-
if self.dsm.rules['application_types'].has_key(rule.application_type_id):
272-
if self.dsm.rules['application_types'][rule.application_type_id].tbuid in self.tbuids:
271+
if self.dsm.rules['application_type'].has_key(rule.application_type_id):
272+
if self.dsm.rules['application_type'][rule.application_type_id].tbuid in self.tbuids:
273273
sqli_recommended = True
274274

275275
for pattern in self.patterns:
@@ -294,28 +294,38 @@ def analyze_computer(self, ds_computer_id):
294294
computer = self.dsm.computers[ds_computer_id]
295295
sqli_recommendations = []
296296

297+
is_aws_instance = False
298+
aws_instance_id = None
297299
if 'cloud_instance_id' in dir(computer) and computer.cloud_instance_id and computer.cloud_instance_id.startswith('i-'):
300+
is_aws_instance = True
301+
aws_instance_id = computer.cloud_instance_id
302+
elif 'cloud_object_instance_id' in dir(computer) and computer.cloud_object_instance_id and computer.cloud_object_instance_id.startswith('i-'):
303+
is_aws_instance = True
304+
aws_instance_id = computer.cloud_object_instance_id
305+
306+
if is_aws_instance:
298307
# this is an AWS instance
308+
self._log("Computer is an AWS instance")
299309

300310
# check at the policy level
301-
if computer.policy_id:
311+
if computer.security_profile_id:
302312
self._log("Computer is protected by Deep Security. Checking rules")
303313
for rule_type in [
304-
'application_type',
305-
'integrity_monitoring',
306-
'log_inspection',
307-
'intrusion_prevention',
314+
'application_type_ids',
315+
'integrity_monitoring_rule_ids',
316+
'log_inspection_rule_ids',
317+
'intrusion_prevention_rule_ids',
308318
]:
309-
if self.dsm.policies.has_key(computer.policy_id):
310-
rule_set = getattr(self.dsm.policies[computer.policy_id], rule_type)
319+
if self.dsm.policies.has_key(int(computer.security_profile_id)):
320+
rule_set = getattr(self.dsm.policies[int(computer.security_profile_id)], rule_type)
311321
if rule_set and rule_set.has_key('item'): # policy has these type of rules applied
312322
for rule_id in rule_set['item']:
313323
rule = self.dsm.rules[rule_type.replace('_rule_ids', '')][int(rule_id)]
314324
if self.does_rule_match_sqli(rule): sqli_recommendations.append(rule)
315325
else:
316-
self._log("Instance {} has no rules of type {} applied".format(computer.cloud_instance_id, rule_type))
326+
self._log("Instance {} has no rules of type {} applied".format(aws_instance_id, rule_type))
317327
else:
318-
self._log("Policy {} is not available for analysis".format(computer.policy_id))
328+
self._log("Policy {} is not available for analysis".format(int(computer.security_profile_id)))
319329
else:
320330
self._log("Deep Security is aware of the instance but is not protecting it with a policy")
321331
recommendation = None
@@ -327,7 +337,7 @@ def analyze_computer(self, ds_computer_id):
327337
for rule_id, rule in rules.items():
328338
if self.does_rule_match_sqli(rule): sqli_recommendations.append(rule)
329339
else:
330-
self._log("There are no rule recommendations for instance {}".format(computer.cloud_instance_id))
340+
self._log("There are no rule recommendations for instance {}".format(aws_instance_id))
331341

332342
if len(sqli_recommendations) > 1:
333343
recommendation = True if len(sqli_recommendations) > 0 else False

0 commit comments

Comments
 (0)