diff --git a/.gitattributes b/.gitattributes index b0432f403d9a9ae4f43178a87ae1a3c4dd6d46b7..ec58867e88085439c4d90657b67106e11395ada5 100644 --- a/.gitattributes +++ b/.gitattributes @@ -287,3 +287,38 @@ local-test-tika-delta-02/afc-tika/tika-parsers/tika-parsers-extended/tika-parser local-test-tika-delta-02/afc-tika/tika-parsers/tika-parsers-extended/tika-parser-scientific-module/src/test/resources/test-documents/gdas1.forecmwf.2014062612.grib2 filter=lfs diff=lfs merge=lfs -text local-test-tika-delta-02/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-code-module/src/test/resources/test-documents/test-columnar.sas7bdat filter=lfs diff=lfs merge=lfs -text local-test-tika-delta-02/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-code-module/src/test/resources/test-documents/testLinux-ppc-32be filter=lfs diff=lfs merge=lfs -text +local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testsolidworksDrawing2013SP2.SLDDRW filter=lfs diff=lfs merge=lfs -text +local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testAccess2_2000.mdb filter=lfs diff=lfs merge=lfs -text +local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testWPSAttachment.ppt filter=lfs diff=lfs merge=lfs -text +local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/test_text.xps filter=lfs diff=lfs merge=lfs -text +local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testWPSAttachment.xlsx filter=lfs diff=lfs merge=lfs -text +local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testAccess2_encrypted.accdb filter=lfs diff=lfs merge=lfs -text +local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testPPT_autodate.ppt filter=lfs diff=lfs merge=lfs -text +local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testChm.chm filter=lfs diff=lfs merge=lfs -text +local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/jxl.xls filter=lfs diff=lfs merge=lfs -text +local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testWORD_2006ml.docx filter=lfs diff=lfs merge=lfs -text +local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testPPT_masterFooter.ppt filter=lfs diff=lfs merge=lfs -text +local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testsolidworksPart2013SP2.SLDPRT filter=lfs diff=lfs merge=lfs -text +local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testChm2.chm filter=lfs diff=lfs merge=lfs -text +local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testsolidworksAssembly2014SP0.SLDASM filter=lfs diff=lfs merge=lfs -text +local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testAccess2.accdb filter=lfs diff=lfs merge=lfs -text +local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testPROJECT2003.mpp filter=lfs diff=lfs merge=lfs -text +local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testPPT_masterText.ppt filter=lfs diff=lfs merge=lfs -text +local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-crypto-module/src/test/resources/test-documents/Test4.pdf.tsd filter=lfs diff=lfs merge=lfs -text +local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-apple-module/src/test/resources/test-documents/testNumbers2013.numbers filter=lfs diff=lfs merge=lfs -text +local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-apple-module/src/test/resources/test-documents/testPagesHeadersFootersFootnotes.pages filter=lfs diff=lfs merge=lfs -text +local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testEXCEL_embeded.xlsx filter=lfs diff=lfs merge=lfs -text +local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testPPT_2imgs.ppt filter=lfs diff=lfs merge=lfs -text +local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testDocumentLink.doc filter=lfs diff=lfs merge=lfs -text +local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testWORD_embeded.docx filter=lfs diff=lfs merge=lfs -text +local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testPPT_embeded.ppt filter=lfs diff=lfs merge=lfs -text +local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testPPT_masterText2.ppt filter=lfs diff=lfs merge=lfs -text +local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testsolidworksDrawing2014SP0.SLDDRW filter=lfs diff=lfs merge=lfs -text +local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testPPT_embedded_two_slides.pptx filter=lfs diff=lfs merge=lfs -text +local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testWPSAttachment.docx filter=lfs diff=lfs merge=lfs -text +local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testWPSAttachment.pptx filter=lfs diff=lfs merge=lfs -text +local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testComment.ppt filter=lfs diff=lfs merge=lfs -text +local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testPPT_EmbeddedPDF.pptx filter=lfs diff=lfs merge=lfs -text +local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testOneNote1.one filter=lfs diff=lfs merge=lfs -text +local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testWORD_2006ml.doc filter=lfs diff=lfs merge=lfs -text +local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/EmbeddedOutlook.docx filter=lfs diff=lfs merge=lfs -text diff --git a/local-test-tika-delta-02/fuzz-tooling/docs/images/artifacts.png b/local-test-tika-delta-02/fuzz-tooling/docs/images/artifacts.png new file mode 100644 index 0000000000000000000000000000000000000000..711e5878eef5d3679fce6f188981d38222e3ceff --- /dev/null +++ b/local-test-tika-delta-02/fuzz-tooling/docs/images/artifacts.png @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:4403a56cd762e4883e65665c58b5f7d5834fa5128c511c5b60a12a6a7facda3d +size 243893 