Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update disallowed_csp_hostnames.py, also trigger on higher level denied domains #3980

Open
wants to merge 2 commits into
base: main
Choose a base branch
from

Conversation

underdarknl
Copy link
Contributor

@underdarknl underdarknl commented Dec 18, 2024

If a subdomain of a denied domain is listed, we should warn. Eg, if www.badexample.com is used in the CSP, but badexample.com is listed we should trigger.

Changes

Loops over the parts of the listed hostname, and looks for the parent domains to check if they are listed.

Issue link

You have to create an issue to link to this PR. If this really is not possible, write a very detailed description here and add this PR to the project board directly.

Please add the link to the issue after "Closes".

Closes #3979

Demo

Please add some proof in the form of screenshots or screen recordings to show (off) new functionality, if there are interesting new features for end-users.

QA notes

Please add some information for QA on how to test the newly created code.


Code Checklist

  • All the commits in this PR are properly PGP-signed and verified.
  • This PR only contains functionality relevant to the issue.
  • I have written unit tests for the changes or fixes I made.
  • I have checked the documentation and made changes where necessary.
  • I have performed a self-review of my code and refactored it to the best of my abilities.
  • Tickets have been created for newly discovered issues.
  • For any non-trivial functionality, I have added integration and/or end-to-end tests.
  • I have informed others of any required .env changes files if required and changed the .env-dist accordingly.
  • I have included comments in the code to elaborate on what is not self-evident from the code itself, including references to issues and discussions online, or implicit behavior of an interface.

Checklist for code reviewers:

Copy-paste the checklist from the docs/source/templates folder into your comment.


Checklist for QA:

Copy-paste the checklist from the docs/source/templates folder into your comment.

…ed domains

If a subdomain of a denied domain is listed, we should warn.
Eg, if www.badexample.com is used in the CSP, but badexample.com is listed we should trigger.
@underdarknl underdarknl requested a review from a team as a code owner December 18, 2024 11:12
@originalsouth
Copy link
Contributor

This PR has been ported to feature/nibbles see 15304bc.

Copy link
Contributor

@Donnype Donnype left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Perhaps a generator and unit test to provide an example would make this a bit more clear (or the comment suggestion)

Comment on lines +34 to +41
hostnameparts = hostname.lower().split(".")
for i in range(len(hostnameparts)):
if ".".join(hostnameparts[i:]) in disallowed_domains:
ft = KATFindingType(id="KAT-DISALLOWED-DOMAIN-IN-CSP")
f = Finding(ooi=input_ooi.reference, finding_type=ft.reference)
yield ft
yield f
break
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
hostnameparts = hostname.lower().split(".")
for i in range(len(hostnameparts)):
if ".".join(hostnameparts[i:]) in disallowed_domains:
ft = KATFindingType(id="KAT-DISALLOWED-DOMAIN-IN-CSP")
f = Finding(ooi=input_ooi.reference, finding_type=ft.reference)
yield ft
yield f
break
hostnameparts = hostname.lower().split(".")
# For e.g. ["www", "example", "com"], check "www.example.com", "example.com" and "com"
for i in range(len(hostnameparts)):
if ".".join(hostnameparts[i:]) in disallowed_domains:
ft = KATFindingType(id="KAT-DISALLOWED-DOMAIN-IN-CSP")
f = Finding(ooi=input_ooi.reference, finding_type=ft.reference)
yield ft
yield f
break

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Disallowed CSP hostnames only checks for specific hosts
3 participants