|
| 1 | +/** |
| 2 | + * Provides classes for working with concepts relating to the [github.com/elazarl/goproxy](https://pkg.go.dev/github.com/elazarl/goproxy) package. |
| 3 | + */ |
| 4 | + |
| 5 | +import go |
| 6 | + |
| 7 | +/** |
| 8 | + * Provides classes for working with concepts relating to the [github.com/elazarl/goproxy](https://pkg.go.dev/github.com/elazarl/goproxy) package. |
| 9 | + */ |
| 10 | +module ElazarlGoproxy { |
| 11 | + /** Gets the package name. */ |
| 12 | + bindingset[result] |
| 13 | + string packagePath() { result = package("github.com/elazarl/goproxy", "") } |
| 14 | + |
| 15 | + private class NewResponse extends HTTP::HeaderWrite::Range, DataFlow::CallNode { |
| 16 | + NewResponse() { this.getTarget().hasQualifiedName(packagePath(), "NewResponse") } |
| 17 | + |
| 18 | + override string getHeaderName() { this.definesHeader(result, _) } |
| 19 | + |
| 20 | + override string getHeaderValue() { this.definesHeader(_, result) } |
| 21 | + |
| 22 | + override DataFlow::Node getName() { none() } |
| 23 | + |
| 24 | + override DataFlow::Node getValue() { result = this.getArgument([1, 2]) } |
| 25 | + |
| 26 | + override predicate definesHeader(string header, string value) { |
| 27 | + header = "status" and value = this.getArgument(2).getIntValue().toString() |
| 28 | + or |
| 29 | + header = "content-type" and value = this.getArgument(1).getStringValue() |
| 30 | + } |
| 31 | + |
| 32 | + override HTTP::ResponseWriter getResponseWriter() { none() } |
| 33 | + } |
| 34 | + |
| 35 | + /** A body argument to a `NewResponse` call. */ |
| 36 | + private class NewResponseBody extends HTTP::ResponseBody::Range { |
| 37 | + NewResponse call; |
| 38 | + |
| 39 | + NewResponseBody() { this = call.getArgument(3) } |
| 40 | + |
| 41 | + override DataFlow::Node getAContentTypeNode() { result = call.getArgument(1) } |
| 42 | + |
| 43 | + override HTTP::ResponseWriter getResponseWriter() { none() } |
| 44 | + } |
| 45 | + |
| 46 | + private class TextResponse extends HTTP::HeaderWrite::Range, DataFlow::CallNode { |
| 47 | + TextResponse() { this.getTarget().hasQualifiedName(packagePath(), "TextResponse") } |
| 48 | + |
| 49 | + override string getHeaderName() { this.definesHeader(result, _) } |
| 50 | + |
| 51 | + override string getHeaderValue() { this.definesHeader(_, result) } |
| 52 | + |
| 53 | + override DataFlow::Node getName() { none() } |
| 54 | + |
| 55 | + override DataFlow::Node getValue() { none() } |
| 56 | + |
| 57 | + override predicate definesHeader(string header, string value) { |
| 58 | + header = "status" and value = "200" |
| 59 | + or |
| 60 | + header = "content-type" and value = "text/plain" |
| 61 | + } |
| 62 | + |
| 63 | + override HTTP::ResponseWriter getResponseWriter() { none() } |
| 64 | + } |
| 65 | + |
| 66 | + /** A body argument to a `TextResponse` call. */ |
| 67 | + private class TextResponseBody extends HTTP::ResponseBody::Range, TextResponse { |
| 68 | + TextResponse call; |
| 69 | + |
| 70 | + TextResponseBody() { this = call.getArgument(2) } |
| 71 | + |
| 72 | + override DataFlow::Node getAContentTypeNode() { result = call.getArgument(1) } |
| 73 | + |
| 74 | + override HTTP::ResponseWriter getResponseWriter() { none() } |
| 75 | + } |
| 76 | + |
| 77 | + /** A handler attached to a goproxy proxy type. */ |
| 78 | + private class ProxyHandler extends HTTP::RequestHandler::Range { |
| 79 | + DataFlow::MethodCallNode handlerReg; |
| 80 | + |
| 81 | + ProxyHandler() { |
| 82 | + handlerReg |
| 83 | + .getTarget() |
| 84 | + .hasQualifiedName(packagePath(), "ReqProxyConds", ["Do", "DoFunc", "HandleConnect"]) and |
| 85 | + this = handlerReg.getArgument(0) |
| 86 | + } |
| 87 | + |
| 88 | + override predicate guardedBy(DataFlow::Node check) { |
| 89 | + // note OnResponse is not modeled, as that server responses are not currently considered untrusted input |
| 90 | + exists(DataFlow::MethodCallNode onreqcall | |
| 91 | + onreqcall.getTarget().hasQualifiedName(packagePath(), "ProxyHttpServer", "OnRequest") |
| 92 | + | |
| 93 | + handlerReg.getReceiver() = onreqcall.getASuccessor*() and |
| 94 | + check = onreqcall.getArgument(0) |
| 95 | + ) |
| 96 | + } |
| 97 | + } |
| 98 | + |
| 99 | + private class UserControlledRequestData extends UntrustedFlowSource::Range { |
| 100 | + UserControlledRequestData() { |
| 101 | + exists(DataFlow::FieldReadNode frn | this = frn | |
| 102 | + // liberally consider ProxyCtx.UserData to be untrusted; it's a data field set by a request handler |
| 103 | + frn.getField().hasQualifiedName(packagePath(), "ProxyCtx", "UserData") |
| 104 | + ) |
| 105 | + or |
| 106 | + exists(DataFlow::MethodCallNode call | this = call | |
| 107 | + call.getTarget().hasQualifiedName(packagePath(), "ProxyCtx", "Charset") |
| 108 | + ) |
| 109 | + } |
| 110 | + } |
| 111 | + |
| 112 | + private class ProxyLog extends LoggerCall::Range, DataFlow::MethodCallNode { |
| 113 | + ProxyLog() { this.getTarget().hasQualifiedName(packagePath(), "ProxyCtx", ["Logf", "Warnf"]) } |
| 114 | + |
| 115 | + override DataFlow::Node getAMessageComponent() { result = this.getAnArgument() } |
| 116 | + } |
| 117 | + |
| 118 | + private class MethodModels extends TaintTracking::FunctionModel, Method { |
| 119 | + FunctionInput inp; |
| 120 | + FunctionOutput outp; |
| 121 | + |
| 122 | + MethodModels() { |
| 123 | + // Methods: |
| 124 | + // signature: func CertStorage.Fetch(hostname string, gen func() (*tls.Certificate, error)) (*tls.Certificate, error) |
| 125 | + // |
| 126 | + // `hostname` excluded because if the cert storage or generator function themselves have not |
| 127 | + // been tainted, `hostname` would be unlikely to fetch user-controlled data |
| 128 | + this.hasQualifiedName(packagePath(), "CertStorage", "Fetch") and |
| 129 | + (inp.isReceiver() or inp.isParameter(1)) and |
| 130 | + outp.isResult(0) |
| 131 | + } |
| 132 | + |
| 133 | + override predicate hasTaintFlow(FunctionInput i, FunctionOutput o) { i = inp and o = outp } |
| 134 | + } |
| 135 | +} |
0 commit comments