output
stringlengths 64
73.2k
| input
stringlengths 208
73.3k
| instruction
stringclasses 1
value |
---|---|---|
#fixed code
@RequestMapping(value = "/api/processor", method = RequestMethod.POST, headers = "Accept=application/json")
ConversationDTO requestProcessor(@RequestParam(value = "runnerLogId", required = false) String runnerLogId, @RequestBody RfRequestDTO rfRequestDTO) {
Conversation existingConversation = null;
Conversation currentConversation;
// TODO : Get RfRequest Id if present as part of this request and update the existing conversation entity.
// Note : New conversation entity which is getting created below is still required for logging purpose.
if (rfRequestDTO == null) {
return null;
} else if (rfRequestDTO.getId() != null && !rfRequestDTO.getId().isEmpty()) {
RfRequest rfRequest = rfRequestRepository.findOne(rfRequestDTO.getId());
String conversationId = rfRequest != null ? rfRequest.getConversationId() : null;
existingConversation = conversationId != null ? conversationRepository.findOne(conversationId) : null;
// finding updated existing conversation
existingConversation = existingConversation != null ? nodeRepository.findOne(existingConversation.getNodeId()).getConversation() : null;
if(existingConversation != null) {
rfRequestDTO.setAssertionDTO(EntityToDTO.toDTO(existingConversation.getRfRequest().getAssertion()));
}
}
long startTime = System.currentTimeMillis();
RfResponseDTO result = genericHandler.processHttpRequest(rfRequestDTO);
long endTime = System.currentTimeMillis();
long duration = endTime - startTime;
if (result != null) {
String nodeId = null;
if (existingConversation != null && existingConversation.getNodeId() != null) {
nodeId = existingConversation.getNodeId();
}
assertHandler.runAssert(result, nodeId);
}
currentConversation = ConversationConverter.convertToEntity(rfRequestDTO, result);
// This is used to get project-runner/folder-runner logs
currentConversation.setRunnerLogId(runnerLogId);
if (existingConversation != null) {
currentConversation.getRfRequest().setAssertion(existingConversation.getRfRequest().getAssertion());
}
rfRequestRepository.save(currentConversation.getRfRequest());
rfResponseRepository.save(currentConversation.getRfResponse());
currentConversation.setDuration(duration);
Object principal = SecurityContextHolder.getContext().getAuthentication().getPrincipal();
if (principal instanceof User) {
currentConversation.setLastModifiedBy((User) principal);
}
Date currentDate = new Date();
currentConversation.setCreatedDate(currentDate);
currentConversation.setLastModifiedDate(currentDate);
currentConversation.setLastRunDate(currentDate);
currentConversation.setName(currentConversation.getRfRequest().getApiUrl());
try {
currentConversation = conversationRepository.save(currentConversation);
currentConversation.getRfRequest().setConversationId(currentConversation.getId());
rfRequestRepository.save(currentConversation.getRfRequest());
ActivityLog activityLog = null;
// Note : existingConversation will be null if the request was not saved previously.
if (existingConversation != null && existingConversation.getNodeId() != null) {
BaseNode node = nodeRepository.findOne(existingConversation.getNodeId());
currentConversation.setNodeId(node.getId());
currentConversation.setName(node.getName());
activityLog = activityLogRepository.findActivityLogByDataId(node.getId());
}
if (principal instanceof User) {
currentConversation.setLastModifiedBy((User) principal);
}
conversationRepository.save(currentConversation);
if (activityLog == null) {
activityLog = new ActivityLog();
if(existingConversation != null) {
activityLog.setDataId(existingConversation.getNodeId());
}
activityLog.setType("CONVERSATION");
}
activityLog.setName(currentConversation.getName());
activityLog.setWorkspaceId(currentConversation.getWorkspaceId());
activityLog.setLastModifiedDate(currentDate);
List<BaseEntity> logData = activityLog.getData();
logData.add(0, currentConversation);
activityLogRepository.save(activityLog);
} catch (InvalidDataAccessResourceUsageException e) {
throw new ApiException("Please use sql as datasource, some of features are not supported by hsql", e);
}
ConversationDTO conversationDTO = new ConversationDTO();
conversationDTO.setWorkspaceId(rfRequestDTO.getWorkspaceId());
conversationDTO.setDuration(duration);
conversationDTO.setRfResponseDTO(result);
if (result != null) {
result.setItemDTO(conversationDTO);
}
return conversationDTO;
}
|
#vulnerable code
@RequestMapping(value = "/api/processor", method = RequestMethod.POST, headers = "Accept=application/json")
ConversationDTO requestProcessor(@RequestParam(value = "runnerLogId", required = false) String runnerLogId, @RequestBody RfRequestDTO rfRequestDTO) {
Conversation existingConversation = null;
Conversation currentConversation;
// TODO : Get RfRequest Id if present as part of this request and update the existing conversation entity.
// Note : New conversation entity which is getting created below is still required for logging purpose.
if (rfRequestDTO == null) {
return null;
} else if (rfRequestDTO.getId() != null && !rfRequestDTO.getId().isEmpty()) {
RfRequest rfRequest = rfRequestRepository.findOne(rfRequestDTO.getId());
String conversationId = rfRequest != null ? rfRequest.getConversationId() : null;
existingConversation = conversationId != null ? conversationRepository.findOne(conversationId) : null;
// finding updated existing conversation
existingConversation = existingConversation != null ? nodeRepository.findOne(existingConversation.getNodeId()).getConversation() : null;
rfRequestDTO.setAssertionDTO(EntityToDTO.toDTO(existingConversation.getRfRequest().getAssertion()));
}
long startTime = System.currentTimeMillis();
RfResponseDTO result = genericHandler.processHttpRequest(rfRequestDTO);
long endTime = System.currentTimeMillis();
long duration = endTime - startTime;
if (result != null) {
String nodeId = null;
if (existingConversation != null && existingConversation.getNodeId() != null) {
nodeId = existingConversation.getNodeId();
}
assertHandler.runAssert(result, nodeId);
}
currentConversation = ConversationConverter.convertToEntity(rfRequestDTO, result);
// This is used to get project-runner/folder-runner logs
currentConversation.setRunnerLogId(runnerLogId);
if (existingConversation != null) {
currentConversation.getRfRequest().setAssertion(existingConversation.getRfRequest().getAssertion());
}
rfRequestRepository.save(currentConversation.getRfRequest());
rfResponseRepository.save(currentConversation.getRfResponse());
currentConversation.setDuration(duration);
Object principal = SecurityContextHolder.getContext().getAuthentication().getPrincipal();
if (principal instanceof User) {
currentConversation.setLastModifiedBy((User) principal);
}
Date currentDate = new Date();
currentConversation.setCreatedDate(currentDate);
currentConversation.setLastModifiedDate(currentDate);
currentConversation.setLastRunDate(currentDate);
currentConversation.setName(currentConversation.getRfRequest().getApiUrl());
try {
currentConversation = conversationRepository.save(currentConversation);
currentConversation.getRfRequest().setConversationId(currentConversation.getId());
rfRequestRepository.save(currentConversation.getRfRequest());
ActivityLog activityLog = null;
// Note : existingConversation will be null if the request was not saved previously.
