From 7a0502fb71bb74b2f8ec716fd40c84427cbe5b6f Mon Sep 17 00:00:00 2001 From: psy Date: Tue, 26 Apr 2022 00:46:09 +0200 Subject: [PATCH] Initial integration (#7584) --- projects/httpcomponents-client/Dockerfile | 32 ++++++++++ .../httpcomponents-client/HttpFuzzer.java | 40 ++++++++++++ projects/httpcomponents-client/build.sh | 63 +++++++++++++++++++ projects/httpcomponents-client/project.yaml | 13 ++++ 4 files changed, 148 insertions(+) create mode 100644 projects/httpcomponents-client/Dockerfile create mode 100644 projects/httpcomponents-client/HttpFuzzer.java create mode 100755 projects/httpcomponents-client/build.sh create mode 100644 projects/httpcomponents-client/project.yaml diff --git a/projects/httpcomponents-client/Dockerfile b/projects/httpcomponents-client/Dockerfile new file mode 100644 index 000000000..b88d4b2c1 --- /dev/null +++ b/projects/httpcomponents-client/Dockerfile @@ -0,0 +1,32 @@ +# Copyright 2022 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +################################################################################ + +FROM gcr.io/oss-fuzz-base/base-builder-jvm + +RUN curl -L https://downloads.apache.org/maven/maven-3/3.6.3/binaries/apache-maven-3.6.3-bin.zip -o maven.zip && \ +unzip maven.zip -d $SRC/maven && \ +rm -rf maven.zip + +RUN git clone --depth 1 https://github.com/apache/httpcomponents-client + +ENV MVN $SRC/maven/apache-maven-3.6.3/bin/mvn + +WORKDIR httpcomponents-client +RUN git clone --depth 1 https://github.com/apache/httpcomponents-core +RUN git clone --depth 1 https://github.com/qos-ch/slf4j + +COPY build.sh $SRC/ +COPY HttpFuzzer.java $SRC/ \ No newline at end of file diff --git a/projects/httpcomponents-client/HttpFuzzer.java b/projects/httpcomponents-client/HttpFuzzer.java new file mode 100644 index 000000000..876908a75 --- /dev/null +++ b/projects/httpcomponents-client/HttpFuzzer.java @@ -0,0 +1,40 @@ +import com.code_intelligence.jazzer.api.FuzzedDataProvider; + +import java.util.ArrayList; +import java.util.List; +import java.net.URI; +import java.io.IOException; + +import org.apache.hc.core5.http.io.support.ClassicRequestBuilder; +import org.apache.hc.client5.http.impl.classic.HttpClients; +import org.apache.hc.client5.http.impl.classic.CloseableHttpClient; +import org.apache.hc.client5.http.impl.auth.CredentialsProviderBuilder; +import org.apache.hc.client5.http.auth.CredentialsProvider; +import org.apache.hc.client5.http.auth.AuthScope; +import org.apache.hc.client5.http.classic.methods.HttpPost; +import org.apache.hc.core5.http.ClassicHttpRequest; +import org.apache.hc.core5.http.message.BasicNameValuePair; +import org.apache.hc.core5.http.NameValuePair; +import org.apache.hc.client5.http.entity.UrlEncodedFormEntity; + +public class HttpFuzzer { + public static void fuzzerTestOneInput(FuzzedDataProvider data) { + final CredentialsProvider credsProvider = CredentialsProviderBuilder.create() + .add(new AuthScope(data.consumeRemainingAsString(), data.consumeInt()), data.consumeRemainingAsString(), data.consumeRemainingAsString().toCharArray()) + .build(); + + final CloseableHttpClient httpClient = HttpClients.custom() + .setDefaultCredentialsProvider(credsProvider) + .build(); + + HttpPost httpPost = new HttpPost("http://localhost"); + List nvps = new ArrayList<>(); + nvps.add(new BasicNameValuePair(data.consumeRemainingAsString(), data.consumeRemainingAsString())); + + httpPost.setEntity(new UrlEncodedFormEntity(nvps)); + + try { + httpClient.execute(httpPost); + } catch (IOException e) { } + } +} \ No newline at end of file diff --git a/projects/httpcomponents-client/build.sh b/projects/httpcomponents-client/build.sh new file mode 100755 index 000000000..4b764b7b5 --- /dev/null +++ b/projects/httpcomponents-client/build.sh @@ -0,0 +1,63 @@ +#!