This documentation is not maintained. Please refer to doc.castsoftware.com/technologies to find the latest updates.

1.0.3-funcrel

Other Updates

Details
A minor update to ensure that this extension now generates a new "BlackboxPaths.config" file to modify "ServiceEntryPoints.blackbox.xml" when necessary at application level.

1.0.2-funcrel

Other Updates

Details
This extension now generates a new "ServiceEntryPoints.blackbox-v2.xml" file containing additional data to enrich and improve the results of the com.castsoftware.securityanalyzer extension (≥ 1.0.10-funcrel). See https://doc.castsoftware.com/display/TECHNOS/Direct+Web+Remoting+-+1.0#DirectWebRemoting1.0-SupportforUserInputSecurity.

1.0.1-funcrel

Note

In this release, a change has been made to trigger a different set of rules during a Security Analyzer analysis than was previously the case. The list of changes can be found in the "Rules" section below. This change will occur when using this release of the DWR extension (or newer), AIP Core >= 8.3.27 and when a Security Analyzer analysis is enabled. As such, your Security Analyzer results may be impacted.

Rules

Rule IdNew RuleDetails
8482FALSEFor AIP >= 8.3.27, the rule "Avoid cross-site scripting through API requests" is enabled for input received in REST API exposed, instead of "Avoid cross-site scripting" previously.
8484FALSEFor AIP >= 8.3.27, the rule "Avoid HTTP response splitting through API requests" is enabled for input received in REST API exposed, instead of "Avoid HTTP response splitting" previously.
8486FALSEFor AIP >= 8.3.27, the rule "Avoid resource injection through API requests" is enabled for input received in REST API exposed, instead of "Avoid resource injection" previously.
8488FALSEFor AIP >= 8.3.27, the rule "Avoid resource URL manipulation through API requests" is enabled for input received in REST API exposed, instead of "Avoid resource URL manipulation" previously.
8492FALSEFor AIP >= 8.3.27, the rule "Avoid LDAP injection through API requests" is enabled for input received in REST API exposed, instead of "Avoid LDAP injection" previously.
8494FALSEFor AIP >= 8.3.27, the rule "Avoid OS command injection through API requests" is enabled for input received in REST API exposed, instead of "Avoid OS command injection" previously.
8496FALSEFor AIP >= 8.3.27, the rule "Avoid process control through API requests" is enabled for input received in REST API exposed, instead of "Avoid process control" previously.
8498FALSEFor AIP >= 8.3.27, the rule "Avoid thread injection through API requests" is enabled for input received in REST API exposed, instead of "Avoid thread injection" previously.
8500FALSEFor AIP >= 8.3.27, the rule "Avoid code injection through API requests" is enabled for input received in REST API exposed, instead of "Avoid code injection" previously.
8502FALSEFor AIP >= 8.3.27, the rule "Avoid reflection injection through API requests" is enabled for input received in REST API exposed, instead of "Avoid reflection injection" previously.
8504FALSEFor AIP >= 8.3.27, the rule "Avoid XPath injection through API requests" is enabled for input received in REST API exposed, instead of "Avoid XPath injection" previously.
8506FALSEFor AIP >= 8.3.27, the rule "Avoid file path manipulation through API requests" is enabled for input received in REST API exposed, instead of "Avoid file path manipulation" previously.
8508FALSEFor AIP >= 8.3.27, the rule "Avoid log forging through API requests" is enabled for input received in REST API exposed, instead of "Avoid log forging" previously.
8510FALSEFor AIP >= 8.3.27, the rule "Avoid uncontrolled format string through API requests" is enabled for input received in REST API exposed, instead of "Avoid uncontrolled format" previously.
8512FALSEFor AIP >= 8.3.27, the rule "Avoid mixing trusted and untrusted data in HTTP requests through API requests" is enabled for input received in REST API exposed, instead of "Avoid mixing trusted and untrusted data in HTTP requests" previously.
8514FALSEFor AIP >= 8.3.27, the rule "Avoid NoSQL injection through API requests" is enabled for input received in REST API exposed, instead of "Avoid NoSQL injection" previously.
8516FALSEFor AIP >= 8.3.27, the rule "Avoid URL redirection to untrusted site through API requests" is enabled for input received in REST API exposed, instead of "Avoid URL redirection to untrusted site" previously.
8522FALSEFor AIP >= 8.3.27, the rule "Avoid regular expression injection through API requests" is enabled for input received in REST API exposed, instead of "Avoid regular expression injection" previously.
8528FALSEFor AIP >= 8.3.27, the rule "Avoid deserialization injection through API requests" is enabled for input received in REST API exposed, instead of "Avoid deserialization injection" previously.
8534FALSEFor AIP >= 8.3.27, the rule "Avoid XQuery injection through API requests" is enabled for input received in REST API exposed, instead of "Avoid XQuery injection" previously.
8490FALSEFor AIP >= 8.3.27, the rule "Avoid SQL injection through API requests" is enabled for input received in REST API exposed, instead of "Avoid SQL injection" previously.
8540FALSEFor AIP >= 8.3.27, the rule "Avoid expression language injection through API requests" is enabled for input received in REST API exposed, instead of "Avoid expression language injection" previously.
8562FALSEFor AIP >= 8.3.27, the rule "Avoid server-side request forgery through API requests" is enabled for input received in REST API exposed, instead of "Avoid server-side request forgery" previously.

1.0.0-funcrel

New Support

SummaryDetails
Support DWR Annotations (Java Side)Creation of DWR Method objects and links to Java methods annotated with @RemoteMethod.
Support DWR complex xml binding (Java Side)Creation of DWR Method objects and links to exposed methods based on xml configurations files.
collect DWR function call from complex xml binding (Javascript Side)Creation of DWR CallTo Method objects and links from javascript containing a DWR function call exposed via xml configurations files.
collect DWR function call with header script generate by DWR (Javascript Side)Creation of DWR callTo Method objects and links from javascript containing a DWR function call exposed via header script statement.

1.0.0-beta1

Note

Initial release of this extension.

New Support

SummaryDetails
Support Direct Web Remoting framework (backend)Creation of new objects "A DWR service method" via exposed method in Java and dwr.xml configuration file
Support Direct Web Remoting framework (frontend)Creation of new objects "Call to a DWR service method" via JavaScript (*.js or *.jsp) function call and dwr.xml configuration file