This page is not yet available in Spanish. We are working on its translation.
If you have any questions or feedback about our current translation project,
feel free to reach out to us!Overview
Use ASM Exploit Prevention to protect your critical applications and APIs against zero-day vulnerabilities without tuning or reconfiguration.
With ASM’s context-aware capabilities, you can gain a deep understanding of application logic, data flow, and state.
Combine telemetry from the Datadog tracer with predefined heuristics to detect and block exploits with higher accuracy, ensuring legitimate traffic remains unaffected.
How exploit prevention works
- With the Datadog ASM tracing library instrumented in your applications, details are captured about every interaction within the application, including requests, code execution, and data flows.
- When an attack payload reaches the application, ASM evaluates if the payload triggers code paths tied to known vulnerabilities.
- If a potential exploit is detected:
- ASM blocks the request in real-time before it causes damage.
- ASM raises security signals for further investigation.
- Exploit prevention detections are accompanied by stack traces that provide full visibility of the code location of the vulnerability, providing a clear path to remediation.
Example 1: Server-side request forgery
An attacker tricks the server into making unauthorized requests to internal systems or external servers, potentially leaking information or a further exploitation.
ASM Exploit Prevention checks whether an internal or external request’s URL, which is partially or totally controlled by a user parameter, has been manipulated by an attacker to alter the original purpose of the request.
Example 2: Local file inclusion
An attacker exploits a vulnerable parameter to include local files from the server, potentially exposing sensitive data like configuration files or possibly enabling remote code execution.
ASM Exploit Prevention inspects all file access attempts to determine if the path has been injected and whether a restricted file is accessed.
Example 3: SQL injection
An attacker injects malicious SQL code into a query, potentially gaining unauthorized access to the database, manipulating data, or executing administrative operations.
ASM Exploit Prevention intercepts all SQL queries to determine if a user parameter has been injected and whether the injection alters the original purpose and structure of the SQL query.
Prerequisites
Library Compatibility
Exploit Type | .NET | Python | Go | Java | Node.js | PHP | Ruby |
---|
Server-side Request Forgery (SSRF) | v3.3.0 | v2.15.0 | v1.70.1 | v1.42.0 | v5.20.0, v4.44.0 | Avail. in Q1 ‘25 | Avail. in Q1 ‘25 |
Local File Inclusion (LFI) | v3.5.0 | v2.15.0 | orchestrion v1.0.0 | v1.42.0 | v5.24.0, v4.48.0 | Avail. in Q1 ‘25 | Avail. in Q1 ‘25 |
SQL Injection (SQLi) | v3.4.0 | v2.16.0 | v1.70.1 | v1.42.0 | v5.25.0, v4.49.0 | Avail. in Q1 ‘25 | Avail. in Q4 ‘24 |
Command Injection | v3.4.0 | v2.15.0 | Avail. in Q4 ‘24 | Avail. in Q1 ‘25 | v5.25.0, v4.49.0 | Avail. in Q1 ‘25 | Avail. in Q1 ‘25 |
Enabling Exploit Prevention
Navigate to In-App WAF (Security > Application Security > Protection > In-App WAF).
If you have applied a Datadog managed policy to your services, then follow these steps:
a. Clone the policy. For example, you can use the Managed - Block attack tools policy.
b. Add a policy name and description.c. Click on the policy you created and select the Local File Inclusion ruleset. Enable blocking for the Local File Inclusion exploit rule.d. Similarly, select the Server-side Request Forgery ruleset and enable blocking for the Server-side request forgery exploit rule.If you have applied a custom policy for your services, you can skip Steps 2.a and 2.b for cloning a policy and directly set the Exploit Prevention rules in blocking mode (Steps 2.c and 2.d).
Reviewing exploit attempts in ASM
After you have enabled Exploit Prevention, if ASM detects an exploit attempt, it proceeds to block that request. Exploit Prevention detections are always accompanied by stack traces, which provide full visibility of where the vulnerability lies in your code, ensuring a clear path to remediation.
In addition, ASM also generates a signal correlating all the blocked traces and isolating the attacker IP addresses that are targeting your service(s). You can take action by blocking all attacking IPs.
Further Reading
Más enlaces, artículos y documentación útiles: