OpenRASP v0.30 version released, officially supports PHP 5.X server

  

OpenRASP v0.30 has been released, OpenRASP is a free, open source adaptive security product launched by Baidu Security. This update is as follows:

major changes

  • Java version

    • Debug switch configuration option, changed from debug_level to debug.level

new features

API changes

  • directory hook point, add stack parameter

  • ssrf hook point, add ip parameter

Algorithm Improvement

  • SQLi detection algorithm enhancements

    • Added detection for UNION NULL statement

    • Statement specification checking algorithm, intercept common blind injection functions, eg ord, chr

    • Add control switch separately for database manager detection algorithm

  • Java - Deserialization Detection

    • Block attack code that executes commands via ysoserial

  • PHP - Added detection for Chinese kitchen knives

    • Identify exceptions based on the stack, intercept file managers, command execution operations

    • Based on user input recognition, some samples can be directly intercepted, eg <?php eval($_POST[0]); ?>

  • PHP - Intercept exception callback operations, eg array_map("system", $whatever)

    • For details on which callbacks to intercept, please refer to the default configuration of openrasp.callable_blacklists

BUG fix

  • SQLi Algorithm #1 - When the user input is a pure number and appears multiple times in the SQL statement, a false positive will be generated, which has been resolved

Guess you like

Origin http://43.154.161.224:23101/article/api/json?id=324934914&siteId=291194637