if (existingConversation != null && existingConversation.getNodeId() != null) {
BaseNode node = nodeRepository.findOne(existingConversation.getNodeId());
currentConversation.setNodeId(node.getId());
currentConversation.setName(node.getName());
activityLog = activityLogRepository.findActivityLogByDataId(node.getId());
}
if (principal instanceof User) {
currentConversation.setLastModifiedBy((User) principal);
}
conversationRepository.save(currentConversation);
if (activityLog == null) {
activityLog = new ActivityLog();
activityLog.setDataId(existingConversation.getNodeId());
activityLog.setType("CONVERSATION");
}
activityLog.setName(currentConversation.getName());
activityLog.setWorkspaceId(currentConversation.getWorkspaceId());
activityLog.setLastModifiedDate(currentDate);
List<BaseEntity> logData = activityLog.getData();
logData.add(0, currentConversation);
activityLogRepository.save(activityLog);
} catch (InvalidDataAccessResourceUsageException e) {
throw new ApiException("Please use sql as datasource, some of features are not supported by hsql", e);
}
ConversationDTO conversationDTO = new ConversationDTO();
conversationDTO.setWorkspaceId(rfRequestDTO.getWorkspaceId());
conversationDTO.setDuration(duration);
conversationDTO.setRfResponseDTO(result);
if (result != null) {
result.setItemDTO(conversationDTO);
}
return conversationDTO;
}
#location 83
#vulnerability type NULL_DEREFERENCE
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
private void rfToSwaggerConverter(String projectId) {
Swagger swagger = new SwaggerParser().read("http://petstore.swagger.io/v2/swagger.json");
Project project = projectController.findById(null, projectId);
String projectNodeRefId = project.getProjectRef().getId();
TreeNode projectNode = nodeController.getProjectTree(projectNodeRefId, null);
swagger = new Swagger();
//TODO : set host and basepath for swagger
//swagger.setHost(host);
//swagger.setBasePath(basePath);
Info info = new Info();
info.setTitle(projectNode.getName());
info.setDescription(projectNode.getDescription());
swagger.setInfo(info);
Map<String, Path> paths = new HashMap<>();
Path path = null;
String pathKey = null;
String method = null;
Operation op = null;
String operationId = null;
String summary = null;
List<TreeNode> children = projectNode.getChildren();
for (int i = 0; i < children.size(); i++) {
TreeNode childNode = children.get(i);
path = new Path();
op = new Operation();
operationId = childNode.getName();
summary = childNode.getDescription();
op.setOperationId(operationId);
op.setSummary(summary);
method = childNode.getMethod().toLowerCase();
path.set(method, op);
//TODO : pathKey is the relative url (for example /workspaces) from the api url
pathKey = null;
paths.put(pathKey, path);
}
swagger.setPaths(paths);
JsonNode jsonNode = Json.mapper().convertValue(swagger, JsonNode.class);
System.out.println(jsonNode.toString());
}
|
#vulnerable code
private void rfToSwaggerConverter(String projectId) {
Swagger swagger = new SwaggerParser().read("http://petstore.swagger.io/v2/swagger.json");
Project project = projectController.findById(null, projectId);
String projectNodeRefId = project.getProjectRef().getId();
TreeNode projectNode = nodeController.getProjectTree(projectNodeRefId);
swagger = new Swagger();
//TODO : set host and basepath for swagger
//swagger.setHost(host);
//swagger.setBasePath(basePath);
Info info = new Info();
info.setTitle(projectNode.getName());
info.setDescription(projectNode.getDescription());
swagger.setInfo(info);
Map<String, Path> paths = new HashMap<>();
Path path = null;
String pathKey = null;
String method = null;
Operation op = null;
String operationId = null;
String summary = null;
List<TreeNode> children = projectNode.getChildren();
for (int i = 0; i < children.size(); i++) {
TreeNode childNode = children.get(i);
path = new Path();
op = new Operation();
operationId = childNode.getName();
summary = childNode.getDescription();
op.setOperationId(operationId);
op.setSummary(summary);
method = childNode.getMethod().toLowerCase();
path.set(method, op);
//TODO : pathKey is the relative url (for example /workspaces) from the api url
pathKey = null;
paths.put(pathKey, path);
}
swagger.setPaths(paths);
JsonNode jsonNode = Json.mapper().convertValue(swagger, JsonNode.class);
System.out.println(jsonNode.toString());
}
#location 16
#vulnerability type NULL_DEREFERENCE
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
public long appendUtf8(long pos, char[] chars, int offset, int length) {
if (pos + length > realCapacity())
throw new BufferOverflowException();
long address = this.address + translate(0);
Memory memory = this.memory;
if (memory == null) throw new NullPointerException();
Unsafe unsafe = UnsafeMemory.UNSAFE;
int i;
ascii:
{
for (i = 0; i < length - 3; i += 4) {
char c0 = chars[offset + i];
char c1 = chars[offset + i + 1];
char c2 = chars[offset + i + 2];
char c3 = chars[offset + i + 3];
if ((c0 | c1 | c2 | c3) > 0x007F)
break ascii;
unsafe.putInt(address + pos, (c0) | (c1 << 8) | (c2 << 16) | (c3 << 24));
pos += 4;
}
for (; i < length; i++) {
char c = chars[offset + i];
if (c > 0x007F)
break ascii;
unsafe.putByte(address + pos++, (byte) c);
}
return pos;
}
return appendUtf8a(pos, chars, offset, length, i);
}
|
#vulnerable code
public long appendUtf8(long pos, char[] chars, int offset, int length) {
if (pos + length > realCapacity())
throw new BufferOverflowException();
long address = this.address + translate(0);
Memory memory = this.memory;
int i;
ascii:
{
for (i = 0; i < length - 3; i += 4) {
char c0 = chars[offset + i];
char c1 = chars[offset + i + 1];
char c2 = chars[offset + i + 2];
char c3 = chars[offset + i + 3];
if ((c0 | c1 | c2 | c3) > 0x007F)
break ascii;
memory.writeInt(address + pos, (c0) | (c1 << 8) | (c2 << 16) | (c3 << 24));
pos += 4;
}
for (; i < length; i++) {
char c = chars[offset + i];
if (c > 0x007F)
break ascii;
memory.writeByte(address + pos++, (byte) c);
}
return pos;
}
return appendUTF0(pos, chars, offset, length, i);
}
#location 17
#vulnerability type NULL_DEREFERENCE
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
@Test
public void testName() {
Bytes<Void> bytes = Bytes.allocateDirect(30);
long expected = 12345L;
int offset = 5;
bytes.writeLong(offset, expected);
