Coverage Report

Created: 2025-08-28 09:57

/src/node/test/fuzzers/fuzz_x509.cc
Line
Count
Source
1
/*
2
 * A fuzzer focused on the node::LoadEnvironment() function.
3
 *
4
 * Code here has been inspired by the cctest test case.
5
 */
6
7
#include <stdlib.h>
8
#include "node.h"
9
#include "node_platform.h"
10
#include "node_internals.h"
11
#include "env-inl.h"
12
#include "util-inl.h"
13
#include "v8.h"
14
#include "libplatform/libplatform.h"
15
#include "aliased_buffer.h"
16
#include "fuzz_helper.h"
17
#include <fuzzer/FuzzedDataProvider.h>
18
#include <cstdio>
19
20
using node::AliasedBufferBase;
21
22
/* General set up */
23
using ArrayBufferUniquePtr = std::unique_ptr<node::ArrayBufferAllocator,
24
  decltype(&node::FreeArrayBufferAllocator)>;
25
using TracingAgentUniquePtr = std::unique_ptr<node::tracing::Agent>;
26
using NodePlatformUniquePtr = std::unique_ptr<node::NodePlatform>;
27
28
static TracingAgentUniquePtr tracing_agent;
29
static NodePlatformUniquePtr platform;
30
static uv_loop_t current_loop;
31
32
122k
extern "C" int LLVMFuzzerInitialize(int* argc, char*** argv) {
33
122k
  uv_os_unsetenv("NODE_OPTIONS");
34
122k
  std::vector<std::string> node_argv{ "fuzz_env" };
35
122k
  std::vector<std::string> exec_argv;
36
122k
  std::vector<std::string> errors;
37
38
122k
  node::InitializeNodeWithArgs(&node_argv, &exec_argv, &errors);
39
40
122k
  tracing_agent = std::make_unique<node::tracing::Agent>();
41
122k
  node::tracing::TraceEventHelper::SetAgent(tracing_agent.get());
42
122k
  node::tracing::TracingController* tracing_controller =
43
122k
    tracing_agent->GetTracingController();  
44
122k
  CHECK_EQ(0, uv_loop_init(&current_loop));
45
122k
  static constexpr int kV8ThreadPoolSize = 4;
46
122k
  platform.reset(
47
122k
    new node::NodePlatform(kV8ThreadPoolSize, tracing_controller));
48
122k
  v8::V8::InitializePlatform(platform.get());
49
122k
  cppgc::InitializeProcess(platform->GetPageAllocator());
50
122k
  v8::V8::Initialize();
51
122k
  return 0;
52
122k
}
53
54
class FuzzerFixtureHelper {
55
public:
56
  v8::Isolate* isolate_;
57
  ArrayBufferUniquePtr allocator;
58
59
  FuzzerFixtureHelper()
60
122k
    : allocator(ArrayBufferUniquePtr(node::CreateArrayBufferAllocator(),
61
122k
                                     &node::FreeArrayBufferAllocator)) {
62
122k
    isolate_ = NewIsolate(allocator.get(), &current_loop, platform.get());
63
122k
    CHECK_NOT_NULL(isolate_);
64
122k
    isolate_->Enter();
65
122k
  };
66
67
122k
  void Teardown() {
68
122k
    platform->DrainTasks(isolate_);
69
122k
    isolate_->Exit();
70
122k
    platform->UnregisterIsolate(isolate_);
71
122k
    isolate_->Dispose();
72
122k
    isolate_ = nullptr;
73
122k
  }
74
};
75
76
std::string S1 = 
77
  "const { X509Certificate } = require('node:crypto');\n"
78
  "const x509 = new X509Certificate(\"";
79
// RANDOM
80
std::string S2 = 
81
  "\");\n"
82
  "var _ = x509.subject;\n"
83
  "var _ = x509.ca;\n"
84
  "x509.checkEmail(\"";
85
//RANDOM
86
std::string S3 = 
87
  "\");\n"
