Home

Awesome

<p align="center"> <h3 align="center"><b>FuzzPM</b></h3> <p align="center">Differential Fuzzing for Perl Modules</p> <p align="center"> <a href="https://github.com/htrgouvea/fuzzpm/blob/master/LICENSE.md"> <img src="https://img.shields.io/badge/license-MIT-blue.svg"> </a> <a href="https://github.com/htrgouvea/fuzzpm/releases"> <img src="https://img.shields.io/badge/version-0.0.4-blue.svg"> </a> <br/> <img src="https://github.com/htrgouvea/fuzzpm/actions/workflows/linter.yml/badge.svg"> <img src="https://github.com/htrgouvea/fuzzpm/actions/workflows/zarn.yml/badge.svg"> <img src="https://github.com/htrgouvea/fuzzpm/actions/workflows/security-gate.yml/badge.svg"> <img src="https://github.com/htrgouvea/fuzzpm/actions/workflows/test-on-ubuntu.yml/badge.svg"> </p> </p>

Summary

This project aims to demonstrate how we can use the differential fuzzing technique to conduct security analysis in an automated and large-scale way to find security issues in modern components used by applications developed in Perl. Full publication is avaible on: https://heitorgouvea.me/2021/12/08/Differential-Fuzzing-Perl-Libs.


Download and install

# Download
$ git clone https://github.com/htrgouvea/fuzzpm && cd fuzzpm

# Install libs and dependencies
$ cpanm --installdeps .

How it works

Differential fuzzing is an approach where we have our seeds being sent to two or more inputs, where they are consumed and should produce the same output. At the end of the test these outputs are compared, in case of divergence the fuzzer will signal a possible failure [[1]].(https://en.wikipedia.org/wiki/Differential_testing)

So basically we have 3 components:

Here is a introduction about how you can create your own targets, seeds and test cases.

To create your entire fuzzing case, you first need to create your target library as a package, for example:

package Mojo_URI {
    use strict;
    use warnings;
    use Try::Tiny;
    use Mojo::URL;

    sub new {
        my ($self, $payload) = @_;

        try {
            my $url = Mojo::URL -> new($payload);
            
            return $url -> host;
        }

        catch {
            return undef;
        }
    }
}

Store at: ./targets/your-taget-name.pm.

So, you need store your seeds as a file at: ./seeds/your-seeds.txt. And the last part is your case as a YAML file, follow this structure:

test:
    seeds:
        - path/to/seeds-file.txt
    libs:
        - First_Target
        - Second_Target
        - Third_Target

For example, for our first case, the following YAML file was constructed and is supplied to the fuzzer via the parameter “--case”:

test:
    seeds:
        - seeds/urls-radamsa.txt
    libs:
        - Mojo_URI
        - Tiny_HTTP
        - Mojo_UA
        - Mechanize
        - Lib_Furl
        - Simple_URI

Fuzzing

$ perl fuzzpm.pl --case cases/json-decode.yml
$ perl fuzzpm.pl --case cases/parsing-url.yml

Docker container

$ docker build -t fuzzpm .
$ docker run -ti --rm fuzzpm --help

Contribution

Your contributions and suggestions are heartily ♥ welcome. See here the contribution guidelines. Please, report bugs via issues page and for security issues, see here the security policy. (✿ ◕‿◕)


License

This work is licensed under MIT License.