183 lines
		
	
	
		
			4.8 KiB
		
	
	
	
		
			C
		
	
	
	
			
		
		
	
	
			183 lines
		
	
	
		
			4.8 KiB
		
	
	
	
		
			C
		
	
	
	
| /* Copyright 2021 Google LLC
 | |
| Licensed under the Apache License, Version 2.0 (the "License");
 | |
| you may not use this file except in compliance with the License.
 | |
| You may obtain a copy of the License at
 | |
|       http://www.apache.org/licenses/LICENSE-2.0
 | |
| Unless required by applicable law or agreed to in writing, software
 | |
| distributed under the License is distributed on an "AS IS" BASIS,
 | |
| WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
| See the License for the specific language governing permissions and
 | |
| limitations under the License.
 | |
| */
 | |
| #include "apr.h"
 | |
| #include "apr_file_io.h"
 | |
| #include "apr_poll.h"
 | |
| #include "apr_portable.h"
 | |
| #include "apr_proc_mutex.h"
 | |
| #include "apr_signal.h"
 | |
| #include "apr_strings.h"
 | |
| #include "apr_thread_mutex.h"
 | |
| #include "apr_thread_proc.h"
 | |
| 
 | |
| #define APR_WANT_STRFUNC
 | |
| #include "apr_file_io.h"
 | |
| #include "apr_fnmatch.h"
 | |
| #include "apr_want.h"
 | |
| 
 | |
| #include "apr_poll.h"
 | |
| #include "apr_want.h"
 | |
| 
 | |
| #include "ap_config.h"
 | |
| #include "ap_expr.h"
 | |
| #include "ap_listen.h"
 | |
| #include "ap_provider.h"
 | |
| #include "ap_regex.h"
 | |
| 
 | |
| #include "ada_fuzz_header.h"
 | |
| 
 | |
| 
 | |
| int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) {
 | |
|   // Initialize fuzzing garbage collector. We use this to easily
 | |
|   // get data types seeded with random input from the fuzzer.
 | |
|   af_gb_init();
 | |
| 
 | |
|   const uint8_t *data2 = data;
 | |
|   size_t size2 = size;
 | |
| 
 | |
|   char *new_str = af_gb_get_null_terminated(&data2, &size2);
 | |
|   char *new_dst = af_gb_get_null_terminated(&data2, &size2);
 | |
|   if (new_str != NULL && new_dst != NULL) {
 | |
| 
 | |
|     // Targets that do not require a pool
 | |
|     ap_cstr_casecmp(new_str, new_str);
 | |
|     ap_getparents(new_str);
 | |
|     ap_unescape_url(new_str);
 | |
|     ap_unescape_urlencoded(new_str);
 | |
|     ap_strcmp_match(new_str, new_dst);
 | |
| 
 | |
|     char *ns3 = af_gb_get_null_terminated(&data2, &size2);
 | |
|     if (ns3 != NULL) {
 | |
|       ap_no2slash(ns3);
 | |
|     }
 | |
| 
 | |
|     char *ns11 = af_gb_get_null_terminated(&data2, &size2);
 | |
|     if (ns11) {
 | |
|       char *ns10 = malloc(strlen(ns11)*3+1); // big enough for worst-case URL-escaped input.
 | |
|       ap_escape_path_segment_buffer(ns10, ns11);
 | |
|       free(ns10);
 | |
|     }
 | |
| 
 | |
|     // Pool initialisation
 | |
|     if (apr_pool_initialize() == APR_SUCCESS) {
 | |
|       apr_pool_t *pool = NULL;
 | |
|       apr_pool_create(&pool, NULL);
 | |
| 
 | |
|       // Targets that require a pool
 | |
|       ns3 = af_gb_get_null_terminated(&data2, &size2);
 | |
|       if (ns3 != NULL) {
 | |
|         ap_make_dirstr_parent(pool, ns3);
 | |
|       }
 | |
| 
 | |
|       ap_field_noparam(pool, new_str);
 | |
| 
 | |
|       ap_escape_shell_cmd(pool, new_str);
 | |
|       ap_os_escape_path(pool, new_str, 0);