diff --git a/local-test-tika-delta-02/fuzz-tooling/docs/images/corpus_path.png b/local-test-tika-delta-02/fuzz-tooling/docs/images/corpus_path.png new file mode 100644 index 0000000000000000000000000000000000000000..318289768b7d811e5c283d78d87f9f0c8dca8b23 --- /dev/null +++ b/local-test-tika-delta-02/fuzz-tooling/docs/images/corpus_path.png @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:a75e2bc1358f510868b5466226d046e8861da44ed3a5cf20ecc189ec33804b09 +size 65813 diff --git a/local-test-tika-delta-02/fuzz-tooling/docs/images/crash_stats.png b/local-test-tika-delta-02/fuzz-tooling/docs/images/crash_stats.png new file mode 100644 index 0000000000000000000000000000000000000000..f07dec1520736a8b0e811369bc987e3039cfb35b --- /dev/null +++ b/local-test-tika-delta-02/fuzz-tooling/docs/images/crash_stats.png @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:71efe8feccfd2982289b69e966c191ad89673a8955d5747d41516044df9f79d4 +size 88864 diff --git a/local-test-tika-delta-02/fuzz-tooling/docs/images/expat_performance_analyzer.png b/local-test-tika-delta-02/fuzz-tooling/docs/images/expat_performance_analyzer.png new file mode 100644 index 0000000000000000000000000000000000000000..c6d3763d16704c2a12372b1acbd77d7154253e52 --- /dev/null +++ b/local-test-tika-delta-02/fuzz-tooling/docs/images/expat_performance_analyzer.png @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:e361c7a0e49c26e9b8749abfeca875d7a7d92b16e3f5906899659e23c14d0756 +size 41825 diff --git a/local-test-tika-delta-02/fuzz-tooling/docs/images/freetype_stats_graphs.png b/local-test-tika-delta-02/fuzz-tooling/docs/images/freetype_stats_graphs.png new file mode 100644 index 0000000000000000000000000000000000000000..f135064f6d78befabce9e77e72523cc2761e33fb --- /dev/null +++ b/local-test-tika-delta-02/fuzz-tooling/docs/images/freetype_stats_graphs.png @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:63e47db4d9faed947f196d69e91c03860c6b7b97f4ca166a3cb5ecac7edfeade +size 424598 diff --git a/local-test-tika-delta-02/fuzz-tooling/docs/images/freetype_stats_table.png b/local-test-tika-delta-02/fuzz-tooling/docs/images/freetype_stats_table.png new file mode 100644 index 0000000000000000000000000000000000000000..e6c49d48f138c9967212eb1075ae310c30cce3bd --- /dev/null +++ b/local-test-tika-delta-02/fuzz-tooling/docs/images/freetype_stats_table.png @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:21cd51a7651f4f4425cb5bdb10761d7450d187c9ebb544da39271c221143a89c +size 51686 diff --git a/local-test-tika-delta-02/fuzz-tooling/docs/images/process.png b/local-test-tika-delta-02/fuzz-tooling/docs/images/process.png new file mode 100644 index 0000000000000000000000000000000000000000..06308a98bc0554e98acc584fab727178d1740749 --- /dev/null +++ b/local-test-tika-delta-02/fuzz-tooling/docs/images/process.png @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:cb982e31d005e1559e46185925c72454748be923ba4cdcf01b7b33fe7db01716 +size 135112 diff --git a/local-test-tika-delta-02/fuzz-tooling/docs/images/run_fuzzers.png b/local-test-tika-delta-02/fuzz-tooling/docs/images/run_fuzzers.png new file mode 100644 index 0000000000000000000000000000000000000000..4fe5dac98c0dec3739fde653abe1a2f7ab7d157e --- /dev/null +++ b/local-test-tika-delta-02/fuzz-tooling/docs/images/run_fuzzers.png @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:bedd896eeb6ae7dab276e25bbc83e8123c4e95b2baff74448f5f70f4fc587dee +size 269435 diff --git a/local-test-tika-delta-02/fuzz-tooling/docs/images/tinyxml2_examples.png b/local-test-tika-delta-02/fuzz-tooling/docs/images/tinyxml2_examples.png new file mode 100644 index 0000000000000000000000000000000000000000..8ef846244c638e48b03af72ec51b791be1d4c253 --- /dev/null +++ b/local-test-tika-delta-02/fuzz-tooling/docs/images/tinyxml2_examples.png @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:4685b847be71c3bd8748f6da170543643152a9c215b95dbd3e1836737c676e26 +size 291368 diff --git a/local-test-tika-delta-02/fuzz-tooling/docs/images/viewing_corpus.png b/local-test-tika-delta-02/fuzz-tooling/docs/images/viewing_corpus.png new file mode 100644 index 0000000000000000000000000000000000000000..ef7ee507d4471bb5380b1f1ae00f1cfe36fd118b --- /dev/null +++ b/local-test-tika-delta-02/fuzz-tooling/docs/images/viewing_corpus.png @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:5f816eede78482e56dd9f2a78834fb5f29bde761420fd6cf47ddb66970c61c18 +size 43612 diff --git a/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-apple-module/src/test/resources/test-documents/testNumbers2013.numbers b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-apple-module/src/test/resources/test-documents/testNumbers2013.numbers new file mode 100644 index 0000000000000000000000000000000000000000..10fd20ed857fa29b317fdb5fe07476c181b15e76 --- /dev/null +++ b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-apple-module/src/test/resources/test-documents/testNumbers2013.numbers @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:74a834857c02d06dbc399aff8ba475f7708092e42501cc665d7fa489f385831f +size 179147 diff --git a/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-apple-module/src/test/resources/test-documents/testPagesHeadersFootersFootnotes.pages b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-apple-module/src/test/resources/test-documents/testPagesHeadersFootersFootnotes.pages new file mode 100644 index 0000000000000000000000000000000000000000..d57dab21be2be4cb8f737ed5d7eed77e3986e19e --- /dev/null +++ b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-apple-module/src/test/resources/test-documents/testPagesHeadersFootersFootnotes.pages @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:99d50cc7c6eaa14bb3c3b87c8163134673268da22846b1832674f40a54041dc8 +size 177328 diff --git a/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-crypto-module/src/test/resources/test-documents/Test4.pdf.tsd b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-crypto-module/src/test/resources/test-documents/Test4.pdf.tsd new file mode 100644 index 0000000000000000000000000000000000000000..1c181b9f655613ae3c5b4094468f2d047586388a --- /dev/null +++ b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-crypto-module/src/test/resources/test-documents/Test4.pdf.tsd @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:6114065b04d86f8d6e6acfecf60ae7a7980453daf4be54eac5bc626ed61d7f84 +size 158748 diff --git a/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/EmbeddedOutlook.docx b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/EmbeddedOutlook.docx new file mode 100644 index 0000000000000000000000000000000000000000..adafff0f10adf7f12a814f7032652e71897d0ea8 --- /dev/null +++ b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/EmbeddedOutlook.docx @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:45d84c0cbf2bc695588dca1364dba224158f5a7acd1e92d1b732b94ba6cdbe06 +size 113242 diff --git a/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/jxl.xls b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/jxl.xls new file mode 100644 index 0000000000000000000000000000000000000000..85ea119a4e76caa65f84048c524287fe00e05e06 --- /dev/null +++ b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/jxl.xls @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:5f25e6782386acd7c3b737ec0860a76ab487fe46e2c611b78e52e61d8d1bc30d +size 614912 diff --git a/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testAccess2.accdb b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testAccess2.accdb new file mode 100644 index 0000000000000000000000000000000000000000..77df419aacec04172c507dc39cfefc39faf2b843 --- /dev/null +++ b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testAccess2.accdb @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:93e7d6dcc9312a74c979b799d938fcf9953fa836fec54f44c785122efcd2d2e1 +size 794624 diff --git a/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testAccess2_2000.mdb b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testAccess2_2000.mdb new file mode 100644 index 0000000000000000000000000000000000000000..563a1e9d12026199b05a475a3241055196dfb128 --- /dev/null +++ b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testAccess2_2000.mdb @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:a639df512de81d9144da1143e63dfcc26a579ff8516e794f9626a3b959176c39 +size 421888 diff --git a/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testAccess2_encrypted.accdb b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testAccess2_encrypted.accdb new file mode 100644 index 0000000000000000000000000000000000000000..3cc5c84e63766859aa7beebfe6200dee5fc78bc4 --- /dev/null +++ b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testAccess2_encrypted.accdb @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:1970dfeac26083fa27a72fe55f88f8e8c46e61c68c6d300c2fc5b2290f32c73d +size 557056 diff --git a/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testChm.chm b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testChm.chm new file mode 100644 index 0000000000000000000000000000000000000000..9533bf757fa7c48e3a172ee35b54be5c27483135 --- /dev/null +++ b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testChm.chm @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:b4633ee97a45cd17c63220abeeb84bf07892abb08c61447c57ebae41eacb4ba6 +size 186259 diff --git a/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testChm2.chm b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testChm2.chm new file mode 100644 index 0000000000000000000000000000000000000000..f74244286e8831154ea726105447821668dedb91 --- /dev/null +++ b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testChm2.chm @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:81bff8a8e1f4e6b127f2eddffe9b692bf29e944b692673b910e79cbca7b85126 +size 10807437 diff --git a/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testComment.ppt b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testComment.ppt new file mode 100644 index 0000000000000000000000000000000000000000..fd2e8ef571782376cade493df4fcb06555bb9f46 --- /dev/null +++ b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testComment.ppt @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:9d1d7001c4e0fbbbe89ea9e603f5dd99d7642507da6a8091ad615776def94cf5 +size 101376 diff --git a/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testDocumentLink.doc b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testDocumentLink.doc new file mode 100644 index 0000000000000000000000000000000000000000..61b24ba2961ec67d2c6e68452bcc2df0ae4bc687 --- /dev/null +++ b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testDocumentLink.doc @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:0c7092c09279f10763f258d26d1a076fd19d5366811219c4e4921e26510e4d62 +size 812032 diff --git a/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testEXCEL_embeded.xlsx b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testEXCEL_embeded.xlsx new file mode 100644 index 0000000000000000000000000000000000000000..acf1e750ccf68e26159e5e408178c11db330b209 --- /dev/null +++ b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testEXCEL_embeded.xlsx @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:1c373b197c13df4414320441830c5df3acfa048bea6f9b7ed4dbbdf88e458bc6 +size 348405 diff --git a/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testOneNote1.one b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testOneNote1.one new file mode 100644 index 0000000000000000000000000000000000000000..dff37d4b0577864a4c96b0d8ad020b609e960923 --- /dev/null +++ b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testOneNote1.one @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:51bf981fe9572c26a9611e05a4bb1f0f3940c84c4a0e5a986f97343d16561a05 +size 360280 diff --git a/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testPPT_2imgs.ppt b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testPPT_2imgs.ppt new file mode 100644 index 0000000000000000000000000000000000000000..6070d26a4e1bf9bd2ce8a11401c631f517d11f26 --- /dev/null +++ b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testPPT_2imgs.ppt @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:761184c9e17d320c1d43882726825396753b9020cc067ac8b281306825f18710 +size 124928 diff --git a/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testPPT_EmbeddedPDF.pptx b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testPPT_EmbeddedPDF.pptx new file mode 100644 index 0000000000000000000000000000000000000000..c130c9093c8b9aee4428dbcfbcd1b2defa0963f8 --- /dev/null +++ b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testPPT_EmbeddedPDF.pptx @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:93bdfb75c6331c57b0b099e6d5f714e9217b3d8d23e9f3a9d9bea8b3c6081472 +size 108637 diff --git a/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testPPT_autodate.ppt b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testPPT_autodate.ppt new file mode 100644 index 0000000000000000000000000000000000000000..76536dea93358eb5b571a24208596aa026295626 --- /dev/null +++ b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testPPT_autodate.ppt @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:6ce1d3db26b2c4e9e03efcaa80bdc32aa55547184df50acd41b19ab06e0e83cb +size 148992 diff --git a/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testPPT_embedded_two_slides.pptx b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testPPT_embedded_two_slides.pptx new file mode 100644 index 0000000000000000000000000000000000000000..878e4b35ddb32418c92c466a21a74711fcedc864 --- /dev/null +++ b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testPPT_embedded_two_slides.pptx @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:250e1bfacf29eeeda665611bfb57039969b68f497aee87d4a176ecaf896a7cd7 +size 255364 diff --git a/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testPPT_embeded.ppt b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testPPT_embeded.ppt new file mode 100644 index 0000000000000000000000000000000000000000..69e8d81ed17f9bc2be397efd76eb728b572c373f --- /dev/null +++ b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testPPT_embeded.ppt @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:b45d23e75ba0c8a1608f6784f2a412bf98203bbcd1340cc7f0fdaca5c3b9e541 +size 224768 diff --git a/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testPPT_masterFooter.ppt b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testPPT_masterFooter.ppt new file mode 100644 index 0000000000000000000000000000000000000000..3423a701c41f94c4451e03eae87db91dc9e39705 --- /dev/null +++ b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testPPT_masterFooter.ppt @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:52c57f5bb8294daf234c62730d0fa97589a872d29bb936cc24a2d83b3fd5e1aa +size 139776 diff --git a/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testPPT_masterText.ppt b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testPPT_masterText.ppt new file mode 100644 index 0000000000000000000000000000000000000000..4d36a167b2acf5cc234739e3c1b5fc008fb11f4f --- /dev/null +++ b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testPPT_masterText.ppt @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:3bdbec2f6bf97dca00538173196153c8d8138203cadc483be7ccd5c1719a2c68 +size 117760 diff --git a/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testPPT_masterText2.ppt b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testPPT_masterText2.ppt new file mode 100644 index 0000000000000000000000000000000000000000..e020cbf665e33fb83a67bc71fe7ad4222f066144 --- /dev/null +++ b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testPPT_masterText2.ppt @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:d6562bf5295e32ab39e8846658903eb2a6ef31092ee0fa4570a82769b756f2dc +size 102912 diff --git a/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testPROJECT2003.mpp b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testPROJECT2003.mpp new file mode 100644 index 0000000000000000000000000000000000000000..7889827138d0ea160caf6035ed8fc9d23c7a4dc4 --- /dev/null +++ b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testPROJECT2003.mpp @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:6427a74affd6e6c41382bff4a76fa03797734e699bac9ee62670adcfc9c17c45 +size 125440 diff --git a/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testWORD_2006ml.doc b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testWORD_2006ml.doc new file mode 100644 index 0000000000000000000000000000000000000000..c615806034ff9ef7daa3e398ebcc7e8af8c76056 --- /dev/null +++ b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testWORD_2006ml.doc @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:06b4d4ea1ad7dfb75024ccd956ebc316d8d32361e3e5c7617678a0b4a9343f72 +size 265728 diff --git a/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testWORD_2006ml.docx b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testWORD_2006ml.docx new file mode 100644 index 0000000000000000000000000000000000000000..b900cd4a45ede6034879489b6e71f0e42df511ac --- /dev/null +++ b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testWORD_2006ml.docx @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:bad4b658718bcbc2ca837ce1679e24871d50a0e9f6987b4ade6b4a3e83be47ba +size 165566 diff --git a/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testWORD_embeded.docx b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testWORD_embeded.docx new file mode 100644 index 0000000000000000000000000000000000000000..b277168320bbd7e3b032be9dd46f7d84a2459ee0 --- /dev/null +++ b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testWORD_embeded.docx @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:0bbd355e6d3d3caa816b8913cd955a7bf4f167bce142d8c49998bb764ed79e71 +size 157830 diff --git a/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testWPSAttachment.docx b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testWPSAttachment.docx new file mode 100644 index 0000000000000000000000000000000000000000..d6f8c79e722d21f252814669d33d097aa88800e0 --- /dev/null +++ b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testWPSAttachment.docx @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:f9373ab9c763603ce72e4a5490c727be745bf48a98d703bab1c9f98ff9cc8a36 +size 130189 diff --git a/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testWPSAttachment.ppt b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testWPSAttachment.ppt new file mode 100644 index 0000000000000000000000000000000000000000..76a2b645dffcf76df47e2adf2b3266f43a7dbf69 --- /dev/null +++ b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testWPSAttachment.ppt @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:5a40e78b18aa6692676c494c74376076c895427789b51047d8cb722d79f68163 +size 269312 diff --git a/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testWPSAttachment.pptx b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testWPSAttachment.pptx new file mode 100644 index 0000000000000000000000000000000000000000..ff25e1e0f65b70884e977f509718716c1aabf36b --- /dev/null +++ b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testWPSAttachment.pptx @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:5d0174fe36842e2ffca3b244ae0c57decaa05dd5bf25183873777ec18c112c81 +size 151705 diff --git a/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testWPSAttachment.xlsx b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testWPSAttachment.xlsx new file mode 100644 index 0000000000000000000000000000000000000000..2615aa776744e805946d793cc504d64b6a171e0b --- /dev/null +++ b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testWPSAttachment.xlsx @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:3d6dedcafad1d8ff1ad441454bac1562ba5a25e9af8bbe11524f2b0543ccaede +size 131498 diff --git a/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/test_text.xps b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/test_text.xps new file mode 100644 index 0000000000000000000000000000000000000000..4d9d1147dae8a1b9d67d551a524bb01967b548ac --- /dev/null +++ b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/test_text.xps @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:ea231016f0626c79321f83aca107d31093e60ff969a1194e4dc1d057e3493925 +size 105523 diff --git a/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testsolidworksAssembly2014SP0.SLDASM b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testsolidworksAssembly2014SP0.SLDASM new file mode 100644 index 0000000000000000000000000000000000000000..37998a8dd32a5adf7aeb9c182677a0f3d5279439 --- /dev/null +++ b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testsolidworksAssembly2014SP0.SLDASM @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:7548a39fc1f1320664138a5124fb8ff9783005f664257c6b42bad4f75b4721c4 +size 238080 diff --git a/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testsolidworksDrawing2013SP2.SLDDRW b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testsolidworksDrawing2013SP2.SLDDRW new file mode 100644 index 0000000000000000000000000000000000000000..f13dbe452b52174f01d649d4c36d4151033b273b --- /dev/null +++ b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testsolidworksDrawing2013SP2.SLDDRW @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:bfa6b02c1d1925d289b1bd7b0cb14c6754a12920cb2f3c30456f6b6d5725a3f4 +size 180224 diff --git a/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testsolidworksDrawing2014SP0.SLDDRW b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testsolidworksDrawing2014SP0.SLDDRW new file mode 100644 index 0000000000000000000000000000000000000000..3322abe084b04466831aa587cfd0dc1770cbefac --- /dev/null +++ b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testsolidworksDrawing2014SP0.SLDDRW @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:8c68908ba942b1be60047f88465ab8ad65048c9a38bfcc233e5441eded02dfee +size 201216 diff --git a/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testsolidworksPart2013SP2.SLDPRT b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testsolidworksPart2013SP2.SLDPRT new file mode 100644 index 0000000000000000000000000000000000000000..403a8cd05f19a5d920593fb54fd0ff3d6e29632d --- /dev/null +++ b/local-test-tika-full-01-vuln_0/afc-tika/tika-parsers/tika-parsers-standard/tika-parsers-standard-modules/tika-parser-microsoft-module/src/test/resources/test-documents/testsolidworksPart2013SP2.SLDPRT @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:51630ccadc48f672a88e4915b5cf1dc387517db7dae235e9fe34b1c643b55e7f +size 1010176 diff --git a/local-test-tika-full-01-vuln_0/fuzz-tooling/infra/base-images/base-builder-fuzzbench/Dockerfile b/local-test-tika-full-01-vuln_0/fuzz-tooling/infra/base-images/base-builder-fuzzbench/Dockerfile new file mode 100644 index 0000000000000000000000000000000000000000..580cd305b56be53270602277b76a21ea664e84b4 --- /dev/null +++ b/local-test-tika-full-01-vuln_0/fuzz-tooling/infra/base-images/base-builder-fuzzbench/Dockerfile @@ -0,0 +1,26 @@ +# Copyright 2023 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +################################################################################ + +ARG IMG_TAG=latest +FROM ghcr.io/aixcc-finals/base-builder:${IMG_TAG} + +# Copy/Run this now to make the cache more resilient. +COPY fuzzbench_install_dependencies /usr/local/bin +RUN fuzzbench_install_dependencies + +ENV OSS_FUZZ_ON_DEMAND=1 + +COPY fuzzbench_build fuzzbench_run_fuzzer fuzzbench_measure /usr/local/bin/ diff --git a/local-test-tika-full-01-vuln_0/fuzz-tooling/infra/base-images/base-builder-fuzzbench/fuzzbench_build b/local-test-tika-full-01-vuln_0/fuzz-tooling/infra/base-images/base-builder-fuzzbench/fuzzbench_build new file mode 100644 index 0000000000000000000000000000000000000000..7231fe755ff0c02f9ff6dba1e5235505095e7aa6 --- /dev/null +++ b/local-test-tika-full-01-vuln_0/fuzz-tooling/infra/base-images/base-builder-fuzzbench/fuzzbench_build @@ -0,0 +1,28 @@ +#! /bin/bash -eux +# Copyright 2023 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +################################################################################ + +# TODO(metzman): Do this in a docket image so we don't need to waste time +# reinstalling. +PYTHONPATH=$FUZZBENCH_PATH python3 -B -u -c "from fuzzers.$FUZZING_ENGINE import fuzzer; fuzzer.build()" + +if [ "$FUZZING_ENGINE" = "coverage" ]; then + cd $OUT + mkdir -p filestore/oss-fuzz-on-demand/coverage-binaries + # We expect an error regarding leading slashes. Just assume this step succeeds. + # TODO(metzman): Fix this when I get a chance. + tar -czvf filestore/oss-fuzz-on-demand/coverage-binaries/coverage-build-$PROJECT.tar.gz * /src /work || exit 0 +fi diff --git a/local-test-tika-full-01-vuln_0/fuzz-tooling/infra/base-images/base-builder-swift/precompile_swift b/local-test-tika-full-01-vuln_0/fuzz-tooling/infra/base-images/base-builder-swift/precompile_swift new file mode 100644 index 0000000000000000000000000000000000000000..ab855a620191656e572d6a68a869e26f020b0dc5 --- /dev/null +++ b/local-test-tika-full-01-vuln_0/fuzz-tooling/infra/base-images/base-builder-swift/precompile_swift @@ -0,0 +1,33 @@ +#!/bin/bash -eu +# Copyright 2021 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +################################################################################ + +cp /usr/local/bin/llvm-symbolizer-swift $OUT/llvm-symbolizer + +export SWIFTFLAGS="-Xswiftc -parse-as-library -Xswiftc -static-stdlib --static-swift-stdlib" +if [ "$SANITIZER" = "coverage" ] +then + export SWIFTFLAGS="$SWIFTFLAGS -Xswiftc -profile-generate -Xswiftc -profile-coverage-mapping -Xswiftc -sanitize=fuzzer" +else + export SWIFTFLAGS="$SWIFTFLAGS -Xswiftc -sanitize=fuzzer,$SANITIZER --sanitize=$SANITIZER" + for f in $CFLAGS; do + export SWIFTFLAGS="$SWIFTFLAGS -Xcc=$f" + done + + for f in $CXXFLAGS; do + export SWIFTFLAGS="$SWIFTFLAGS -Xcxx=$f" + done +fi diff --git a/local-test-tika-full-01-vuln_0/fuzz-tooling/infra/base-images/base-runner/nyc_report_converter.py b/local-test-tika-full-01-vuln_0/fuzz-tooling/infra/base-images/base-runner/nyc_report_converter.py new file mode 100644 index 0000000000000000000000000000000000000000..53044754c26b2a74a6b7afa7f5f22b52881767d1 --- /dev/null +++ b/local-test-tika-full-01-vuln_0/fuzz-tooling/infra/base-images/base-runner/nyc_report_converter.py @@ -0,0 +1,80 @@ +#!/usr/bin/env python3 +# Copyright 2023 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +################################################################################ +"""Helper script for creating a llvm-cov style JSON summary from a nyc +JSON summary.""" +import json +import sys + + +def convert(nyc_json_summary): + """Turns a nyc JSON report into a llvm-cov JSON summary.""" + summary = { + 'type': + 'oss-fuzz.javascript.coverage.json.export', + 'version': + '1.0.0', + 'data': [{ + 'totals': + file_summary(nyc_json_summary['total']), + 'files': [{ + 'filename': src_file, + 'summary': file_summary(nyc_json_summary[src_file]) + } for src_file in nyc_json_summary if src_file != 'total'], + }], + } + + return json.dumps(summary) + + +def file_summary(nyc_file_summary): + """Returns a summary for a given file in the nyc JSON summary report.""" + return { + 'functions': element_summary(nyc_file_summary['functions']), + 'lines': element_summary(nyc_file_summary['lines']), + 'regions': element_summary(nyc_file_summary['branches']) + } + + +def element_summary(element): + """Returns a summary of a coverage element in the nyc JSON summary + of the file""" + return { + 'count': element['total'], + 'covered': element['covered'], + 'notcovered': element['total'] - element['covered'] - element['skipped'], + 'percent': element['pct'] if element['pct'] != 'Unknown' else 0 + } + + +def main(): + """Produces a llvm-cov style JSON summary from a nyc JSON summary.""" + if len(sys.argv) != 3: + sys.stderr.write('Usage: %s \n' % + sys.argv[0]) + return 1 + + with open(sys.argv[1], 'r') as nyc_json_summary_file: + nyc_json_summary = json.load(nyc_json_summary_file) + json_summary = convert(nyc_json_summary) + with open(sys.argv[2], 'w') as json_output_file: + json_output_file.write(json_summary) + + return 0 + + +if __name__ == '__main__': + sys.exit(main()) diff --git a/local-test-tika-full-01-vuln_0/fuzz-tooling/infra/base-images/base-runner/test_all.py b/local-test-tika-full-01-vuln_0/fuzz-tooling/infra/base-images/base-runner/test_all.py new file mode 100644 index 0000000000000000000000000000000000000000..428e49ac0b6d7179dcab5003e6104e7a88c98906 --- /dev/null +++ b/local-test-tika-full-01-vuln_0/fuzz-tooling/infra/base-images/base-runner/test_all.py @@ -0,0 +1,295 @@ +#!