bytes.writePosition(offset + 8);
assertEquals(expected, bytes.readLong(offset));
}
|
#vulnerable code
@Test
public void testName() {
NativeBytesStore<Void> nativeStore = NativeBytesStore.nativeStoreWithFixedCapacity(30);
Bytes<Void> bytes = nativeStore.bytesForWrite();
long expected = 12345L;
int offset = 5;
bytes.writeLong(offset, expected);
bytes.writePosition(offset + 8);
assertEquals(expected, bytes.readLong(offset));
}
#location 11
#vulnerability type RESOURCE_LEAK
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
@Test
public void testName() {
Bytes<Void> bytes = Bytes.allocateDirect(30);
long expected = 12345L;
int offset = 5;
bytes.writeLong(offset, expected);
bytes.writePosition(offset + 8);
assertEquals(expected, bytes.readLong(offset));
}
|
#vulnerable code
@Test
public void testName() {
NativeBytesStore<Void> nativeStore = NativeBytesStore.nativeStoreWithFixedCapacity(30);
Bytes<Void> bytes = nativeStore.bytesForWrite();
long expected = 12345L;
int offset = 5;
bytes.writeLong(offset, expected);
bytes.writePosition(offset + 8);
assertEquals(expected, bytes.readLong(offset));
}
#location 12
#vulnerability type RESOURCE_LEAK
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
public static BytesStore<Bytes<Void>, Void> copyOf(Bytes bytes) {
long remaining = bytes.readRemaining();
NativeBytes<Void> bytes2 = Bytes.allocateElasticDirect(remaining);
bytes2.write(bytes, 0, remaining);
return bytes2;
}
|
#vulnerable code
public static BytesStore<Bytes<Void>, Void> copyOf(Bytes bytes) {
long remaining = bytes.readRemaining();
NativeBytes<Void> bytes2 = NativeBytes.nativeBytes(remaining);
bytes2.write(bytes, 0, remaining);
return bytes2;
}
#location 5
#vulnerability type RESOURCE_LEAK
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
public Bytes acquireBytesForWrite(long position)
throws IOException, IllegalStateException, IllegalArgumentException {
MappedBytesStore mbs = acquireByteStore(position);
Bytes bytes = mbs.bytesForWrite();
bytes.writePosition(position);
mbs.release();
return bytes;
}
|
#vulnerable code
public Bytes acquireBytesForWrite(long position)
throws IOException, IllegalStateException, IllegalArgumentException {
MappedBytesStore mbs = acquireByteStore(position);
MappedBytes bytes = mbs.bytesForWrite();
bytes.writePosition(position);
mbs.release();
return bytes;
}
#location 7
#vulnerability type RESOURCE_LEAK
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
@Test
public void testName() {
Bytes<Void> bytes = Bytes.allocateDirect(30);
long expected = 12345L;
int offset = 5;
bytes.writeLong(offset, expected);
bytes.writePosition(offset + 8);
assertEquals(expected, bytes.readLong(offset));
}
|
#vulnerable code
@Test
public void testName() {
NativeBytesStore<Void> nativeStore = NativeBytesStore.nativeStoreWithFixedCapacity(30);
Bytes<Void> bytes = nativeStore.bytesForWrite();
long expected = 12345L;
int offset = 5;
bytes.writeLong(offset, expected);
bytes.writePosition(offset + 8);
assertEquals(expected, bytes.readLong(offset));
}
#location 11
#vulnerability type RESOURCE_LEAK
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
public Bytes acquireBytesForWrite(long position)
throws IOException, IllegalStateException, IllegalArgumentException {
MappedBytesStore mbs = acquireByteStore(position);
MappedBytes bytes = mbs.bytesForWrite();
bytes.writePosition(position);
mbs.release();
return bytes;
}
|
#vulnerable code
public Bytes acquireBytesForWrite(long position)
throws IOException, IllegalStateException, IllegalArgumentException {
MappedBytesStore mbs = acquireByteStore(position);
Bytes bytes = mbs.bytesForWrite();
bytes.writePosition(position);
mbs.release();
return bytes;
}
#location 7
#vulnerability type RESOURCE_LEAK
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
public long appendUtf8(long pos, char[] chars, int offset, int length) {
if (pos + length > realCapacity())
throw new BufferOverflowException();
long address = this.address + translate(0);
Memory memory = this.memory;
if (memory == null) throw new NullPointerException();
Unsafe unsafe = UnsafeMemory.UNSAFE;
int i;
ascii:
{
for (i = 0; i < length - 3; i += 4) {
char c0 = chars[offset + i];
char c1 = chars[offset + i + 1];
char c2 = chars[offset + i + 2];
char c3 = chars[offset + i + 3];
if ((c0 | c1 | c2 | c3) > 0x007F)
break ascii;
unsafe.putInt(address + pos, (c0) | (c1 << 8) | (c2 << 16) | (c3 << 24));
pos += 4;
}
for (; i < length; i++) {
char c = chars[offset + i];
if (c > 0x007F)
break ascii;
unsafe.putByte(address + pos++, (byte) c);
}
return pos;
}
return appendUtf8a(pos, chars, offset, length, i);
}
|
#vulnerable code
public long appendUtf8(long pos, char[] chars, int offset, int length) {
if (pos + length > realCapacity())
throw new BufferOverflowException();
long address = this.address + translate(0);
Memory memory = this.memory;
int i;
ascii:
{
for (i = 0; i < length - 3; i += 4) {
char c0 = chars[offset + i];
char c1 = chars[offset + i + 1];
char c2 = chars[offset + i + 2];
char c3 = chars[offset + i + 3];
if ((c0 | c1 | c2 | c3) > 0x007F)
break ascii;
memory.writeInt(address + pos, (c0) | (c1 << 8) | (c2 << 16) | (c3 << 24));
pos += 4;
}
for (; i < length; i++) {
char c = chars[offset + i];
if (c > 0x007F)
break ascii;
memory.writeByte(address + pos++, (byte) c);
}
return pos;
}
return appendUTF0(pos, chars, offset, length, i);
}
#location 24
#vulnerability type NULL_DEREFERENCE
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
@Override
public boolean compareAndSwapValue(long expected, long value) {
BytesStore bytes = this.bytes;
return bytes != null && bytes.compareAndSwapLong(offset, expected, value);
}
|
#vulnerable code
@Override
public boolean compareAndSwapValue(long expected, long value) {
if (value == LONG_NOT_COMPLETE && binaryLongReferences != null)
binaryLongReferences.add(new WeakReference<>(this));
return bytes.compareAndSwapLong(offset, expected, value);
}
#location 5
#vulnerability type NULL_DEREFERENCE
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
@Test
public void toHexString() {
Bytes bytes = Bytes.allocateElasticDirect(1020);
bytes.append("Hello World");
assertEquals("00000000 48 65 6C 6C 6F 20 57 6F 72 6C 64 Hello Wo rld \n", bytes.toHexString());
bytes.readLimit(bytes.realCapacity());
