-
Notifications
You must be signed in to change notification settings - Fork 142
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Analysis not finnishing #676
Comments
Hi @StamesJames, I could not reproduce your issue on my system. The analysis finishes very quickly, but does not find any vulnerabilities. I suppose, we are analyzing slightly different IR. Can you share the IR that you analyze? |
those are the files I tried to analysis with The |
@fabianbs96 have you also set the entry-points for the analysis? Because when I don't do this my analysis also ends very quick but rust has some indirection in the main call and if the entry points aren't set to the real main function phasar doesn't analysis the program properly |
Hi @StamesJames, now I can reproduce your issue, thanks. I will debug it and see, what we can do |
Bug description
I try to find a the unchecked passing of a path string in the rust webbrowser crate state here https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45299
for this I simply wrote the rust program
and tried to analysis this by ifds-taint with the following analysis-config.json
When I invoke a ifds-taint analysis with phasar-cli it seems to never stop runing
Steps to reproduce
maybe the mangled names for the main and the analysed functions differ when you compile it.
Actual result: The analysis seems to not finish
Expected result: the analysis should find, that the parameter that is passed to the webbrowser open function is given unchecked to the open_browser function
Context (Environment)
Operating System:
Build Type:
Example files
Files:
webbrowser-crate-vul.zip
The text was updated successfully, but these errors were encountered: