aboutsummaryrefslogtreecommitdiff
path: root/tests/src/test/java/com/example/HookDependenciesFuzzer.java
diff options
context:
space:
mode:
Diffstat (limited to 'tests/src/test/java/com/example/HookDependenciesFuzzer.java')
-rw-r--r--tests/src/test/java/com/example/HookDependenciesFuzzer.java68
1 files changed, 68 insertions, 0 deletions
diff --git a/tests/src/test/java/com/example/HookDependenciesFuzzer.java b/tests/src/test/java/com/example/HookDependenciesFuzzer.java
new file mode 100644
index 00000000..88627f4c
--- /dev/null
+++ b/tests/src/test/java/com/example/HookDependenciesFuzzer.java
@@ -0,0 +1,68 @@
+// Copyright 2022 Code Intelligence GmbH
+//
+// Licensed under the Apache License, Version 2.0 (the "License");
+// you may not use this file except in compliance with the License.
+// You may obtain a copy of the License at
+//
+// http://www.apache.org/licenses/LICENSE-2.0
+//
+// Unless required by applicable law or agreed to in writing, software
+// distributed under the License is distributed on an "AS IS" BASIS,
+// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+// See the License for the specific language governing permissions and
+// limitations under the License.
+
+package com.example;
+
+import com.code_intelligence.jazzer.api.FuzzerSecurityIssueLow;
+import com.code_intelligence.jazzer.api.HookType;
+import com.code_intelligence.jazzer.api.MethodHook;
+import java.lang.invoke.MethodHandle;
+import java.lang.reflect.Field;
+import java.util.regex.Pattern;
+
+// This fuzzer verifies that:
+// 1. a class referenced in a static initializer of a hook is still instrumented with the hook;
+// 2. hooks that are not shipped in the Jazzer agent JAR can still instrument Java standard library
+// classes.
+public class HookDependenciesFuzzer {
+ private static final Field PATTERN_ROOT;
+
+ static {
+ Field root;
+ try {
+ root = Pattern.class.getDeclaredField("root");
+ } catch (NoSuchFieldException e) {
+ root = null;
+ }
+ PATTERN_ROOT = root;
+ }
+
+ @MethodHook(type = HookType.AFTER, targetClassName = "java.util.regex.Matcher",
+ targetMethod = "matches", targetMethodDescriptor = "()Z",
+ additionalClassesToHook = {"java.util.regex.Pattern"})
+ public static void
+ matcherMatchesHook(MethodHandle method, Object alwaysNull, Object[] alwaysEmpty, int hookId,
+ Boolean returnValue) {
+ if (PATTERN_ROOT != null) {
+ throw new FuzzerSecurityIssueLow("Hook applied even though it depends on the class to hook");
+ }
+ }
+
+ public static void fuzzerTestOneInput(byte[] data) {
+ try {
+ Pattern.matches("foobar", "foobar");
+ } catch (Throwable t) {
+ if (t instanceof FuzzerSecurityIssueLow) {
+ throw t;
+ } else {
+ // Unexpected exception, exit without producing a finding to let the test fail due to the
+ // missing Java reproducer.
+ // FIXME(fabian): This is hacky and will result in false positives as soon as we implement
+ // Java reproducers for fuzz target exits. Replace this with a more reliable signal.
+ t.printStackTrace();
+ System.exit(1);
+ }
+ }
+ }
+}