assertEquals("00000000 48 65 6C 6C 6F 20 57 6F 72 6C 64 00 00 00 00 00 Hello Wo rld·····\n" +
"00000010 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ········ ········\n" +
"........\n" +
"000003f0 00 00 00 00 00 00 00 00 00 00 00 00 ········ ···· \n", bytes.toHexString());
assertEquals("00000000 48 65 6C 6C 6F 20 57 6F 72 6C 64 00 00 00 00 00 Hello Wo rld·····\n" +
"00000010 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ········ ········\n" +
"........\n" +
"000000f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ········ ········\n" +
".... truncated", bytes.toHexString(256));
}
|
#vulnerable code
@Test
public void toHexString() {
Bytes bytes = NativeBytes.nativeBytes(1020);
bytes.append("Hello World");
assertEquals("00000000 48 65 6C 6C 6F 20 57 6F 72 6C 64 Hello Wo rld \n", bytes.toHexString());
bytes.readLimit(bytes.realCapacity());
assertEquals("00000000 48 65 6C 6C 6F 20 57 6F 72 6C 64 00 00 00 00 00 Hello Wo rld·····\n" +
"00000010 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ········ ········\n" +
"........\n" +
"000003f0 00 00 00 00 00 00 00 00 00 00 00 00 ········ ···· \n", bytes.toHexString());
assertEquals("00000000 48 65 6C 6C 6F 20 57 6F 72 6C 64 00 00 00 00 00 Hello Wo rld·····\n" +
"00000010 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ········ ········\n" +
"........\n" +
"000000f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ········ ········\n" +
".... truncated", bytes.toHexString(256));
}
#location 17
#vulnerability type RESOURCE_LEAK
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
@Override
public int peekVolatileInt() {
if (!bytesStore.inside(readPosition)) {
acquireNextByteStore(readPosition);
}
MappedBytesStore bytesStore = (MappedBytesStore) (BytesStore) this.bytesStore;
long address = bytesStore.address + bytesStore.translate(readPosition);
Memory memory = bytesStore.memory;
// are we inside a cache line?
if ((address & 63) <= 60) {
if (memory == null)
throw new NullPointerException();
for (int i = 0; i < 64; i++) {
int value = UnsafeMemory.UNSAFE.getIntVolatile(null, address);
if (value != 0 && value != 0x80000000)
return value;
}
} else {
for (int i = 0; i < 32; i++) {
int value = memory.readVolatileInt(address);
if (value != 0)
return value;
}
}
return 0;
}
|
#vulnerable code
@Override
public int peekVolatileInt() {
readCheckOffset(readPosition, 4, true);
MappedBytesStore bytesStore = (MappedBytesStore) (BytesStore) this.bytesStore;
long address = bytesStore.address + bytesStore.translate(readPosition);
Memory memory = bytesStore.memory;
for (int i = 0; i < 128; i++) {
int value = memory.readVolatileInt(address);
if (value != 0)
return value;
}
return 0;
}
#location 8
#vulnerability type NULL_DEREFERENCE
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
public int byteCheckSum() throws IORuntimeException {
if (readLimit() >= Integer.MAX_VALUE || start() != 0)
return super.byteCheckSum();
byte b = 0;
NativeBytesStore bytesStore = (NativeBytesStore) bytesStore();
Memory memory = bytesStore.memory;
assert memory != null;
for (int i = (int) readPosition(), lim = (int) readLimit(); i < lim; i++) {
b += memory.readByte(bytesStore.address + i);
}
return b & 0xFF;
}
|
#vulnerable code
public int byteCheckSum() throws IORuntimeException {
if (readLimit() >= Integer.MAX_VALUE || start() != 0)
return super.byteCheckSum();
byte b = 0;
NativeBytesStore bytesStore = (NativeBytesStore) bytesStore();
for (int i = (int) readPosition(), lim = (int) readLimit(); i < lim; i++) {
b += bytesStore.memory.readByte(bytesStore.address + i);
}
return b & 0xFF;
}
#location 7
#vulnerability type NULL_DEREFERENCE
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
@Test
public void toHexString() {
Bytes bytes = Bytes.allocateElasticDirect(1020);
bytes.append("Hello World");
assertEquals("00000000 48 65 6C 6C 6F 20 57 6F 72 6C 64 Hello Wo rld \n", bytes.toHexString());
bytes.readLimit(bytes.realCapacity());
assertEquals("00000000 48 65 6C 6C 6F 20 57 6F 72 6C 64 00 00 00 00 00 Hello Wo rld·····\n" +
"00000010 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ········ ········\n" +
"........\n" +
"000003f0 00 00 00 00 00 00 00 00 00 00 00 00 ········ ···· \n", bytes.toHexString());
assertEquals("00000000 48 65 6C 6C 6F 20 57 6F 72 6C 64 00 00 00 00 00 Hello Wo rld·····\n" +
"00000010 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ········ ········\n" +
"........\n" +
"000000f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ········ ········\n" +
".... truncated", bytes.toHexString(256));
}
|
#vulnerable code
@Test
public void toHexString() {
Bytes bytes = NativeBytes.nativeBytes(1020);
bytes.append("Hello World");
assertEquals("00000000 48 65 6C 6C 6F 20 57 6F 72 6C 64 Hello Wo rld \n", bytes.toHexString());
bytes.readLimit(bytes.realCapacity());
assertEquals("00000000 48 65 6C 6C 6F 20 57 6F 72 6C 64 00 00 00 00 00 Hello Wo rld·····\n" +
"00000010 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ········ ········\n" +
"........\n" +
"000003f0 00 00 00 00 00 00 00 00 00 00 00 00 ········ ···· \n", bytes.toHexString());
assertEquals("00000000 48 65 6C 6C 6F 20 57 6F 72 6C 64 00 00 00 00 00 Hello Wo rld·····\n" +
"00000010 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ········ ········\n" +
"........\n" +
"000000f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ········ ········\n" +
".... truncated", bytes.toHexString(256));
}
#location 16
#vulnerability type RESOURCE_LEAK
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
@Test
public void shouldBeReadOnly() throws Exception {
final File tempFile = File.createTempFile("mapped", "bytes");
tempFile.deleteOnExit();
try (RandomAccessFile raf = new RandomAccessFile(tempFile, "rw")) {
raf.setLength(4096);
assertTrue(tempFile.setWritable(false));
try (MappedBytes mappedBytes = MappedBytes.readOnly(tempFile)) {
assertTrue(mappedBytes.isBackingFileReadOnly());
}
}
}
|
#vulnerable code
@Test
public void shouldBeReadOnly() throws Exception {
final File tempFile = File.createTempFile("mapped", "bytes");
final RandomAccessFile raf = new RandomAccessFile(tempFile, "rw");
raf.setLength(4096);
assertTrue(tempFile.setWritable(false));
final MappedBytes mappedBytes = MappedBytes.readOnly(tempFile);
assertTrue(mappedBytes.
