183 lines
		
	
	
		
			4.8 KiB
		
	
	
	
		
			C
		
	
	
	
			
		
		
	
	
			183 lines
		
	
	
		
			4.8 KiB
		
	
	
	
		
			C
		
	
	
	
/* Copyright 2021 Google LLC
 | 
						|
Licensed under the Apache License, Version 2.0 (the "License");
 | 
						|
you may not use this file except in compliance with the License.
 | 
						|
You may obtain a copy of the License at
 | 
						|
      http://www.apache.org/licenses/LICENSE-2.0
 | 
						|
Unless required by applicable law or agreed to in writing, software
 | 
						|
distributed under the License is distributed on an "AS IS" BASIS,
 | 
						|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
						|
See the License for the specific language governing permissions and
 | 
						|
limitations under the License.
 | 
						|
*/
 | 
						|
#include "apr.h"
 | 
						|
#include "apr_file_io.h"
 | 
						|
#include "apr_poll.h"
 | 
						|
#include "apr_portable.h"
 | 
						|
#include "apr_proc_mutex.h"
 | 
						|
#include "apr_signal.h"
 | 
						|
#include "apr_strings.h"
 | 
						|
#include "apr_thread_mutex.h"
 | 
						|
#include "apr_thread_proc.h"
 | 
						|
 | 
						|
#define APR_WANT_STRFUNC
 | 
						|
#include "apr_file_io.h"
 | 
						|
#include "apr_fnmatch.h"
 | 
						|
#include "apr_want.h"
 | 
						|
 | 
						|
#include "apr_poll.h"
 | 
						|
#include "apr_want.h"
 | 
						|
 | 
						|
#include "ap_config.h"
 | 
						|
#include "ap_expr.h"
 | 
						|
#include "ap_listen.h"
 | 
						|
#include "ap_provider.h"
 | 
						|
#include "ap_regex.h"
 | 
						|
 | 
						|
#include "ada_fuzz_header.h"
 | 
						|
 | 
						|
 | 
						|
int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) {
 | 
						|
  // Initialize fuzzing garbage collector. We use this to easily
 | 
						|
  // get data types seeded with random input from the fuzzer.
 | 
						|
  af_gb_init();
 | 
						|
 | 
						|
  const uint8_t *data2 = data;
 | 
						|
  size_t size2 = size;
 | 
						|
 | 
						|
  char *new_str = af_gb_get_null_terminated(&data2, &size2);
 | 
						|
  char *new_dst = af_gb_get_null_terminated(&data2, &size2);
 | 
						|
  if (new_str != NULL && new_dst != NULL) {
 | 
						|
 | 
						|
    // Targets that do not require a pool
 | 
						|
    ap_cstr_casecmp(new_str, new_str);
 | 
						|
    ap_getparents(new_str);
 | 
						|
    ap_unescape_url(new_str);
 | 
						|
    ap_unescape_urlencoded(new_str);
 | 
						|
    ap_strcmp_match(new_str, new_dst);
 | 
						|
 | 
						|
    char *ns3 = af_gb_get_null_terminated(&data2, &size2);
 | 
						|
    if (ns3 != NULL) {
 | 
						|
      ap_no2slash(ns3);
 | 
						|
    }
 | 
						|
 | 
						|
    char *ns11 = af_gb_get_null_terminated(&data2, &size2);
 | 
						|
    if (ns11) {
 | 
						|
      char *ns10 = malloc(strlen(ns11)*3+1); // big enough for worst-case URL-escaped input.
 | 
						|
      ap_escape_path_segment_buffer(ns10, ns11);
 | 
						|
      free(ns10);
 | 
						|
    }
 | 
						|
 | 
						|
    // Pool initialisation
 | 
						|
    if (apr_pool_initialize() == APR_SUCCESS) {
 | 
						|
      apr_pool_t *pool = NULL;
 | 
						|
      apr_pool_create(&pool, NULL);
 | 
						|
 | 
						|
      // Targets that require a pool
 | 
						|
      ns3 = af_gb_get_null_terminated(&data2, &size2);
 | 
						|
      if (ns3 != NULL) {
 | 
						|
        ap_make_dirstr_parent(pool, ns3);
 | 
						|
      }
 | 
						|
 | 
						|
      ap_field_noparam(pool, new_str);
 | 
						|
 | 
						|
      ap_escape_shell_cmd(pool, new_str);
 | 
						|
      ap_os_escape_path(pool, new_str, 0);
 | 
						|
