Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/uber-archive/focuson
A tool to surface security issues in python code
https://github.com/uber-archive/focuson
Last synced: 22 days ago
JSON representation
A tool to surface security issues in python code
- Host: GitHub
- URL: https://github.com/uber-archive/focuson
- Owner: uber-archive
- License: mit
- Archived: true
- Created: 2017-02-03T12:41:32.000Z (almost 8 years ago)
- Default Branch: master
- Last Pushed: 2017-04-20T15:54:40.000Z (over 7 years ago)
- Last Synced: 2024-10-29T16:58:29.211Z (about 1 month ago)
- Language: Python
- Homepage:
- Size: 172 KB
- Stars: 226
- Watchers: 1,793
- Forks: 29
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-hacking-lists - uber-archive/focuson - A tool to surface security issues in python code (Python)
README
## Overview
Focuson is an experimental tool to find security bugs in flask-based python
web applications. It will emit a list of places for a security engineer to
investigate with a reasonable signal to noise ratio on account of using
dataflow analysis.It will require manual effort to find bugs in your environment but has been
used to regularly find bugs by the Uber product security team in its
current state.It uses dataflow analysis to model security flaws like xss as instances
of a source (user input) flowing to a sink (dangerous function).While mostly useful primarily for flask + jinja apps it can be extended to
include other frameworks. Focuson will be most useful not as a tool to be run
once but a framework upon which to build your own set of security rules
applicable to your codebase.Uber now uses focuson to automatically to surface probable security issues
to the security team or, given high confidence, back to the engineer that wrote
the issue.## Background
Focuson was started as an experiment to find XSS in flask + jinja web
applications at Uber. It ended up being useful so we have extended it a
bit over time but it is still very raw.Focuson is a path-insensitive, inter-functional dataflow analysis engine.
Path-insensitive = ignores the control flow (if/then/else/etc)
inter-functional = "tracks" variables across functions, not just within
dataflow analysis = "follows" variables through assignments, function calls,etcFocuson works by parsing the program into an abstract syntax tree, constructing
call and dataflow graphs then traversing them. This all ultimately rests on being
able to predict ahead of time how the program runs, which we know is
undecidable so focuson, and any program analysis tool, is best considered a
collection of approximations to mine insight into how the program will execute.The expectation is focuson will show you areas a security engineer should
investigate more deeply with a good signal to noise rationFocuson runs quickly, in testing taking ~15 sec for 100kb of python.
## Installation
1. cd focuson
2. virtualenv venv
3. source venv/bin/activate
4. pip install -r requirements.txt
5. python focuson.py## Usage
1. source venv/bin/activate
2. python focuson.py## Output
The output from focuson isn't exactly intuitive but follows the format of$variablename -> [optional number of functions] -> sink-y area of code
$variablename is straightforward
The middle part is meant to show all the functions through which the tainted
variable passes en route to the sink.The final section is the part of the code where the chain of taintedness ends.
Example: mobileapp::fourth
This means in mobileapp.py, in the function fourth() exists a sink that
focuson believes constitutes a vulnerability.For many more examples of output see the test directory and print out the
variables being asserted.## Examples
Worlds simplest RCE in python:
```
eval(request.args.get("foo"))
```More complex
```
foo = request.args.get("foo")
eval(foo)
```More complex
```
foo = request.args.get("foo")
bar = foo
eval(bar)
```Yet more complex:
```
def func1(arg1):
eval(arg1)
foo = request.args.get("foo")
bar = foo
func1(bar)
```A good sized example is to run
```
python focuson.py tests/simple_4_hop/
$android_deep_link -> ['first_layer', 'second', 'third', 'fourth'] to second() in mobile_app::fourth
```
The output here designates that the variable $android_deep_link is user-controlled and flows through those 4 functions on its path to the function second() which contains a vulnerable sink that absorbs what began as $android_deep_link which constitutes a potential vulnerability.## How to make focuson useful
Focuson is customized for Uber's codebase.To make it useful you will need to identify a relevant set of sources and sinks
for your codebase. Some of these are globally true and already built-in,
like eval() as a sink for RCE.If you dont use flask you will need to determine how to model what
user-controlled input looks like for your codebase and add it as a sourceYou will need to do the same for sinks.
## Improvements
Lots of additional good work to be done.
- Adding additional sources and sinks
- Refactoring sink() idea to generalized rule()
- Make output less cryptic
- Add support for web frameworks beyond flask## Inspiration
* https://github.com/facebook/pfff
* http://www.mlsec.org/joern/
* https://github.com/openstack/bandit
* http://simpsons.wikia.com/wiki/Focusyn