isBackingFileReadOnly());
mappedBytes.release();
}
#location 5
#vulnerability type RESOURCE_LEAK
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
@Test
public void testCapacity() {
assertEquals(SIZE, bytes.capacity());
assertEquals(10, Bytes.allocateDirect(10).capacity());
}
|
#vulnerable code
@Test
public void testCapacity() {
assertEquals(SIZE, bytes.capacity());
assertEquals(10, NativeBytesStore.nativeStoreWithFixedCapacity(10).capacity());
}
#location 4
#vulnerability type RESOURCE_LEAK
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
public ProtocolProcessor init(IConfig props) {
subscriptions = new SubscriptionsStore();
m_mapStorage = new MapDBPersistentStore(props);
m_mapStorage.initStore();
IMessagesStore messagesStore = m_mapStorage.messagesStore();
ISessionsStore sessionsStore = m_mapStorage.sessionsStore(messagesStore);
List<InterceptHandler> observers = new ArrayList<>();
String interceptorClassName = props.getProperty("intercept.handler");
if (interceptorClassName != null && !interceptorClassName.isEmpty()) {
try {
InterceptHandler handler = Class.forName(interceptorClassName).asSubclass(InterceptHandler.class).newInstance();
observers.add(handler);
} catch (Throwable ex) {
LOG.error("Can't load the intercept handler {}", ex);
}
}
m_interceptor = new BrokerInterceptor(observers);
subscriptions.init(sessionsStore);
String configPath = System.getProperty("moquette.path", null);
String authenticatorClassName = props.getProperty(Constants.AUTHENTICATOR_CLASS_NAME, "");
IAuthenticator authenticator = null;
if (!authenticatorClassName.isEmpty()) {
authenticator = (IAuthenticator)loadClass(authenticatorClassName, IAuthenticator.class);
LOG.info("Loaded custom authenticator {}", authenticatorClassName);
}
if (authenticator == null) {
String passwdPath = props.getProperty(PASSWORD_FILE_PROPERTY_NAME, "");
if (passwdPath.isEmpty()) {
authenticator = new AcceptAllAuthenticator();
} else {
authenticator = new FileAuthenticator(configPath, passwdPath);
}
}
IAuthorizator authorizator = null;
String authorizatorClassName = props.getProperty(Constants.AUTHORIZATOR_CLASS_NAME, "");
if (!authorizatorClassName.isEmpty()) {
authorizator = (IAuthorizator)loadClass(authorizatorClassName, IAuthorizator.class);
LOG.info("Loaded custom authorizator {}", authorizatorClassName);
}
if (authorizator == null) {
String aclFilePath = props.getProperty(ACL_FILE_PROPERTY_NAME, "");
if (aclFilePath != null && !aclFilePath.isEmpty()) {
authorizator = new DenyAllAuthorizator();
File aclFile = new File(configPath, aclFilePath);
try {
authorizator = ACLFileParser.parse(aclFile);
} catch (ParseException pex) {
LOG.error(String.format("Format error in parsing acl file %s", aclFile), pex);
}
LOG.info("Using acl file defined at path {}", aclFilePath);
} else {
authorizator = new PermitAllAuthorizator();
LOG.info("Starting without ACL definition");
}
}
boolean allowAnonymous = Boolean.parseBoolean(props.getProperty(ALLOW_ANONYMOUS_PROPERTY_NAME, "true"));
m_processor.init(subscriptions, messagesStore, sessionsStore, authenticator, allowAnonymous, authorizator, m_interceptor);
return m_processor;
}
|
#vulnerable code
public ProtocolProcessor init(IConfig props) {
subscriptions = new SubscriptionsStore();
//TODO use a property to select the storage path
m_mapStorage = new MapDBPersistentStore(props.getProperty(PERSISTENT_STORE_PROPERTY_NAME, ""));
m_mapStorage.initStore();
IMessagesStore messagesStore = m_mapStorage.messagesStore();
ISessionsStore sessionsStore = m_mapStorage.sessionsStore(messagesStore);
List<InterceptHandler> observers = new ArrayList<>();
String interceptorClassName = props.getProperty("intercept.handler");
if (interceptorClassName != null && !interceptorClassName.isEmpty()) {
try {
InterceptHandler handler = Class.forName(interceptorClassName).asSubclass(InterceptHandler.class).newInstance();
observers.add(handler);
} catch (Throwable ex) {
LOG.error("Can't load the intercept handler {}", ex);
}
}
m_interceptor = new BrokerInterceptor(observers);
subscriptions.init(sessionsStore);
String configPath = System.getProperty("moquette.path", null);
String authenticatorClassName = props.getProperty(Constants.AUTHENTICATOR_CLASS_NAME, "");
IAuthenticator authenticator = null;
if (!authenticatorClassName.isEmpty()) {
authenticator = (IAuthenticator)loadClass(authenticatorClassName, IAuthenticator.class);
LOG.info("Loaded custom authenticator {}", authenticatorClassName);
}
if (authenticator == null) {
String passwdPath = props.getProperty(PASSWORD_FILE_PROPERTY_NAME, "");
if (passwdPath.isEmpty()) {
authenticator = new AcceptAllAuthenticator();
} else {
authenticator = new FileAuthenticator(configPath, passwdPath);
}
}
IAuthorizator authorizator = null;
String authorizatorClassName = props.getProperty(Constants.AUTHORIZATOR_CLASS_NAME, "");
if (!authorizatorClassName.isEmpty()) {
authorizator = (IAuthorizator)loadClass(authorizatorClassName, IAuthorizator.class);
LOG.info("Loaded custom authorizator {}", authorizatorClassName);
}
if (authorizator == null) {
String aclFilePath = props.getProperty(ACL_FILE_PROPERTY_NAME, "");
if (aclFilePath != null && !aclFilePath.isEmpty()) {
authorizator = new DenyAllAuthorizator();
File aclFile = new File(configPath, aclFilePath);
try {
authorizator = ACLFileParser.parse(aclFile);
} catch (ParseException pex) {
LOG.error(String.format("Format error in parsing acl file %s", aclFile), pex);
}
LOG.info("Using acl file defined at path {}", aclFilePath);
} else {
authorizator = new PermitAllAuthorizator();
LOG.info("Starting without ACL definition");
}
}
boolean allowAnonymous = Boolean.parseBoolean(props.getProperty(ALLOW_ANONYMOUS_PROPERTY_NAME, "true"));
m_processor.init(subscriptions, messagesStore, sessionsStore, authenticator, allowAnonymous, authorizator, m_interceptor);
return m_processor;
}
#location 28
#vulnerability type NULL_DEREFERENCE
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
protected void handleConnect(IoSession session, ConnectMessage msg) {
LOG.info("handleConnect invoked");
m_messaging.connect(session, msg);
}
|
#vulnerable code
protected void handleConnect(IoSession session, ConnectMessage msg) {
LOG.info("handleConnect invoked");
if (msg.getProcotolVersion() != 0x03) {
ConnAckMessage badProto = new ConnAckMessage();
badProto.setReturnCode(ConnAckMessage.UNNACEPTABLE_PROTOCOL_VERSION);
session.write(badProto);
session.close(false);
return;
}
if (msg.getClientID() == null || msg.getClientID().length() > 23) {
ConnAckMessage okResp = new ConnAckMessage();
okResp.setReturnCode(ConnAckMessage.IDENTIFIER_REJECTED);
session.write(okResp);
return;
}
m_clientIDsLock.lock();
try {
//if an old client with the same ID already exists close its session.
