Skip to content

Commit 21f1858

Browse files
committed
parser: skip BOM at the beginning of input
1 parent 43ae09a commit 21f1858

7 files changed

+10673
-7
lines changed

src/lib/instream.cc

+21-5
Original file line numberDiff line numberDiff line change
@@ -57,21 +57,37 @@ void InStream::handleError(const std::string &msg, const unsigned long line)
5757
InStreamLookAhead::InStreamLookAhead(
5858
InStream &input,
5959
const unsigned size,
60+
const bool skipBOM,
6061
bool skipWhiteSpaces)
6162
{
6263
std::istream &inStr = input.str();
6364

64-
// read `size` chars from input
65-
while (buf_.size() < size) {
66-
const int c = inStr.get();
67-
if (skipWhiteSpaces && isspace(c) && !!inStr)
65+
int c = inStr.get();
66+
if (skipBOM
67+
// try to read BOM ... [0xEF, 0xBB, 0xBF]
68+
&& (0xEF == c)
69+
&& (0xBB == (c = inStr.get()))
70+
&& (0xBF == (c = inStr.get())))
71+
// BOM successfully read -> read the next char
72+
c = inStr.get();
73+
74+
// read chars from input
75+
for (;;) {
76+
if (skipWhiteSpaces && isspace(c))
6877
// skip a white-space
69-
continue;
78+
goto next;
7079

7180
// only the leading white-spaces are skipped
7281
skipWhiteSpaces = false;
7382

83+
// append one char to the buffer
7484
buf_.push_back(c);
85+
if (size <= buf_.size())
86+
// the requested number of chars have been read
87+
break;
88+
next:
89+
// read the next char
90+
c = inStr.get();
7591
}
7692

7793
// put the chars back to the input stream

src/lib/instream.hh

+2-1
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,8 @@ class InStreamLookAhead {
6262
InStreamLookAhead(
6363
InStream &input,
6464
unsigned size,
65-
bool skipWhiteSpaces = false);
65+
bool skipBOM,
66+
bool skipWhiteSpaces);
6667

6768
char operator[](const unsigned idx) const {
6869
return buf_.at(idx);

src/lib/parser.cc

+3-1
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,9 @@ static inline std::unique_ptr<T> make_unique(InStream &input) {
3434
AbstractParserPtr createParser(InStream &input)
3535
{
3636
// skip all white-spaces and sniff the first two chars from the input
37-
InStreamLookAhead head(input, 2U, /* skipWhiteSpaces */ true);
37+
InStreamLookAhead head(input, 2U,
38+
/* skipBOM */ true,
39+
/* skipWhiteSpaces */ true);
3840

3941
switch (head[0]) {
4042
case '{':
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
--mode=json