      ap_escape_html2(pool, new_str, 0);
 | 
						|
      ap_escape_logitem(pool, new_str);
 | 
						|
 | 
						|
      // This line causes some issues if something bad is allocated
 | 
						|
      ap_escape_quotes(pool, new_str);
 | 
						|
 | 
						|
      if (size > 2) {
 | 
						|
        ap_cstr_casecmpn(new_str, new_str + 2, size - 2);
 | 
						|
      }
 | 
						|
 | 
						|
      char *d = malloc(size * 2);
 | 
						|
      ap_escape_errorlog_item(d, new_str, size * 2);
 | 
						|
      free(d);
 | 
						|
 | 
						|
      // base64
 | 
						|
      char *decoded = NULL;
 | 
						|
      decoded = ap_pbase64decode(pool, new_str);
 | 
						|
      ap_pbase64encode(pool, new_str);
 | 
						|
 | 
						|
      char *ns12 = af_gb_get_null_terminated(&data2, &size2);
 | 
						|
      if (ns12 != NULL) {
 | 
						|
        char *d;
 | 
						|
        apr_size_t dlen;
 | 
						|
        ap_pbase64decode_strict(pool, ns12, &d, &dlen);
 | 
						|
      }
 | 
						|
 | 
						|
      char *tmp_s = new_str;
 | 
						|
      ap_getword_conf2(pool, &tmp_s);
 | 
						|
 | 
						|
      // str functions
 | 
						|
      ap_strcasecmp_match(tmp_s, new_dst);
 | 
						|
      ap_strcasestr(tmp_s, new_dst);
 | 
						|
 | 
						|
      // List functions
 | 
						|
      tmp_s = new_str;
 | 
						|
      ap_get_list_item(pool, &tmp_s);
 | 
						|
      tmp_s = new_str;
 | 
						|
      ap_find_list_item(pool, &tmp_s, "kjahsdfkj");
 | 
						|
      ap_find_token(pool, tmp_s, "klsjdfk");
 | 
						|
      ap_find_last_token(pool, tmp_s, "sdadf");
 | 
						|
      ap_is_chunked(pool, tmp_s);
 | 
						|
 | 
						|
      apr_array_header_t *offers = NULL;
 | 
						|
      ap_parse_token_list_strict(pool, new_str, &offers, 0);
 | 
						|
 | 
						|
      char *tmp_null = NULL;
 | 
						|
      ap_pstr2_alnum(pool, new_str, &tmp_null);
 | 
						|
 | 
						|
      // Word functions
 | 
						|
      tmp_s = new_str;
 | 
						|
      ap_getword(pool, &tmp_s, 0);
 | 
						|
 | 
						|
      tmp_s = new_str;
 | 
						|
      ap_getword_white_nc(pool, &tmp_s);
 | 
						|
 | 
						|
      tmp_s = new_str;
 | 
						|
      ap_get_token(pool, &tmp_s, 1);
 | 
						|
 | 
						|
      tmp_s = new_str;
 | 
						|
      ap_escape_urlencoded(pool, tmp_s);
 | 
						|
 | 
						|
      apr_interval_time_t timeout;
 | 
						|
      ap_timeout_parameter_parse(new_str, &timeout, "ms");
 | 
						|
 | 
						|
      tmp_s = new_str;
 | 
						|
      ap_content_type_tolower(tmp_s);
 | 
						|
 | 
						|
 | 
						|
			char filename[256];
 | 
						|
			sprintf(filename, "/tmp/libfuzzer.%d", getpid());
 | 
						|
			FILE *fp = fopen(filename, "wb");
 | 
						|
			fwrite(data, size, 1, fp);
 | 
						|
			fclose(fp);
 | 
						|
 | 
						|
			// Fuzzer logic here
 | 
						|
			ap_configfile_t *cfg;
 | 
						|
			ap_pcfg_openfile(&cfg, pool, filename);
 | 
						|
      char tmp_line[100];
 | 
						|
      if ((af_get_short(&data2, &size2) % 2) == 0) {
 | 
						|
        ap_cfg_getline(tmp_line, 100, cfg);
 | 
						|
      }
 | 
						|
      else {
 | 
						|
        cfg->getstr = NULL;
 | 
						|
        ap_cfg_getline(tmp_line, 100, cfg);
 | 
						|
      }
 | 
						|
			// Fuzzer logic end
 | 
						|
 | 
						|
			unlink(filename);
 | 
						|
 | 
						|
      // Cleanup
 | 
						|
      apr_pool_terminate();
 | 
						|
    }
 | 
						|
  }
 | 
						|
 | 
						|
  // Cleanup all of the memory allocated by the fuzz headers.
 | 
						|
  af_gb_cleanup();
 | 
						|
  return 0;
 | 
						|
}
 |