From e44b3b6b6ab1af61f9abc210546700e30aeff19c Mon Sep 17 00:00:00 2001 From: jvoisin Date: Wed, 11 Oct 2017 11:40:02 +0200 Subject: s/disable_functions/disable_function/g This should close #36 and #30 --- doc/source/config.rst | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) (limited to 'doc/source') diff --git a/doc/source/config.rst b/doc/source/config.rst index 95a76f5..b7fa803 100644 --- a/doc/source/config.rst +++ b/doc/source/config.rst @@ -12,7 +12,7 @@ Options are chainable by using dots (``.``) and string parameters Comments are prefixed either with ``#``, or ``;``. Some rules apply in a specific ``function`` (context) on a specific ``variable`` -(data), like ``disable_functions``. Others can only be enabled/disabled, like +(data), like ``disable_function``. Others can only be enabled/disabled, like ``harden_random``. @@ -212,14 +212,14 @@ disable_xxe Virtual-patching ---------------- -Snuffleupagus provides virtual-patching via the ``disable_functions`` directive, allowing you to stop or control dangerous behaviours. +Snuffleupagus provides virtual-patching via the ``disable_function`` directive, allowing you to stop or control dangerous behaviours. In the situation where you have a call to ``system()`` that lacks proper user-input validation, this could cause issues as it would lead to an **RCE**. The virtual-patching would allow this to be prevented. :: # Allow `id.php` to restrict system() calls to `id` - sp.disable_functions.function("system").filename("id.php").param("cmd").value("id").allow(); - sp.disable_functions.function("system").filename("id.php").drop() + sp.disable_function.function("system").filename("id.php").param("cmd").value("id").allow(); + sp.disable_function.function("system").filename("id.php").drop() Of course, this is a trivial example, a lot can be achieved with this feature, as you will see below. @@ -309,9 +309,9 @@ The following rules will: :: - sp.disable_functions.function("system").param("cmd").value("id").allow(); - sp.disable_functions.function("system").param("cmd").value_r("^ping").drop().simulation(); - sp.disable_functions.function("system").param("cmd").drop(); + sp.disable_function.function("system").param("cmd").value("id").allow(); + sp.disable_function.function("system").param("cmd").value_r("^ping").drop().simulation(); + sp.disable_function.function("system").param("cmd").drop(); Miscellaneous examples """""""""""""""""""""" -- cgit v1.3