File: mime_sniffer_fuzzer.cc

package info (click to toggle)
chromium 139.0.7258.127-1
  • links: PTS, VCS
  • area: main
  • in suites:
  • size: 6,122,068 kB
  • sloc: cpp: 35,100,771; ansic: 7,163,530; javascript: 4,103,002; python: 1,436,920; asm: 946,517; xml: 746,709; pascal: 187,653; perl: 88,691; sh: 88,436; objc: 79,953; sql: 51,488; cs: 44,583; fortran: 24,137; makefile: 22,147; tcl: 15,277; php: 13,980; yacc: 8,984; ruby: 7,485; awk: 3,720; lisp: 3,096; lex: 1,327; ada: 727; jsp: 228; sed: 36
file content (53 lines) | stat: -rw-r--r-- 2,123 bytes parent folder | download | duplicates (11)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
// Copyright 2016 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.

#include "net/base/mime_sniffer.h"

#include <stddef.h>

#include <string>

#include <fuzzer/FuzzedDataProvider.h>

#include "url/gurl.h"

// Fuzzer for the two main mime sniffing functions:
// SniffMimeType and SniffMimeTypeFromLocalData.
extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) {
  // net::SniffMimeType DCHECKs if passed an input buffer that's too large,
  // since it's meant to be used only on the first chunk of a file that's being
  // fed into a stream. Set a max size of the input to avoid running into that
  // DCHECK.  Use 64k because that's twice the size of a typical read attempt.
  constexpr size_t kMaxSniffLength = 64 * 1024;
  static_assert(kMaxSniffLength >= net::kMaxBytesToSniff,
                "kMaxSniffLength is too small.");

  FuzzedDataProvider data_provider(data, size);

  // Divide up the input.  It's important not to pass |url_string| to the GURL
  // constructor until after the length check, to prevent the fuzzer from
  // exploring GURL space with invalid inputs.
  //
  // Max lengths of URL and type hint are arbitrary.
  std::string url_string = data_provider.ConsumeRandomLengthString(4 * 1024);
  std::string mime_type_hint = data_provider.ConsumeRandomLengthString(1024);
  net::ForceSniffFileUrlsForHtml force_sniff_file_urls_for_html =
      data_provider.ConsumeBool() ? net::ForceSniffFileUrlsForHtml::kDisabled
                                  : net::ForceSniffFileUrlsForHtml::kEnabled;

  // Do nothing if remaining input is too long. An early exit prevents the
  // fuzzer from exploring needlessly long inputs with interesting prefixes.
  if (data_provider.remaining_bytes() > kMaxSniffLength)
    return 0;

  std::string input = data_provider.ConsumeRemainingBytesAsString();

  std::string result;
  net::SniffMimeType(input, GURL(url_string), mime_type_hint,
                     force_sniff_file_urls_for_html, &result);

  net::SniffMimeTypeFromLocalData(input, &result);

  return 0;
}