Add read fuzzing module

As someone who has personal projects that take untrusted zips as input,
it is important to me to be able to fuzz the zip project to simulate
possible inputs and to ensure the projects are not vulnerable.

This commit adds a cargo fuzz module for reading and extracting input.

The `fuzz` directory was scaffolded with a `cargo fuzz init`

I added a CI step to guard against the fuzz module decaying over time.
This commit is contained in:
Nick Babcock 2022-04-25 07:00:27 -05:00
parent 7f424a7ffe
commit b7966a8538
5 changed files with 85 additions and 0 deletions

View file

@ -74,3 +74,19 @@ jobs:
- name: Docs
run: cargo doc
fuzz:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v2
- uses: actions-rs/toolchain@v1
with:
profile: minimal
toolchain: nightly
override: true
- run: cargo install cargo-fuzz
- name: compile fuzz
run: |
cargo fuzz build fuzz_read

View file

@ -75,3 +75,24 @@ See the [examples directory](examples) for:
* How to extract a zip file.
* How to extract a single file from a zip.
* How to read a zip from the standard input.
Fuzzing
-------
Fuzzing support is through [cargo fuzz](https://github.com/rust-fuzz/cargo-fuzz). To install cargo fuzz:
```bash
cargo install cargo-fuzz
```
To list fuzz targets:
```bash
cargo +nightly fuzz list
```
To start fuzzing zip extraction:
```bash
cargo +nightly fuzz run fuzz_read
```

3
fuzz/.gitignore vendored Normal file
View file

@ -0,0 +1,3 @@
target
corpus
artifacts

25
fuzz/Cargo.toml Normal file
View file

@ -0,0 +1,25 @@
[package]
name = "zip-fuzz"
version = "0.0.0"
authors = ["Automatically generated"]
publish = false
edition = "2018"
[package.metadata]
cargo-fuzz = true
[dependencies]
libfuzzer-sys = "0.4"
[dependencies.zip]
path = ".."
# Prevent this from interfering with workspaces
[workspace]
members = ["."]
[[bin]]
name = "fuzz_read"
path = "fuzz_targets/fuzz_read.rs"
test = false
doc = false

View file

@ -0,0 +1,20 @@
#![no_main]
use libfuzzer_sys::fuzz_target;
fn decompress_all(data: &[u8]) -> Result<(), Box<dyn std::error::Error>> {
let reader = std::io::Cursor::new(data);
let mut zip = zip::ZipArchive::new(reader)?;
for i in 0..zip.len() {
let mut file = zip.by_index(i)?;
if file.size() < 1 << 20 {
let _ = std::io::copy(&mut file, &mut std::io::sink());
}
}
Ok(())
}
fuzz_target!(|data: &[u8]| {
let _ = decompress_all(data);
});