/* * Copyright (c) 2017 - present Facebook, Inc. * All rights reserved. * * This source code is licensed under the BSD style license found in the * LICENSE file in the root directory of this source tree. An additional grant * of patent rights can be found in the PATENTS file in the same directory. */ #include #include #include #include extern void __infer_sql_sink(std::string); extern std::string __infer_shell_sanitizer(std::string); extern std::string __infer_sql_sanitizer(std::string); extern void curl_easy_setopt(void*, int, ...); namespace facebook { namespace fb303 { namespace cpp2 { class FacebookServiceSvIf {}; class FacebookServiceSvAsyncIf {}; } // namespace cpp2 } // namespace fb303 } // namespace facebook namespace endpoints { struct request { std::string s; int i; }; class Service1 : facebook::fb303::cpp2::FacebookServiceSvIf { public: void service1_endpoint_bad(std::string formal) { // this should report REMOTE_CODE_EXECUTION_RISK system(formal.c_str()); } // this is specified as user-controlled in .inferconfig void user_controlled_endpoint_to_sql_bad(std::string formal) { // this should report SQL_INJECTION __infer_sql_sink(formal); } // this is specified as user-controlled in .inferconfig void user_controlled_endpoint_to_shell_bad(std::string formal) { // this should report SHELL_INJECTION system(formal.c_str()); } void unsanitized_sql_bad(std::string formal) { // this should report REMOTE_CODE_EXECUTION_RISK __infer_sql_sink(formal); } void sanitized_sql_with_shell_bad(std::string formal) { // this should report REMOTE_CODE_EXECUTION_RISK __infer_sql_sink(__infer_shell_sanitizer(formal)); } void service1_endpoint_sql_sanitized_bad(std::string formal) { // this should report USER_CONTROLLED_SQL_RISK __infer_sql_sink(__infer_sql_sanitizer(formal)); } void service1_endpoint_shell_sanitized_ok(std::string formal) { system(__infer_shell_sanitizer(formal).c_str()); } void service1_endpoint_struct_string_field_bad(request formal) { system(formal.s.c_str()); } void open_or_create_c_style_file_bad(const char* filename) { open(filename, 0); openat(1, filename, 2); creat(filename, 3); fopen(filename, "w"); freopen(filename, "w", nullptr); rename(filename, "mud"); } void ofstream_open_file_bad(std::string filename) { std::ofstream file1(filename); std::ofstream file2; file2.open(filename); } void ifstream_open_file_bad(std::string filename) { std::ifstream file1(filename); std::ifstream file2; file2.open(filename); } void fstream_open_file_bad(std::string filename) { std::fstream file1(filename); std::fstream file2; file2.open(filename); } const int CURLOPT_URL = 10002; void endpoint_to_curl_url_bad(request formal) { curl_easy_setopt(nullptr, CURLOPT_URL, formal.s.c_str()); } void endpoint_to_curl_url_exp_bad(request formal) { curl_easy_setopt(nullptr, 10000 + 2, formal.s.c_str()); } void endpoint_to_curl_url_unknown_exp_bad(request formal, int i) { curl_easy_setopt(nullptr, i + 17, formal.s.c_str()); } void endpoint_to_curl_other_const_ok(request formal) { curl_easy_setopt(nullptr, 0, formal.s.c_str()); } void endpoint_to_curl_other_exp_ok(request formal) { curl_easy_setopt(nullptr, 1 + 2, formal.s.c_str()); } void FP_service1_endpoint_struct_int_field_ok(request formal) { system(std::to_string(formal.i).c_str()); } void service_this_ok() { // endpoint object itself should not be treated as tainted system((const char*)this); } void service_return_param_ok(std::string& _return) { // dummy return object should not be treated as tainted system(_return.c_str()); } private: void private_not_endpoint_ok(std::string formal) { system(formal.c_str()); } }; class Service2 : facebook::fb303::cpp2::FacebookServiceSvAsyncIf { public: void service2_endpoint_bad(std::string formal) { // this should report REMOTE_CODE_EXECUTION_RISK system(formal.c_str()); } }; class Service3 : Service1 { public: void service3_endpoint_bad(std::string formal) { // this should report REMOTE_CODE_EXECUTION_RISK system(formal.c_str()); } }; } // namespace endpoints