tests/csgrep/0125-sarif-parser-bom-stdin.txt

+10,604
Large diffs are not rendered by default.
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,41 @@
1+
Error: SNYK_CODE_WARNING (CWE-290):
2+
vendor/krb5-src/krb5/src/lib/krb5/krb/t_princ.c:381:26: note[cpp/WeakGuard]: An hardcoded domain name is compared in strcmp. This check could lead to a bypass since the domain name can be spoofed or controlled by an attacker.
3+
4+
Error: SNYK_CODE_WARNING (CWE-290):
5+
vendor/krb5-src/krb5/src/wconfig.c:140:21: note[cpp/WeakGuard]: An hardcoded domain name is compared in strcmp. This check could lead to a bypass since the domain name can be spoofed or controlled by an attacker.
6+
7+
Error: SNYK_CODE_WARNING (CWE-290):
8+
vendor/krb5-src/krb5/src/wconfig.c:145:21: note[cpp/WeakGuard]: An hardcoded domain name is compared in strcmp. This check could lead to a bypass since the domain name can be spoofed or controlled by an attacker.
9+
10+
Error: SNYK_CODE_WARNING (CWE-190):
11+
vendor/sasl2-sys/sasl2/utils/smtptest.c:360:3: note[cpp/IntegerOverflow/test]: Unsanitized input from a file flows into an addition operator (+), where it is used in integer arithmetic. This may result in an integer overflow vulnerability.
12+
13+
Error: SNYK_CODE_WARNING (CWE-190):
14+
vendor/krb5-src/krb5/src/tests/asn.1/trval.c:161:19: note[cpp/IntegerOverflow/test]: Unsanitized input from a file flows into an addition operator (+), where it is used in integer arithmetic. This may result in an integer overflow vulnerability.
15+
16+
Error: SNYK_CODE_WARNING (CWE-190):
17+
vendor/krb5-src/krb5/src/tests/asn.1/trval.c:161:30: note[cpp/IntegerOverflow/test]: Unsanitized input from a file flows into an addition operator (+), where it is used in integer arithmetic. This may result in an integer overflow vulnerability.
18+
19+
Error: SNYK_CODE_WARNING (CWE-190):
20+
vendor/rdkafka-sys/librdkafka/tests/0098-consumer-txn.cpp:307:35: note[cpp/IntegerOverflow/test]: Unsanitized input from a file flows into an addition operator (+), where it is used in integer arithmetic. This may result in an integer overflow vulnerability.
21+
22+
Error: SNYK_CODE_WARNING (CWE-190):
23+
vendor/rdkafka-sys/librdkafka/tests/0098-consumer-txn.cpp:444:7: note[cpp/IntegerOverflow/test]: Unsanitized input from a file flows into an addition operator (+), where it is used in integer arithmetic. This may result in an integer overflow vulnerability.
24+
25+
Error: SNYK_CODE_WARNING (CWE-190):
26+
vendor/lz4-sys/liblz4/tests/abiTest.c:81:27: note[cpp/IntegerOverflow/test]: Unsanitized input from a file flows into a subtraction operator (-), where it is used in integer arithmetic. This may result in an integer overflow vulnerability.
27+
28+
Error: SNYK_CODE_WARNING (CWE-190):
29+
vendor/krb5-src/krb5/src/tests/asn.1/trval.c:126:17: note[cpp/IntegerOverflow/test]: Unsanitized input from a file flows into a subtraction operator (-), where it is used in integer arithmetic. This may result in an integer overflow vulnerability.
30+
31+
Error: SNYK_CODE_WARNING (CWE-190):
32+
vendor/krb5-src/krb5/src/tests/asn.1/trval.c:128:17: note[cpp/IntegerOverflow/test]: Unsanitized input from a file flows into a subtraction operator (-), where it is used in integer arithmetic. This may result in an integer overflow vulnerability.
33+
34+
Error: SNYK_CODE_WARNING (CWE-190):
35+
vendor/krb5-src/krb5/src/tests/asn.1/trval.c:130:17: note[cpp/IntegerOverflow/test]: Unsanitized input from a file flows into a subtraction operator (-), where it is used in integer arithmetic. This may result in an integer overflow vulnerability.
36+
37+
Error: SNYK_CODE_WARNING (CWE-190):
38+
vendor/openssl-src/openssl/test/confdump.c:37:25: note[cpp/IntegerOverflow/test]: Unsanitized input from a command line argument flows into a subtraction operator (-), where it is used in integer arithmetic. This may result in an integer overflow vulnerability.
39+
40+
Error: SNYK_CODE_WARNING (CWE-190):
41+
vendor/lz4-sys/liblz4/tests/fuzzer.c:378:95: note[cpp/IntegerOverflow/test]: Unsanitized input from a command line argument flows into a subtraction operator (-), where it is used in integer arithmetic. This may result in an integer overflow vulnerability.

tests/csgrep/CMakeLists.txt

+1
Original file line numberDiff line numberDiff line change
@@ -168,3 +168,4 @@ test_csgrep("0121-cov-parser-lock-evasion" )
168168
test_csgrep("0122-json-parser-cov-v10-column" )
169169
test_csgrep("0123-csgrep-hash-v1" )
170170
test_csgrep("0124-sarif-writer-imp" )
171+
test_csgrep("0125-sarif-parser-bom" )

0 commit comments

Comments
 (0)