/* * Copyright 2022 Google LLC * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * http://www.apache.org/licenses/LICENSE-2.0 * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ /* A detector that uses ptrace to identify shell injection vulnerabilities. */ /* POSIX */ #include #include /* Linux */ #include #include #include #include #include "inspect_utils.h" // Arbitrary domain name resolution. const std::string kArbitraryDomainNameResolution = "Arbitrary domain name resolution"; // Global constant for one file descriptor about of a DNS socket int kFdDns = 0; const size_t kDnsHeaderLen = 12; void inspect_for_arbitrary_dns_connect(pid_t pid, const user_regs_struct ®s) { auto memory = read_memory(pid, regs.rsi, sizeof(struct sockaddr_in)); if (memory.size()) { struct sockaddr_in * sa = reinterpret_cast(memory.data()); if (sa->sin_family == AF_INET && htons(sa->sin_port) == 53) { // save file descriptor for later sendmmsg kFdDns = regs.rdi; } } } struct DnsHeader { uint16_t tx_id; uint16_t flags; uint16_t questions; uint16_t answers; uint16_t nameservers; uint16_t additional; }; struct DnsHeader parse_dns_header(std::vector data) { struct DnsHeader h; h.tx_id = (((uint16_t) data[0]) << 8) | ((uint16_t) data[1]); h.flags = (((uint16_t) data[2]) << 8) | ((uint16_t) data[3]); h.questions = (((uint16_t) data[4]) << 8) | ((uint16_t) data[5]); h.answers = (((uint16_t) data[6]) << 8) | ((uint16_t) data[7]); h.nameservers = (((uint16_t) data[8]) << 8) | ((uint16_t) data[9]); h.additional = (((uint16_t) data[10]) << 8) | ((uint16_t) data[11]); return h; } bool dns_flags_standard_query(uint16_t flags) { if ((flags & 0x8000) == 0) { // Query, not response. if (((flags & 0x7800) >> 11) == 0) { // Opcode 0 is standard query. if ((flags & 0x0200) == 0) { // Message is not truncated. if ((flags & 0x0040) == 0) { // Z-bit reserved flag is unset. return true; } } } } return false; } struct DnsRequest { // Start of name in the byte vector. size_t offset; // End of name in the byte vector. size_t end; // Length of top level domain. uint8_t tld_size; // Number of levels/dots in domain name. size_t nb_levels; // DNS type like A is 1. uint16_t dns_type; // DNS class like IN is 1. uint16_t dns_class; }; struct DnsRequest parse_dns_request(std::vector data, size_t offset) { struct DnsRequest r; r.offset = offset; r.tld_size = 0; r.nb_levels = 0; while(offset < data.size()) { uint8_t rlen = uint8_t(data[offset]); if (rlen == 0) { offset++; break; } r.nb_levels++; offset += rlen+1; r.tld_size = rlen; } if (offset <= 4 + data.size()) { r.end = offset; r.dns_type = (((uint16_t) data[offset]) << 8) | ((uint16_t) data[offset+1]); r.dns_class = (((uint16_t) data[offset+2]) << 8) | ((uint16_t) data[offset+3]); } else { r.end = data.size(); } return r; } void log_dns_request(struct DnsRequest r, std::vector data) { size_t offset = r.offset; std::cerr << "===Domain resolved: "; while(offset < r.end) { uint8_t rlen = uint8_t(data[offset]); if (rlen == 0) { break; } std::cerr << '.'; for (uint8_t i = 1; i < rlen+1; i++) { std::cerr << (char) data[offset + i]; } offset += rlen+1; } std::cerr << "===\n"; std::cerr << "===DNS request type: " << r.dns_type << ", class: " << r.dns_class << "===\n"; } void inspect_for_arbitrary_dns_pkt(std::vector data, pid_t pid) { if (data.size() < kDnsHeaderLen + 1) { return; } struct DnsHeader h = parse_dns_header(data); if (h.questions != 1) { return; } if (h.answers != 0 || h.nameservers != 0) { return; } if (!dns_flags_standard_query(h.flags)) { return; } struct DnsRequest req = parse_dns_request(data, kDnsHeaderLen); // Alert if the top level domain is only one character and // if there is more than just the TLD. if (req.tld_size == 1 && req.nb_levels > 1 && req.end < data.size()) { report_bug(kArbitraryDomainNameResolution, pid); log_dns_request(req, data); } } void inspect_for_arbitrary_dns_fdbuffer(pid_t pid, const user_regs_struct ®s) { if (kFdDns > 0 && kFdDns == (int) regs.rdi) { auto memory = read_memory(pid, regs.rsi, regs.rdx); if (memory.size()) { inspect_for_arbitrary_dns_pkt(memory, pid); } } } void inspect_for_arbitrary_dns_iov(pid_t pid, unsigned long iov) { auto memory = read_memory(pid, iov, sizeof(struct iovec)); if (memory.size()) { struct iovec * iovec = reinterpret_cast(memory.data()); memory = read_memory(pid, (unsigned long) iovec->iov_base, iovec->iov_len); if (memory.size()) { inspect_for_arbitrary_dns_pkt(memory, pid); } } } void inspect_for_arbitrary_dns_sendmsg(pid_t pid, const user_regs_struct ®s) { if (kFdDns > 0 && kFdDns == (int) regs.rdi) { auto memory = read_memory(pid, regs.rsi, sizeof(struct msghdr)); if (memory.size()) { struct msghdr * msg = reinterpret_cast(memory.data()); if (msg->msg_iovlen == 1) { inspect_for_arbitrary_dns_iov(pid, (unsigned long) msg->msg_iov); } } } } void inspect_for_arbitrary_dns_sendmmsg(pid_t pid, const user_regs_struct ®s) { if (kFdDns > 0 && kFdDns == (int) regs.rdi) { auto memory = read_memory(pid, regs.rsi, sizeof(struct mmsghdr)); if (memory.size()) { struct mmsghdr * msg = reinterpret_cast(memory.data()); if (msg->msg_hdr.msg_iovlen == 1) { inspect_for_arbitrary_dns_iov(pid, (unsigned long) msg->msg_hdr.msg_iov); } } } } void inspect_dns_syscalls(pid_t pid, const user_regs_struct ®s) { switch (regs.orig_rax) { case __NR_connect: inspect_for_arbitrary_dns_connect(pid, regs); break; case __NR_close: if (kFdDns > 0 && kFdDns == (int) regs.rdi) { // reset DNS file descriptor on close kFdDns = 0; } break; case __NR_sendmmsg: inspect_for_arbitrary_dns_sendmmsg(pid, regs); break; case __NR_sendmsg: inspect_for_arbitrary_dns_sendmsg(pid, regs); break; case __NR_sendto: // fallthrough case __NR_write: inspect_for_arbitrary_dns_fdbuffer(pid, regs); } }