/usr/bin/env python3 +# Copyright 2020 Google LLC +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +################################################################################ +"""Does bad_build_check on all fuzz targets in $OUT.""" + +import contextlib +import multiprocessing +import os +import re +import subprocess +import stat +import sys +import tempfile + +BASE_TMP_FUZZER_DIR = '/tmp/not-out' + +EXECUTABLE = stat.S_IEXEC | stat.S_IXGRP | stat.S_IXOTH + +IGNORED_TARGETS = [ + r'do_stuff_fuzzer', r'checksum_fuzzer', r'fuzz_dump', r'fuzz_keyring', + r'xmltest', r'fuzz_compression_sas_rle', r'ares_*_fuzzer' +] + +IGNORED_TARGETS_RE = re.compile('^' + r'$|^'.join(IGNORED_TARGETS) + '$') + + +def move_directory_contents(src_directory, dst_directory): + """Moves contents of |src_directory| to |dst_directory|.""" + # Use mv because mv preserves file permissions. If we don't preserve file + # permissions that can mess up CheckFuzzerBuildTest in cifuzz_test.py and + # other cases where one is calling test_all on files not in OSS-Fuzz's real + # out directory. + src_contents = [ + os.path.join(src_directory, filename) + for filename in os.listdir(src_directory) + ] + command = ['mv'] + src_contents + [dst_directory] + subprocess.check_call(command) + + +def is_elf(filepath): + """Returns True if |filepath| is an ELF file.""" + result = subprocess.run(['file', filepath], + stdout=subprocess.PIPE, + check=False) + return b'ELF' in result.stdout + + +def is_shell_script(filepath): + """Returns True if |filepath| is a shell script.""" + result = subprocess.run(['file', filepath], + stdout=subprocess.PIPE, + check=False) + return b'shell script' in result.stdout + + +def find_fuzz_targets(directory): + """Returns paths to fuzz targets in |directory|.""" + # TODO(https://github.com/google/oss-fuzz/issues/4585): Use libClusterFuzz for + # this. + fuzz_targets = [] + for filename in os.listdir(directory): + path = os.path.join(directory, filename) + if filename == 'llvm-symbolizer': + continue + if filename.startswith('afl-'): + continue + if filename.startswith('jazzer_'): + continue + if not os.path.isfile(path): + continue + if not os.stat(path).st_mode & EXECUTABLE: + continue + # Fuzz targets can either be ELF binaries or shell scripts (e.g. wrapper + # scripts for Python and JVM targets or rules_fuzzing builds with runfiles + # trees). + if not is_elf(path) and not is_shell_script(path): + continue + if os.getenv('FUZZING_ENGINE') not in {'none', 'wycheproof'}: + with open(path, 'rb') as file_handle: + binary_contents = file_handle.read() + if b'LLVMFuzzerTestOneInput' not in binary_contents: + continue + fuzz_targets.append(path) + return fuzz_targets + + +def do_bad_build_check(fuzz_target): + """Runs bad_build_check on |fuzz_target|. Returns a + Subprocess.ProcessResult.""" + print('INFO: performing bad build checks for', fuzz_target) + if centipede_needs_auxiliaries(): + print('INFO: Finding Centipede\'s auxiliary for target', fuzz_target) + auxiliary_path = find_centipede_auxiliary(fuzz_target) + print('INFO: Using auxiliary binary:', auxiliary_path) + auxiliary = [auxiliary_path] + else: + auxiliary = [] + + command = ['bad_build_check', fuzz_target] + auxiliary + with tempfile.TemporaryDirectory() as temp_centipede_workdir: + # Do this so that centipede doesn't fill up the disk during bad build check + env = os.environ.copy() + env['CENTIPEDE_WORKDIR'] = temp_centipede_workdir + return subprocess.run(command, + stderr=subprocess.PIPE, + stdout=subprocess.PIPE, + env=env, + check=False) + + +def get_broken_fuzz_targets(bad_build_results, fuzz_targets): + """Returns a list of broken fuzz targets and their process results in + |fuzz_targets| where each item in |bad_build_results| is the result of + bad_build_check on the corresponding element in |fuzz_targets|.""" + broken = [] + for result, fuzz_target in zip(bad_build_results, fuzz_targets): + if result.returncode != 0: + broken.append((fuzz_target, result)) + return broken + + +def has_ignored_targets(out_dir): + """Returns True if |out_dir| has any fuzz targets we are supposed to ignore + bad build checks of.""" + out_files = set(os.listdir(out_dir)) + for filename in out_files: + if re.match(IGNORED_TARGETS_RE, filename): + return True + return False + + +@contextlib.contextmanager +def use_different_out_dir(): + """Context manager that moves OUT to subdirectory of BASE_TMP_FUZZER_DIR. This + is useful for catching hardcoding. Note that this sets the environment + variable OUT and therefore must be run before multiprocessing.Pool is created. + Resets OUT at the end.""" + # Use a fake OUT directory to catch path hardcoding that breaks on + # ClusterFuzz. + initial_out = os.getenv('OUT') + os.makedirs(BASE_TMP_FUZZER_DIR, exist_ok=True) + # Use a random subdirectory of BASE_TMP_FUZZER_DIR to allow running multiple + # instances of test_all in parallel (useful for integration testing). + with tempfile.TemporaryDirectory(dir=BASE_TMP_FUZZER_DIR) as out: + # Set this so that run_fuzzer which is called by bad_build_check works + # properly. + os.environ['OUT'] = out + # We move the contents of the directory because we can't move the + # directory itself because it is a mount. + move_directory_contents(initial_out, out) + try: + yield out + finally: + move_directory_contents(out, initial_out) + os.environ['OUT'] = initial_out + + +def test_all_outside_out(allowed_broken_targets_percentage): + """Wrapper around test_all that changes OUT and returns the result.""" + with use_different_out_dir() as out: + return test_all(out, allowed_broken_targets_percentage) + + +def centipede_needs_auxiliaries(): + """Checks if auxiliaries are needed for Centipede.""" + # Centipede always requires unsanitized binaries as the main fuzz targets, + # and separate sanitized binaries as auxiliaries. + # 1. Building sanitized binaries with helper.py (i.e., local or GitHub CI): + # Unsanitized ones will be built automatically into the same docker container. + # Script bad_build_check tests both + # a) If main fuzz targets can run with the auxiliaries, and + # b) If the auxiliaries are built with the correct sanitizers. + # 2. In Trial build and production build: + # Two kinds of binaries will be in separated buckets / docker containers. + # Script bad_build_check tests either + # a) If the unsanitized binaries can run without the sanitized ones, or + # b) If the sanitized binaries are built with the correct sanitizers. + return (os.getenv('FUZZING_ENGINE') == 'centipede' and + os.getenv('SANITIZER') != 'none' and os.getenv('HELPER') == 'True') + + +def find_centipede_auxiliary(main_fuzz_target_path): + """Finds the sanitized binary path that corresponds to |main_fuzz_target| for + bad_build_check.""" + target_dir, target_name = os.path.split(main_fuzz_target_path) + sanitized_binary_dir = os.path.join(target_dir, + f'__centipede_{os.getenv("SANITIZER")}') + sanitized_binary_path = os.path.join(sanitized_binary_dir, target_name) + + if os.path.isfile(sanitized_binary_path): + return sanitized_binary_path + + # Neither of the following two should ever happen, returns None to indicate + # an error. + if os.path.isdir(sanitized_binary_dir): + print('ERROR: Unable to identify Centipede\'s sanitized target' + f'{sanitized_binary_path} in {os.listdir(sanitized_binary_dir)}') + else: + print('ERROR: Unable to identify Centipede\'s sanitized target directory' + f'{sanitized_binary_dir} in {os.listdir(target_dir)}') + return None + + +def test_all(out, allowed_broken_targets_percentage): # pylint: disable=too-many-return-statements + """Do bad_build_check on all fuzz targets.""" + # TODO(metzman): Refactor so that we can convert test_one to python. + fuzz_targets = find_fuzz_targets(out) + if not fuzz_targets: + print('ERROR: No fuzz targets found.') + return False + + if centipede_needs_auxiliaries(): + for fuzz_target in fuzz_targets: + if not find_centipede_auxiliary(fuzz_target): + print(f'ERROR: Couldn\'t find auxiliary for {fuzz_target}.') + return False + + pool = multiprocessing.Pool() + bad_build_results = pool.map(do_bad_build_check, fuzz_targets) + pool.close() + pool.join() + broken_targets = get_broken_fuzz_targets(bad_build_results, fuzz_targets) + broken_targets_count = len(broken_targets) + if not broken_targets_count: + return True + + print('Retrying failed fuzz targets sequentially', broken_targets_count) + pool = multiprocessing.Pool(1) + retry_targets = [] + for broken_target, result in broken_targets: + retry_targets.append(broken_target) + bad_build_results = pool.map(do_bad_build_check, retry_targets) + pool.close() + pool.join() + broken_targets = get_broken_fuzz_targets(bad_build_results, broken_targets) + broken_targets_count = len(broken_targets) + if not broken_targets_count: + return True + + print('Broken fuzz targets', broken_targets_count) + total_targets_count = len(fuzz_targets) + broken_targets_percentage = 100 * broken_targets_count / total_targets_count + for broken_target, result in broken_targets: + print(broken_target) + # Use write because we can't print binary strings. + sys.stdout.buffer.write(result.stdout + result.stderr + b'\n') + + if broken_targets_percentage > allowed_broken_targets_percentage: + print('ERROR: {broken_targets_percentage}% of fuzz targets seem to be ' + 'broken. See the list above for a detailed information.'.format( + broken_targets_percentage=broken_targets_percentage)) + if has_ignored_targets(out): + print('Build check automatically passing because of ignored targets.') + return True + return False + print('{total_targets_count} fuzzers total, {broken_targets_count} ' + 'seem to be broken ({broken_targets_percentage}%).'.format( + total_targets_count=total_targets_count, + broken_targets_count=broken_targets_count, + broken_targets_percentage=broken_targets_percentage)) + return True + + +def get_allowed_broken_targets_percentage(): + """Returns the value of the environment value + 'ALLOWED_BROKEN_TARGETS_PERCENTAGE' as an int or returns a reasonable + default.""" + return int(os.getenv('ALLOWED_BROKEN_TARGETS_PERCENTAGE') or '10') + + +def main(): + """Does bad_build_check on all fuzz targets in parallel. Returns 0 on success. + Returns 1 on failure.""" + allowed_broken_targets_percentage = get_allowed_broken_targets_percentage() + if not test_all_outside_out(allowed_broken_targets_percentage): + return 1 + return 0 + + +if __name__ == '__main__': + sys.exit(main())