paramiko: initial integration (#8288)

This commit is contained in:
DavidKorczynski 2022-08-23 14:42:49 +01:00 committed by GitHub
parent 77058c6f0e
commit 9ae994f6a3
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
4 changed files with 146 additions and 0 deletions

View File

@ -0,0 +1,22 @@
# Copyright 2022 Google LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
################################################################################
FROM gcr.io/oss-fuzz-base/base-builder-python
RUN apt-get update && apt-get install -y make autoconf automake libtool
RUN pip3 install --upgrade pip
RUN git clone --depth 1 https://github.com/paramiko/paramiko
WORKDIR paramiko
COPY build.sh *.py $SRC/

23
projects/paramiko/build.sh Executable file
View File

@ -0,0 +1,23 @@
#!/bin/bash -eu
# Copyright 2022 Google LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
################################################################################
pip3 install .
cd tests
cp -rf $SRC/fuzz_*.py .
for fuzzer in $(find . -name 'fuzz_*.py'); do
compile_python_fuzzer $fuzzer --add-data loop.py:.
done

View File

@ -0,0 +1,90 @@
#!/usr/bin/python3
# Copyright 2022 Google LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
"""Fuzzer for Packetizer"""
import os
import sys
import atheris
from hashlib import sha1
from cryptography.hazmat.backends import default_backend
from cryptography.hazmat.primitives.ciphers import algorithms, Cipher, modes
from paramiko import Message, Packetizer
from paramiko.common import byte_chr, zero_byte, asbytes
# Extract path of fuzzer so we can include loop.py
if getattr(sys, 'frozen', False):
app_path = os.path.dirname(sys.executable)
elif __file__:
app_path = os.path.dirname(__file__)
else:
raise Exception("Could not extract path needed to import loop.py")
sys.path.append(app_path)
from loop import LoopSocket
def TestOneInput(data):
fdp = atheris.FuzzedDataProvider(data)
rsock = LoopSocket()
wsock = LoopSocket()
rsock.link(wsock)
p = Packetizer(wsock)
encryptor = Cipher(
algorithms.AES(zero_byte * 16),
modes.CBC(byte_chr(fdp.ConsumeIntInRange(0, 255)) * 16),
backend=default_backend(),
).encryptor()
p.set_outbound_cipher(
encryptor,
16,
sha1,
12,
byte_chr(fdp.ConsumeIntInRange(0, 255)) * 20
)
m = Message()
# Messages need to be at least 16 bytes long, so we'll include
# at least 16 items.
for i in range(fdp.ConsumeIntInRange(16, 32)):
op = fdp.ConsumeIntInRange(0,5)
if op == 0:
m.add(fdp.ConsumeUnicodeNoSurrogates(20))
elif op == 1:
m.add(fdp.ConsumeIntInRange(0, 4294967295))
elif op == 2:
m.add(fdp.ConsumeBool())
elif op == 3:
l1 = list()
for i in range(1, 10):
l1.append(fdp.ConsumeUnicodeNoSurrogates(20))
m.add(l1)
elif op == 4:
m.add_bytes(fdp.ConsumeBytes(20))
elif op == 5:
m.add_byte(byte_chr(fdp.ConsumeIntInRange(0,255)))
p.send_message(m)
rsock.recv(sys.maxsize)
def main():
atheris.instrument_all()
atheris.Setup(sys.argv, TestOneInput, enable_python_coverage=True)
atheris.Fuzz()
if __name__ == "__main__":
main()

View File

@ -0,0 +1,11 @@
homepage: "https://github.com/paramiko/paramiko"
language: python
main_repo: "https://github.com/paramiko/paramiko"
fuzzing_engines:
- libfuzzer
sanitizers:
- address
- undefined
vendor_ccs:
- david@adalogics.com
- adam@adalogics.com