 | |
|       ap_escape_html2(pool, new_str, 0);
 | |
|       ap_escape_logitem(pool, new_str);
 | |
| 
 | |
|       // This line causes some issues if something bad is allocated
 | |
|       ap_escape_quotes(pool, new_str);
 | |
| 
 | |
|       if (size > 2) {
 | |
|         ap_cstr_casecmpn(new_str, new_str + 2, size - 2);
 | |
|       }
 | |
| 
 | |
|       char *d = malloc(size * 2);
 | |
|       ap_escape_errorlog_item(d, new_str, size * 2);
 | |
|       free(d);
 | |
| 
 | |
|       // base64
 | |
|       char *decoded = NULL;
 | |
|       decoded = ap_pbase64decode(pool, new_str);
 | |
|       ap_pbase64encode(pool, new_str);
 | |
| 
 | |
|       char *ns12 = af_gb_get_null_terminated(&data2, &size2);
 | |
|       if (ns12 != NULL) {
 | |
|         char *d;
 | |
|         apr_size_t dlen;
 | |
|         ap_pbase64decode_strict(pool, ns12, &d, &dlen);
 | |
|       }
 | |
| 
 | |
|       char *tmp_s = new_str;
 | |
|       ap_getword_conf2(pool, &tmp_s);
 | |
| 
 | |
|       // str functions
 | |
|       ap_strcasecmp_match(tmp_s, new_dst);
 | |
|       ap_strcasestr(tmp_s, new_dst);
 | |
| 
 | |
|       // List functions
 | |
|       tmp_s = new_str;
 | |
|       ap_get_list_item(pool, &tmp_s);
 | |
|       tmp_s = new_str;
 | |
|       ap_find_list_item(pool, &tmp_s, "kjahsdfkj");
 | |
|       ap_find_token(pool, tmp_s, "klsjdfk");
 | |
|       ap_find_last_token(pool, tmp_s, "sdadf");
 | |
|       ap_is_chunked(pool, tmp_s);
 | |
| 
 | |
|       apr_array_header_t *offers = NULL;
 | |
|       ap_parse_token_list_strict(pool, new_str, &offers, 0);
 | |
| 
 | |
|       char *tmp_null = NULL;
 | |
|       ap_pstr2_alnum(pool, new_str, &tmp_null);
 | |
| 
 | |
|       // Word functions
 | |
|       tmp_s = new_str;
 | |
|       ap_getword(pool, &tmp_s, 0);
 | |
| 
 | |
|       tmp_s = new_str;
 | |
|       ap_getword_white_nc(pool, &tmp_s);
 | |
| 
 | |
|       tmp_s = new_str;
 | |
|       ap_get_token(pool, &tmp_s, 1);
 | |
| 
 | |
|       tmp_s = new_str;
 | |
|       ap_escape_urlencoded(pool, tmp_s);
 | |
| 
 | |
|       apr_interval_time_t timeout;
 | |
|       ap_timeout_parameter_parse(new_str, &timeout, "ms");
 | |
| 
 | |
|       tmp_s = new_str;
 | |
|       ap_content_type_tolower(tmp_s);
 | |
| 
 | |
| 
 | |
| 			char filename[256];
 | |
| 			sprintf(filename, "/tmp/libfuzzer.%d", getpid());
 | |
| 			FILE *fp = fopen(filename, "wb");
 | |
| 			fwrite(data, size, 1, fp);
 | |
| 			fclose(fp);
 | |
| 
 | |
| 			// Fuzzer logic here
 | |
| 			ap_configfile_t *cfg;
 | |
| 			ap_pcfg_openfile(&cfg, pool, filename);
 | |
|       char tmp_line[100];
 | |
|       if ((af_get_short(&data2, &size2) % 2) == 0) {
 | |
|         ap_cfg_getline(tmp_line, 100, cfg);
 | |
|       }
 | |
|       else {
 | |
|         cfg->getstr = NULL;
 | |
|         ap_cfg_getline(tmp_line, 100, cfg);
 | |
|       }
 | |
| 			// Fuzzer logic end
 | |
| 
 | |
| 			unlink(filename);
 | |
| 
 | |
|       // Cleanup
 | |
|       apr_pool_terminate();
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   // Cleanup all of the memory allocated by the fuzz headers.
 | |
|   af_gb_cleanup();
 | |
|   return 0;
 | |
| }
 |