|
3 | 3 | import java.nio.file.Path;
|
4 | 4 | import java.nio.file.Paths;
|
5 | 5 | import android.net.Uri;
|
| 6 | +import java.io.BufferedReader; |
| 7 | +import java.io.InputStreamReader; |
| 8 | +import java.net.Socket; |
6 | 9 |
|
7 | 10 | public class Test {
|
8 | 11 |
|
@@ -463,4 +466,145 @@ public void blockListGuard() throws Exception {
|
463 | 466 | }
|
464 | 467 | }
|
465 | 468 | }
|
| 469 | + |
| 470 | + private void fileConstructorValidation(String path) throws Exception { |
| 471 | + // Use `indexOf` instead of `contains` for this test since a `contains` |
| 472 | + // call in this scenario will already be sanitized due to the inclusion |
| 473 | + // of `ValidatedVariableAccess` nodes in `defaultTaintSanitizer`. |
| 474 | + if (path.indexOf("..") != -1) |
| 475 | + throw new Exception(); |
| 476 | + } |
| 477 | + |
| 478 | + public void fileConstructorSanitizer() throws Exception { |
| 479 | + // PathTraversalGuard |
| 480 | + { |
| 481 | + String source = (String) source(); |
| 482 | + File f1 = new File("safe/file.txt"); |
| 483 | + if (!source.contains("..")) { |
| 484 | + File f2 = new File(f1, source); |
| 485 | + sink(f2); // Safe |
| 486 | + sink(source); // $ MISSING: hasTaintFlow |
| 487 | + } else { |
| 488 | + File f3 = new File(f1, source); |
| 489 | + sink(f3); // $ hasTaintFlow |
| 490 | + sink(source); // $ hasTaintFlow |
| 491 | + } |
| 492 | + } |
| 493 | + { |
| 494 | + String source = (String) source(); |
| 495 | + File f1Tainted = (File) source(); |
| 496 | + if (!source.contains("..")) { |
| 497 | + // `f2` is unsafe if `f1` is tainted |
| 498 | + File f2 = new File(f1Tainted, source); |
| 499 | + sink(f2); // $ hasTaintFlow |
| 500 | + sink(source); // $ MISSING: hasTaintFlow |
| 501 | + } else { |
| 502 | + File f3 = new File(f1Tainted, source); |
| 503 | + sink(f3); // $ hasTaintFlow |
| 504 | + sink(source); // $ hasTaintFlow |
| 505 | + } |
| 506 | + } |
| 507 | + { |
| 508 | + String source = (String) source(); |
| 509 | + File f1Null = null; |
| 510 | + if (!source.contains("..")) { |
| 511 | + // `f2` is unsafe if `f1` is null |
| 512 | + File f2 = new File(f1Null, source); |
| 513 | + sink(f2); // $ hasTaintFlow |
| 514 | + sink(source); // $ hasTaintFlow |
| 515 | + } else { |
| 516 | + File f3 = new File(f1Null, source); |
| 517 | + sink(f3); // $ hasTaintFlow |
| 518 | + sink(source); // $ hasTaintFlow |
| 519 | + } |
| 520 | + } |
| 521 | + { |
| 522 | + String source = (String) source(); |
| 523 | + File f1 = new File("safe/file.txt"); |
| 524 | + if (source.indexOf("..") == -1) { |
| 525 | + File f2 = new File(f1, source); |
| 526 | + sink(f2); // Safe |
| 527 | + sink(source); // $ MISSING: hasTaintFlow |
| 528 | + } else { |
| 529 | + File f3 = new File(f1, source); |
| 530 | + sink(f3); // $ hasTaintFlow |
| 531 | + sink(source); // $ hasTaintFlow |
| 532 | + } |
| 533 | + } |
| 534 | + { |
| 535 | + String source = (String) source(); |
| 536 | + File f1 = new File("safe/file.txt"); |
| 537 | + if (source.indexOf("..") != -1) { |
| 538 | + File f2 = new File(f1, source); |
| 539 | + sink(f2); // $ hasTaintFlow |
| 540 | + sink(source); // $ hasTaintFlow |
| 541 | + } else { |
| 542 | + File f3 = new File(f1, source); |
| 543 | + sink(f3); // Safe |
| 544 | + sink(source); // $ MISSING: hasTaintFlow |
| 545 | + } |
| 546 | + } |
| 547 | + { |
| 548 | + String source = (String) source(); |
| 549 | + File f1 = new File("safe/file.txt"); |
| 550 | + if (source.lastIndexOf("..") == -1) { |
| 551 | + File f2 = new File(f1, source); |
| 552 | + sink(f2); // Safe |
| 553 | + sink(source); // $ MISSING: hasTaintFlow |
| 554 | + } else { |
| 555 | + File f3 = new File(f1, source); |
| 556 | + sink(f3); // $ hasTaintFlow |
| 557 | + sink(source); // $ hasTaintFlow |
| 558 | + } |
| 559 | + } |
| 560 | + // validation method |
| 561 | + { |
| 562 | + String source = (String) source(); |
| 563 | + File f1 = new File("safe/file.txt"); |
| 564 | + fileConstructorValidation(source); |
| 565 | + File f2 = new File(f1, source); |
| 566 | + sink(f2); // Safe |
| 567 | + sink(source); // $ MISSING: hasTaintFlow |
| 568 | + } |
| 569 | + { |
| 570 | + String source = (String) source(); |
| 571 | + File f1 = new File("safe/file.txt"); |
| 572 | + |
| 573 | + if (source.contains("..")) { |
| 574 | + throw new Exception(); |
| 575 | + } else { |
| 576 | + File f2 = new File(f1, source); |
| 577 | + sink(f2); // Safe |
| 578 | + sink(source); // $ MISSING: hasTaintFlow |
| 579 | + } |
| 580 | + } |
| 581 | + // PathNormalizeSanitizer |
| 582 | + { |
| 583 | + File source = (File) source(); |
| 584 | + String normalized = source.getCanonicalPath(); |
| 585 | + File f1 = new File("safe/file.txt"); |
| 586 | + File f2 = new File(f1, normalized); |
| 587 | + sink(f2); // Safe |
| 588 | + sink(source); // $ hasTaintFlow |
| 589 | + sink(normalized); // $ MISSING: hasTaintFlow |
| 590 | + } |
| 591 | + { |
| 592 | + File source = (File) source(); |
| 593 | + String normalized = source.getCanonicalFile().toString(); |
| 594 | + File f1 = new File("safe/file.txt"); |
| 595 | + File f2 = new File(f1, normalized); |
| 596 | + sink(f2); // Safe |
| 597 | + sink(source); // $ hasTaintFlow |
| 598 | + sink(normalized); // $ MISSING: hasTaintFlow |
| 599 | + } |
| 600 | + { |
| 601 | + String source = (String) source(); |
| 602 | + String normalized = Paths.get(source).normalize().toString(); |
| 603 | + File f1 = new File("safe/file.txt"); |
| 604 | + File f2 = new File(f1, normalized); |
| 605 | + sink(f2); // Safe |
| 606 | + sink(source); // $ hasTaintFlow |
| 607 | + sink(normalized); // $ MISSING: hasTaintFlow |
| 608 | + } |
| 609 | + } |
466 | 610 | }
|
0 commit comments