if (m_clientIDs.containsKey(msg.getClientID())) {
//clean the subscriptions if the old used a cleanSession = true
IoSession oldSession = m_clientIDs.get(msg.getClientID()).getSession();
boolean cleanSession = (Boolean) oldSession.getAttribute(Constants.CLEAN_SESSION);
if (cleanSession) {
//cleanup topic subscriptions
m_messaging.removeSubscriptions(msg.getClientID());
}
m_clientIDs.get(msg.getClientID()).getSession().close(false);
}
ConnectionDescriptor connDescr = new ConnectionDescriptor(msg.getClientID(), session, msg.isCleanSession());
m_clientIDs.put(msg.getClientID(), connDescr);
} finally {
m_clientIDsLock.unlock();
}
int keepAlive = msg.getKeepAlive();
session.setAttribute("keepAlive", keepAlive);
session.setAttribute(Constants.CLEAN_SESSION, msg.isCleanSession());
//used to track the client in the subscription and publishing phases.
session.setAttribute(Constants.ATTR_CLIENTID, msg.getClientID());
session.getConfig().setIdleTime(IdleStatus.READER_IDLE, Math.round(keepAlive * 1.5f));
//Handle will flag
if (msg.isWillFlag()) {
QOSType willQos = QOSType.values()[msg.getWillQos()];
m_messaging.publish(msg.getWillTopic(), msg.getWillMessage().getBytes(),
willQos, msg.isWillRetain(), msg.getClientID(), session);
}
//handle user authentication
if (msg.isUserFlag()) {
String pwd = null;
if (msg.isPasswordFlag()) {
pwd = msg.getPassword();
}
if (!m_authenticator.checkValid(msg.getUsername(), pwd)) {
ConnAckMessage okResp = new ConnAckMessage();
okResp.setReturnCode(ConnAckMessage.BAD_USERNAME_OR_PASSWORD);
session.write(okResp);
return;
}
}
//handle clean session flag
if (msg.isCleanSession()) {
//remove all prev subscriptions
//cleanup topic subscriptions
m_messaging.removeSubscriptions(msg.getClientID());
} else {
//force the republish of stored QoS1 and QoS2
m_messaging.republishStored(msg.getClientID());
}
ConnAckMessage okResp = new ConnAckMessage();
okResp.setReturnCode(ConnAckMessage.CONNECTION_ACCEPTED);
session.write(okResp);
}
#location 60
#vulnerability type THREAD_SAFETY_VIOLATION
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
@Test
public void testPublishWithQoS2() throws Exception {
LOG.info("*** testPublishWithQoS2 ***");
MqttConnectOptions options = new MqttConnectOptions();
options.setCleanSession(false);
m_client.connect(options);
m_client.subscribe("/topic", 2);
m_client.disconnect();
//publish a QoS 1 message another client publish a message on the topic
publishFromAnotherClient("/topic", "Hello MQTT".getBytes(), 2);
m_callback.reinit();
m_client.connect(options);
MqttMessage message = m_callback.getMessage(true);
assertEquals("Hello MQTT", message.toString());
assertEquals(2, message.getQos());
}
|
#vulnerable code
@Test
public void testPublishWithQoS2() throws Exception {
LOG.info("*** testPublishWithQoS2 ***");
MqttConnectOptions options = new MqttConnectOptions();
options.setCleanSession(false);
m_client.connect(options);
m_client.subscribe("/topic", 2);
m_client.disconnect();
//publish a QoS 1 message another client publish a message on the topic
publishFromAnotherClient("/topic", "Hello MQTT".getBytes(), 2);
m_callback.reinit();
m_client.connect(options);
assertEquals("Hello MQTT", m_callback.getMessage().toString());
assertEquals(2, m_callback.getMessage().getQos());
}
#location 15
#vulnerability type NULL_DEREFERENCE
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
protected void handleDisconnect(IoSession session, DisconnectMessage disconnectMessage) {
String clientID = (String) session.getAttribute(ATTR_CLIENTID);
//remove from clientIDs
// m_clientIDsLock.lock();
// try {
// m_clientIDs.remove(clientID);
// } finally {
// m_clientIDsLock.unlock();
// }
boolean cleanSession = (Boolean) session.getAttribute("cleanSession");
if (cleanSession) {
//cleanup topic subscriptions
m_messaging.removeSubscriptions(clientID);
}
//close the TCP connection
//session.close(true);
m_messaging.disconnect(session);
}
|
#vulnerable code
protected void handleDisconnect(IoSession session, DisconnectMessage disconnectMessage) {
String clientID = (String) session.getAttribute(ATTR_CLIENTID);
//remove from clientIDs
m_clientIDsLock.lock();
try {
m_clientIDs.remove(clientID);
} finally {
m_clientIDsLock.unlock();
}
boolean cleanSession = (Boolean) session.getAttribute("cleanSession");
if (cleanSession) {
//cleanup topic subscriptions
m_messaging.removeSubscriptions(clientID);
}
//close the TCP connection
session.close(true);
}
#location 13
#vulnerability type THREAD_SAFETY_VIOLATION
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
public void removeSubscription(String topic, String clientID) {
TreeNode oldRoot;
NodeCouple couple;
do {
oldRoot = subscriptions.get();
couple = recreatePath(topic, oldRoot);
//do the job
//search for the subscription to remove
Subscription toBeRemoved = null;
for (Subscription sub : couple.createdNode.subscriptions()) {
if (sub.topicFilter.equals(topic) && sub.getClientId().equals(clientID)) {
toBeRemoved = sub;
break;
}
}
if (toBeRemoved != null) {
couple.createdNode.subscriptions().remove(toBeRemoved);
}
//spin lock repeating till we can, swap root, if can't swap just re-do the operation
} while(!subscriptions.compareAndSet(oldRoot, couple.root));
}
|
#vulnerable code
public void removeSubscription(String topic, String clientID) {
TreeNode matchNode = findMatchingNode(topic);
//search for the subscription to remove
Subscription toBeRemoved = null;
for (Subscription sub : matchNode.subscriptions()) {
if (sub.topicFilter.equals(topic) && sub.getClientId().equals(clientID)) {
toBeRemoved = sub;
break;
}
}
if (toBeRemoved != null) {
matchNode.subscriptions().remove(toBeRemoved);
}
}
#location 6
#vulnerability type NULL_DEREFERENCE
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
protected void handleConnect(IoSession session, ConnectMessage msg) {
LOG.info("handleConnect invoked");
m_messaging.connect(session, msg);
}
|
#vulnerable code
protected void handleConnect(IoSession session, ConnectMessage msg) {
LOG.info("handleConnect invoked");
if (msg.getProcotolVersion() != 0x03) {
ConnAckMessage badProto = new ConnAckMessage();
badProto.setReturnCode(ConnAckMessage.UNNACEPTABLE_PROTOCOL_VERSION);
session.write(badProto);
session.close(false);
return;
}
if (msg.getClientID() == null || msg.getClientID().length() > 23) {
ConnAckMessage okResp = new ConnAckMessage();
okResp.setReturnCode(ConnAckMessage.IDENTIFIER_REJECTED);
session.write(okResp);
return;
}
m_clientIDsLock.lock();
try {
//if an old client with the same ID already exists close its session.
