contentauth / c2pa-attacks

Content Authenticity Security Tool
Apache License 2.0
5 stars 4 forks source link

Support attacking basic structural binary formats (JUMBF, CBOR) used in c2pa manifests #37

Open samuelwenker opened 1 year ago

samuelwenker commented 1 year ago

Both JUMBF and CBOR have numerous binary formatting requirements that could result in buffer overruns if malicious values are set and a memory-unsafe parser is used without appropriate checks.

A couple very simple examples:

As such, attack manifests that have malicious values for these types of things should be included in any security test suite.

puhley commented 1 year ago

I currently have a simple fuzzer written for the c2pa-rs project. I haven't published it yet because I am still conducting some experiments. Although, that fuzzer is also specific to the c2pa-rs SDK. Since the c2pa-rs library won't be used by everyone within the c2pa community, there is also a need for a more generalized approach to fuzzing C2PA implementations.

My current plan is to publish guidance and some supporting files within this project for taking an existing open-source fuzzer and applying it to generic C2PA implementations. This would have the following advantages:

Although, I am open to discussion if you have additional ideas on how to support people seeking to do binary fuzzing.