88
  "x509.checkHost(\"";
89
//RANDOM
90
std::string S4 = 
91
  "\");\n"
92
  "x509.checkIP(\"";
93
//RANDOM
94
std::string S5 = 
95
  "\");\n"
96
  "var _ = x509.fingerprint;\n"
97
  "var _ = x509.fingerprint512;\n"
98
  "var _ = x509.infoAccess;\n"
99
  "var _ = x509.issuer;\n"
100
  "var _ = x509.issuerCertificate;\n"
101
  "var _ = x509.extKeyUsage;\n"
102
  "var _ = x509.raw;\n"
103
  "var _ = x509.serialNumber;\n"
104
  "var _ = x509.subject;\n"
105
  "var _ = x509.subjectAltName;\n"
106
  "var _ = x509.toJSON();\n"
107
  "var _ = x509.toLegacyObject();\n"
108
  "var _ = x509.toString();\n"
109
  "var _ = x509.validFrom;\n"
110
  "var _ = x509.validTo;\n"
111
  "var _ = x509.verify(x509.publicKey);\n";
112
113
105k
void EnvTest(v8::Isolate* isolate_, char* env_string) {
114
105k
  const v8::HandleScope handle_scope(isolate_);
115
105k
  Argv argv;
116
117
105k
  node::EnvironmentFlags::Flags flags = node::EnvironmentFlags::kDefaultFlags;
118
105k
  auto isolate = handle_scope.GetIsolate();
119
105k
  v8::Local<v8::Context> context_ = node::NewContext(isolate);
120
105k
  context_->Enter();
121
122
105k
  node::IsolateData* isolate_data_ = node::CreateIsolateData(isolate, &current_loop,
123
105k
                                                             platform.get());
124
105k
  std::vector<std::string> args(*argv, *argv + 1);
125
105k
  std::vector<std::string> exec_args(*argv, *argv + 1);
126
105k
  node::Environment* environment_ = node::CreateEnvironment(isolate_data_,
127
105k
                                          context_, args, exec_args, flags);
128
105k
  node::Environment* envi = environment_;
129
105k
  SetProcessExitHandler(envi, [&](node::Environment* env_, int exit_code) {
130
2.89k
    node::Stop(envi);
131
2.89k
  });
132
105k
  node::LoadEnvironment(envi, env_string);
133
134
  // Cleanup!
135
105k
  node::FreeEnvironment(environment_);
136
105k
  node::FreeIsolateData(isolate_data_);
137
105k
  context_->Exit();
138
105k
}
139
140
2.96k
extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data2, size_t size) {
141
2.96k
  FuzzedDataProvider prov(data2, size);
142
2.96k
  std::string r1 = prov.ConsumeRandomLengthString();
143
2.96k
  std::string r2 = prov.ConsumeRandomLengthString();
144
2.96k
  std::string r3 = prov.ConsumeRandomLengthString();
145
2.96k
  std::string r4 = prov.ConsumeRandomLengthString();
146
2.96k
  if (hasUnescapedDoubleQuotes(r1)) {
147
33
    return 0;
148
33
  }
149
2.92k
  if (hasUnescapedDoubleQuotes(r2)) {
150
19
    return 0;
151
19
  }
152
2.91k
  if (hasUnescapedDoubleQuotes(r3)) {
153
11
    return 0;
154
11
  }
155
2.89k
  if (hasUnescapedDoubleQuotes(r4)) {
156
7
    return 0;
157
7
  }
158
2.89k
  std::stringstream stream;
159
2.89k
  stream << S1 << r1 << S2 << r2 << S3 << r3 << S4 << r4 << S5 << std::endl;
160
2.89k
  std::string js_code = stream.str();
161
2.89k
  FuzzerFixtureHelper ffh;
162
2.89k
  EnvTest(ffh.isolate_, (char*)js_code.c_str());
163
2.89k
  ffh.Teardown();
164
2.89k
  return 0;
165
2.89k
}
166