/bin/bash -eu +# Copyright 2022 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +################################################################################ + + +MAVEN_ARGS="-Djavac.src.version=15 -Djavac.target.version=15 -DskipTests" +$MVN package $MAVEN_ARGS +CURRENT_VERSION=$($MVN org.apache.maven.plugins:maven-help-plugin:3.2.0:evaluate \ + -Dexpression=project.version -q -DforceStdout) +cp "httpclient5/target/httpclient5-$CURRENT_VERSION.jar" "$OUT/httpclient5.jar" + +$MVN package $MAVEN_ARGS -f "httpcomponents-core/pom.xml" +CURRENT_VERSION=$($MVN org.apache.maven.plugins:maven-help-plugin:3.2.0:evaluate \ + -Dexpression=project.version -q -DforceStdout -f httpcomponents-core/pom.xml) +cp "httpcomponents-core/httpcore5/target/httpcore5-$CURRENT_VERSION.jar" "$OUT/httpcore5.jar" +cp "httpcomponents-core/httpcore5-h2/target/httpcore5-h2-$CURRENT_VERSION.jar" "$OUT/httpcore5-h2.jar" + +cd slf4j +$MVN package $MAVEN_ARGS +CURRENT_VERSION=$($MVN org.apache.maven.plugins:maven-help-plugin:3.2.0:evaluate \ + -Dexpression=project.version -q -DforceStdout) +cp "slf4j-api/target/slf4j-api-$CURRENT_VERSION.jar" "$OUT/slf4j.jar" +cd $SRC + +ALL_JARS="httpclient5.jar httpcore5.jar slf4j.jar httpcore5-h2.jar" + +# The classpath at build-time includes the project jars in $OUT as well as the +# Jazzer API. +BUILD_CLASSPATH=$(echo $ALL_JARS | xargs printf -- "$OUT/%s:"):$JAZZER_API_PATH + +# All .jar and .class files lie in the same directory as the fuzzer at runtime. +RUNTIME_CLASSPATH=$(echo $ALL_JARS | xargs printf -- "\$this_dir/%s:"):\$this_dir + +for fuzzer in $(find $SRC -name '*Fuzzer.java'); do + fuzzer_basename=$(basename -s .java $fuzzer) + javac -cp $BUILD_CLASSPATH $fuzzer + cp $SRC/$fuzzer_basename.class $OUT/ + + # Create an execution wrapper that executes Jazzer with the correct arguments. + echo "#!/bin/sh +# LLVMFuzzerTestOneInput for fuzzer detection. +this_dir=\$(dirname \"\$0\") +LD_LIBRARY_PATH=\"$JVM_LD_LIBRARY_PATH\":\$this_dir \ +\$this_dir/jazzer_driver --agent_path=\$this_dir/jazzer_agent_deploy.jar \ +--cp=$RUNTIME_CLASSPATH \ +--target_class=$fuzzer_basename \ +--jvm_args=\"-Xmx2048m\" \ +\$@" > $OUT/$fuzzer_basename + chmod u+x $OUT/$fuzzer_basename +done \ No newline at end of file diff --git a/projects/httpcomponents-client/project.yaml b/projects/httpcomponents-client/project.yaml new file mode 100644 index 000000000..0294f3817 --- /dev/null +++ b/projects/httpcomponents-client/project.yaml @@ -0,0 +1,13 @@ +homepage: "https://github.com/apache/httpcomponents-client" +language: jvm +primary_contact: "patrice.salathe@code-intelligence.com" +auto_ccs: + - "wagner@code-intelligence.com" + - "yakdan@code-intelligence.com" + - "glendowne@code-intelligence.com" + - "patrice.salathe@code-intelligence.com" +fuzzing_engines: + - libfuzzer +main_repo: "https://github.com/apache/httpcomponents-client.git" +sanitizers: + - address \ No newline at end of file