if (m_clientIDs.containsKey(msg.getClientID())) {
//clean the subscriptions if the old used a cleanSession = true
IoSession oldSession = m_clientIDs.get(msg.getClientID()).getSession();
boolean cleanSession = (Boolean) oldSession.getAttribute(Constants.CLEAN_SESSION);
if (cleanSession) {
//cleanup topic subscriptions
m_messaging.removeSubscriptions(msg.getClientID());
}
m_clientIDs.get(msg.getClientID()).getSession().close(false);
}
ConnectionDescriptor connDescr = new ConnectionDescriptor(msg.getClientID(), session, msg.isCleanSession());
m_clientIDs.put(msg.getClientID(), connDescr);
} finally {
m_clientIDsLock.unlock();
}
int keepAlive = msg.getKeepAlive();
session.setAttribute("keepAlive", keepAlive);
session.setAttribute(Constants.CLEAN_SESSION, msg.isCleanSession());
//used to track the client in the subscription and publishing phases.
session.setAttribute(Constants.ATTR_CLIENTID, msg.getClientID());
session.getConfig().setIdleTime(IdleStatus.READER_IDLE, Math.round(keepAlive * 1.5f));
//Handle will flag
if (msg.isWillFlag()) {
QOSType willQos = QOSType.values()[msg.getWillQos()];
m_messaging.publish(msg.getWillTopic(), msg.getWillMessage().getBytes(),
willQos, msg.isWillRetain(), msg.getClientID(), session);
}
//handle user authentication
if (msg.isUserFlag()) {
String pwd = null;
if (msg.isPasswordFlag()) {
pwd = msg.getPassword();
}
if (!m_authenticator.checkValid(msg.getUsername(), pwd)) {
ConnAckMessage okResp = new ConnAckMessage();
okResp.setReturnCode(ConnAckMessage.BAD_USERNAME_OR_PASSWORD);
session.write(okResp);
return;
}
}
//handle clean session flag
if (msg.isCleanSession()) {
//remove all prev subscriptions
//cleanup topic subscriptions
m_messaging.removeSubscriptions(msg.getClientID());
} else {
//force the republish of stored QoS1 and QoS2
m_messaging.republishStored(msg.getClientID());
}
ConnAckMessage okResp = new ConnAckMessage();
okResp.setReturnCode(ConnAckMessage.CONNECTION_ACCEPTED);
session.write(okResp);
}
#location 75
#vulnerability type THREAD_SAFETY_VIOLATION
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
private void processInit(Properties props) {
benchmarkEnabled = Boolean.parseBoolean(System.getProperty("moquette.processor.benchmark", "false"));
//TODO use a property to select the storage path
MapDBPersistentStore mapStorage = new MapDBPersistentStore(props.getProperty(PERSISTENT_STORE_PROPERTY_NAME, ""));
m_storageService = mapStorage;
m_sessionsStore = mapStorage;
m_storageService.initStore();
//List<Subscription> storedSubscriptions = m_sessionsStore.listAllSubscriptions();
//subscriptions.init(storedSubscriptions);
subscriptions.init(m_sessionsStore);
IAuthenticator authenticator = null;
String configPath = System.getProperty("moquette.path", null);
String authenticatorClassName = props.getProperty(Constants.AUTHENTICATOR_CLASS_NAME, "");
if(!authenticatorClassName.isEmpty()) {
try {
authenticator = this.getClass().getClassLoader()
.loadClass(authenticatorClassName)
.asSubclass(IAuthenticator.class)
.newInstance();
LOG.info("Loaded custom authenticator {}", authenticatorClassName);
} catch (InstantiationException | IllegalAccessException | ClassNotFoundException ex) {
LOG.error("Cannot load custom authenticator class " + authenticatorClassName, ex);
}
}
if(authenticator == null) {
String passwdPath = props.getProperty(PASSWORD_FILE_PROPERTY_NAME, "");
if (passwdPath.isEmpty()) {
authenticator = new AcceptAllAuthenticator();
} else {
authenticator = new FileAuthenticator(configPath, passwdPath);
}
}
IAuthorizator authorizator = null;
String authorizatorClassName = props.getProperty(Constants.AUTHORIZATOR_CLASS_NAME, "");
if(!authorizatorClassName.isEmpty()) {
try {
authorizator = this.getClass().getClassLoader()
.loadClass(authorizatorClassName)
.asSubclass(IAuthorizator.class)
.newInstance();
LOG.info("Loaded custom authorizator {}", authorizatorClassName);
} catch (InstantiationException | IllegalAccessException | ClassNotFoundException ex) {
LOG.error("Cannot load custom authorizator class " + authenticatorClassName, ex);
}
}
if(authorizator == null) {
String aclFilePath = props.getProperty(ACL_FILE_PROPERTY_NAME, "");
if (aclFilePath != null && !aclFilePath.isEmpty()) {
authorizator = new DenyAllAuthorizator();
File aclFile = new File(configPath, aclFilePath);
try {
authorizator = ACLFileParser.parse(aclFile);
} catch (ParseException pex) {
LOG.error(String.format("Format error in parsing acl file %s", aclFile), pex);
}
LOG.info("Using acl file defined at path {}", aclFilePath);
} else {
authorizator = new PermitAllAuthorizator();
LOG.info("Starting without ACL definition");
}
}
boolean allowAnonymous = Boolean.parseBoolean(props.getProperty(ALLOW_ANONYMOUS_PROPERTY_NAME, "true"));
m_processor.init(subscriptions, m_storageService, m_sessionsStore, authenticator, allowAnonymous, authorizator);
}
|
#vulnerable code
private void processInit(Properties props) {
benchmarkEnabled = Boolean.parseBoolean(System.getProperty("moquette.processor.benchmark", "false"));
//TODO use a property to select the storage path
MapDBPersistentStore mapStorage = new MapDBPersistentStore(props.getProperty(PERSISTENT_STORE_PROPERTY_NAME, ""));
m_storageService = mapStorage;
m_sessionsStore = mapStorage;
m_storageService.initStore();
//List<Subscription> storedSubscriptions = m_sessionsStore.listAllSubscriptions();
//subscriptions.init(storedSubscriptions);
subscriptions.init(m_sessionsStore);
