Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(iast): cookie vulnerability cardinality issues #12216

Draft
wants to merge 10 commits into
base: 3.x-staging
Choose a base branch
from

Conversation

avara1986
Copy link
Member

ookie vulnerabilities are hashed by cookie name. That means that for each cookie name and service, we create a unique vulnerability. In some customers, they use unique cookie names per request, generating a large number of unique vulnerabilities.

Solutions to this problem:

  • If there is a relevant location, use hashing based on location, not cookie name.
  • Otherwise, just filter out all cookie names for hashing, generating max 1 vuln of each type per service.
  • Filter cookies by DD_IAST_COOKIE_FILTER_PATTERN

RFC

Checklist

  • PR author has checked that all the criteria below are met
  • The PR description includes an overview of the change
  • The PR description articulates the motivation for the change
  • The change includes tests OR the PR description describes a testing strategy
  • The PR description notes risks associated with the change, if any
  • Newly-added code is easy to change
  • The change follows the library release note guidelines
  • The change includes or references documentation updates if necessary
  • Backport labels are set (if applicable)

Reviewer Checklist

  • Reviewer has checked that all the criteria below are met
  • Title is accurate
  • All changes are related to the pull request's stated goal
  • Avoids breaking API changes
  • Testing strategy adequately addresses listed risks
  • Newly-added code is easy to change
  • Release note makes sense to a user of the library
  • If necessary, author has acknowledged and discussed the performance implications of this PR as reported in the benchmarks PR comment
  • Backport labels are set in a manner that is consistent with the release branch maintenance policy

Copy link
Contributor

github-actions bot commented Feb 4, 2025

CODEOWNERS have been resolved as:

releasenotes/notes/iast-fix-cookies-cardinality-0acd4b176c91ac14.yaml   @DataDog/apm-python
ddtrace/appsec/_iast/_overhead_control_engine.py                        @DataDog/asm-python
ddtrace/appsec/_iast/taint_sinks/_base.py                               @DataDog/asm-python
ddtrace/appsec/_iast/taint_sinks/insecure_cookie.py                     @DataDog/asm-python
ddtrace/settings/asm.py                                                 @DataDog/asm-python
docker-compose.yml                                                      @DataDog/apm-core-python
docs/configuration.rst                                                  @DataDog/python-guild
docs/spelling_wordlist.txt                                              @DataDog/python-guild
tests/appsec/iast/taint_sinks/test_insecure_cookie.py                   @DataDog/asm-python
tests/telemetry/test_writer.py                                          @DataDog/apm-python

@avara1986 avara1986 added the ASM Application Security Monitoring label Feb 4, 2025
@datadog-dd-trace-py-rkomorn
Copy link

datadog-dd-trace-py-rkomorn bot commented Feb 4, 2025

Datadog Report

Branch report: avara1986/APPSEC-56679-cookies_deduplication
Commit report: 189ba3a
Test service: dd-trace-py

✅ 0 Failed, 130 Passed, 1184 Skipped, 3m 18.89s Total duration (25m 7.79s time saved)

@pr-commenter
Copy link

pr-commenter bot commented Feb 4, 2025

Benchmarks

Benchmark execution time: 2025-02-05 12:54:06

Comparing candidate commit 189ba3a in PR branch avara1986/APPSEC-56679-cookies_deduplication with baseline commit e5055b7 in branch 3.x-staging.

Found 0 performance improvements and 0 performance regressions! Performance is the same for 394 metrics, 2 unstable metrics.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
ASM Application Security Monitoring
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant