Injection Protection
Technical Overview
The Injection Protection plugin implements a multi-layered defense system to detect and block various injection attacks. It operates in the pre-request stage and analyzes all parts of incoming HTTP requests.
Core Components
The detection system is composed of several core components designed to ensure high performance and accuracy in identifying malicious requests.
1. Pattern Detection Engine
This component is responsible for identifying malicious patterns using optimized matching techniques.
- Pre-compiled regular expressions for faster performance.
- Case-insensitive pattern matching to detect variations.
- Support for complex attack patterns that span multiple tokens or formats.
- Custom pattern registration to allow user-defined detection logic.
2. Request Analyzer
The Request Analyzer dissects incoming HTTP requests and prepares them for pattern inspection.
- Multi-part request analysis, including headers, query parameters, and body content.
- JSON and form-data parsing to normalize structured payloads.
- Recursive object traversal for deeply nested content.
- UTF-8 encoding support to handle all standard web formats.
3. Attack Detection System
This system evaluates parsed requests against all registered patterns and coordinates the response logic.
- Real-time pattern matching to immediately detect threats.
- Concurrent request processing for scalability under load.
- Early termination on detection to prevent further processing of malicious requests.
- Detailed attack logging for observability and forensic analysis.
SQL Injection Detection
Category | Techniques / Indicators |
---|---|
Union-based Attacks | UNION SELECT statementsStacked queries Comment-based injections |
Error-based Attacks | Type conversion attacks XPATH errors Syntax errors |
Time-based Attacks | SLEEP() functionsBENCHMARK() callsHeavy queries |
Command Injection Detection
Command injection occurs when untrusted input is used to build and execute system-level commands. This plugin detects several patterns commonly associated with command injection attempts.
-
Shell Commands
The plugin can identify execution of typical shell commands that indicate a potential attack:
- System command execution
- Process spawning
- Command chaining
-
Shell Shock Patterns
The following patterns associated with Shellshock vulnerabilities are detected:
- Environment variables
- Function definitions
- Command substitution
-
Command Separators
Special characters used to chain or separate commands are monitored, including:
- Semicolons (
;
) - Pipes (
|
) - Backticks (
`
)
- Semicolons (
Path Traversal Detection
Path Traversal vulnerabilities allow attackers to access files and directories outside the intended scope. This plugin detects such attempts using multiple strategies.
-
Directory Navigation
Technique Description Parent directory references Usage of ../
or..\\
to move up in the file system hierarchyAbsolute paths Direct access to system paths like /etc/passwd
orC:\\Windows\\System32
Symbolic links Use of symlinks to bypass file access restrictions -
Encoding Variations
Technique Description URL encoding Obfuscation using %2e%2e%2f
(../
) or similarDouble encoding Nested encoding such as %252e%252e%252f
Unicode variants Alternate character representations like ■■/
SSRF Detection
Server-Side Request Forgery (SSRF) occurs when an attacker tricks the server into making requests to unintended locations. The plugin detects SSRF attempts through URL patterns and internal access indicators.
-
URL Schemes
Technique Description File protocol Attempts to access local files using file://
HTTP/HTTPS Redirection or access to potentially unsafe endpoints Data URIs Embedding data payloads using data:
scheme -
Internal Access
Technique Description Localhost references Targets like 127.0.0.1
,::1
, orlocalhost
Private IP ranges Access to internal network IPs (e.g., 192.168.x.x
,10.x.x.x
)DNS rebinding Manipulating DNS resolution to redirect to internal services
Processing Pipeline
The processing pipeline defines the sequence of operations performed on each incoming request, from parsing to final response generation.
-
Request Parsing
Step Description Header extraction Collect and normalize request headers Query parameter parsing Extract and decode query string values Body deserialization Parse request body (e.g., JSON, form-data) Content type handling Determine how to interpret the body based on Content-Type
-
Pattern Matching
Step Description Regular expression evaluation Match request content against known attack patterns Custom pattern checking Apply user-defined rules and patterns Threshold validation Evaluate if pattern matches exceed configured limits Attack categorization Classify the type of detected threat -
Decision Making
Step Description Threat scoring Assign severity score based on matches and context Action determination Decide whether to block, log, or allow the request Response generation Prepare appropriate HTTP response Error handling Capture and respond to internal processing issues -
Response Generation
Step Description Status code selection Return appropriate HTTP status (e.g., 403, 422) Error message formatting Include meaningful messages for blocked requests Header modification Add or modify headers (e.g., for CORS, security) Logging and metrics Record processing outcomes for observability
Configuration Details
The plugin allows for flexible configuration of pattern types to adapt to various security needs.
Pattern Types
Type | Description |
---|---|
Predefined Patterns | - Built-in security rules - Common attack signatures - Updated regularly - Performance optimized |
Custom Patterns | - User-defined rules - Regular expressions - Pattern descriptions - Priority settings |
Content Analysis
Part | Checks |
---|---|
Header Analysis | Key-value pair checking Size validation Encoding verification Protocol compliance |
Query Analysis | Parameter inspection Value validation Encoding checks Length limits |
Body Analysis | Content parsing Deep object inspection Array handling Size validation |
Performance Optimization
Pattern Matching
- Pre-compiled patterns
- Early termination
- Memory efficient
- CPU optimized
Request Processing
- Concurrent handling
- Buffered reading
- Streaming support
- Resource limits
Memory Management
- Zero-copy where possible
- Buffer pooling
- Garbage collection friendly
- Memory limits
Features
Feature |
---|
Multiple attack type detection (SQL, NoSQL, Command, Path Traversal, etc.) |
Configurable blocking actions |
Pattern-based detection with regular expressions |
Support for custom patterns |
Request content analysis (headers, path, query, body) |
Attack Types
The plugin detects the following types of attacks:
Attack Type | Description | Example Pattern | |
---|---|---|---|
SQL | SQL injection attempts | UNION SELECT , DROP TABLE | |
NoSQL | MongoDB injection patterns | $where , $regex | |
Command | Shell command injection | system() , exec() | |
Path Traversal | Directory traversal attempts | ../ , ..\\ | |
LDAP | LDAP injection patterns | (cn=*) , `( | (cn=*))` |
XML | XML injection and XXE | <!ENTITY , SYSTEM | |
SSRF | Server-side request forgery | file:// , dict:// | |
File Inclusion | Local/Remote file inclusion | include() , require() | |
Template | Template injection attempts | {{.}} , ${...} | |
XPath | XPath injection patterns | // , contains() | |
Header | HTTP header injection | \r\n , \n\n |
Configuration
Configuration Parameters
Parameter | Type | Description | Required |
---|---|---|---|
content_to_check | array | Request parts to analyze | Yes |
action | string | Action to take when attack detected | Yes |
status_code | number | HTTP status code for blocked requests | No |
error_message | string | Custom error message | No |
predefined_injections | array | List of enabled attack types | Yes |
custom_patterns | array | Custom regex patterns | No |
Usage Example
Best Practices
- Enable Multiple Attack Types
- Enable relevant attack types for your application
- Consider your application’s attack surface
- Balance security vs false positives
- Content Selection
- Check all relevant request parts
- Consider performance impact
- Monitor for false positives
- Custom Patterns
- Keep patterns specific and targeted
- Test thoroughly before deployment
- Document pattern purposes
- Error Messages
- Use informative but safe messages
- Avoid revealing system details
- Log detailed information internally
Performance Considerations
- Uses pre-compiled regex patterns
- Efficient request parsing
- Minimal memory footprint
- Linear scaling with request size
- Concurrent processing support