String passwdPath = props.getProperty(PASSWORD_FILE_PROPERTY_NAME, "");
String configPath = System.getProperty("moquette.path", null);
IAuthenticator authenticator;
if (passwdPath.isEmpty()) {
authenticator = new AcceptAllAuthenticator();
} else {
authenticator = new FileAuthenticator(configPath, passwdPath);
}
String aclFilePath = props.getProperty(ACL_FILE_PROPERTY_NAME, "");
IAuthorizator authorizator;
if (aclFilePath != null && !aclFilePath.isEmpty()) {
authorizator = new DenyAllAuthorizator();
File aclFile = new File(configPath, aclFilePath);
try {
authorizator = ACLFileParser.parse(aclFile);
} catch (ParseException pex) {
LOG.error(String.format("Format error in parsing acl file %s", aclFile), pex);
}
LOG.info("Using acl file defined at path {}", aclFilePath);
} else {
authorizator = new PermitAllAuthorizator();
LOG.info("Starting without ACL definition");
}
boolean allowAnonymous = Boolean.parseBoolean(props.getProperty(ALLOW_ANONYMOUS_PROPERTY_NAME, "true"));
m_processor.init(subscriptions, m_storageService, m_sessionsStore, authenticator, allowAnonymous, authorizator);
}
#location 18
#vulnerability type NULL_DEREFERENCE
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
public static GitRepositoryState getGitRepositoryState() throws IOException {
Properties properties = new Properties();
try {
InputStream inputStream = new FileInputStream("config/git.properties");
BufferedReader bf = new BufferedReader(new InputStreamReader(inputStream));
properties.load(bf);
} catch (IOException e) {
}
GitRepositoryState gitRepositoryState = new GitRepositoryState(properties);
return gitRepositoryState;
}
|
#vulnerable code
public static GitRepositoryState getGitRepositoryState() throws IOException {
Properties properties = new Properties();
try {
properties.load(new FileInputStream("config/git.properties"));
} catch (IOException e) {
}
GitRepositoryState gitRepositoryState = new GitRepositoryState(properties);
return gitRepositoryState;
}
#location 4
#vulnerability type RESOURCE_LEAK
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
public void startServer(IConfig config, List<? extends InterceptHandler> handlers) throws IOException {
startServer(config, handlers, null, null, null);
}
|
#vulnerable code
public void startServer(IConfig config, List<? extends InterceptHandler> handlers) throws IOException {
startServer(config, handlers, null);
}
#location 2
#vulnerability type NULL_DEREFERENCE
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
@Override
public WFCMessage.PullMessageResult fetchChatroomMessage(String fromUser, String chatroomId, String exceptClientId, long fromMessageId) {
WFCMessage.PullMessageResult.Builder builder = WFCMessage.PullMessageResult.newBuilder();
HazelcastInstance hzInstance = m_Server.getHazelcastInstance();
IMap<Long, MessageBundle> mIMap = hzInstance.getMap(MESSAGES_MAP);
long head = fromMessageId;
long current = fromMessageId;
TreeMap<Long, Long> maps = chatroomMessages.get(chatroomId);
if (maps == null) {
mWriteLock.lock();
try {
maps = chatroomMessages.get(chatroomId);
if (maps == null) {
maps = new TreeMap<>();
chatroomMessages.put(chatroomId, maps);
}
} finally {
mWriteLock.unlock();
}
}
mReadLock.lock();
int size = 0;
try {
maps = chatroomMessages.get(chatroomId);
while (true) {
Map.Entry<Long, Long> entry = maps.higherEntry(current);
if (entry == null) {
break;
}
current = entry.getKey();
long targetMessageId = entry.getValue();
MessageBundle bundle = mIMap.get(targetMessageId);
if (bundle != null) {
if (exceptClientId == null || !exceptClientId.equals(bundle.getFromClientId()) || !fromUser.equals(bundle.getFromUser())) {
size += bundle.getMessage().getSerializedSize();
if (size >= 3 * 1024 * 1024) { //3M
break;
}
builder.addMessage(bundle.getMessage());
}
}
}
Map.Entry<Long, Long> lastEntry = maps.lastEntry();
if (lastEntry != null) {
head = lastEntry.getKey();
}
} finally {
mReadLock.unlock();
}
builder.setCurrent(current);
builder.setHead(head);
return builder.build();
}
|
#vulnerable code
@Override
public WFCMessage.PullMessageResult fetchChatroomMessage(String fromUser, String chatroomId, String exceptClientId, long fromMessageId) {
WFCMessage.PullMessageResult.Builder builder = WFCMessage.PullMessageResult.newBuilder();
HazelcastInstance hzInstance = m_Server.getHazelcastInstance();
IMap<Long, MessageBundle> mIMap = hzInstance.getMap(MESSAGES_MAP);
long head = fromMessageId;
long current = fromMessageId;
TreeMap<Long, Long> maps = chatroomMessages.get(chatroomId);
if (maps == null) {
mWriteLock.lock();
try {
maps = chatroomMessages.get(chatroomId);
if (maps == null) {
maps = new TreeMap<>();
chatroomMessages.put(chatroomId, maps);
}
} finally {
mWriteLock.unlock();
}
}
mReadLock.lock();
int size = 0;
try {
maps = chatroomMessages.get(chatroomId);
while (true) {
Map.Entry<Long, Long> entry = maps.higherEntry(current);
if (entry == null) {
break;
}
current = entry.getKey();
long targetMessageId = entry.getValue();
MessageBundle bundle = mIMap.get(targetMessageId);
if (bundle == null) {
bundle = databaseStore.getMessage(targetMessageId);
}
if (bundle != null) {
if (exceptClientId == null || !exceptClientId.equals(bundle.getFromClientId()) || !fromUser.equals(bundle.getFromUser())) {
size += bundle.getMessage().getSerializedSize();
if (size >= 3 * 1024 * 1024) { //3M
break;
}
builder.addMessage(bundle.getMessage());
}
}
}
Map.Entry<Long, Long> lastEntry = maps.lastEntry();
if (lastEntry != null) {
head = lastEntry.getKey();
}
} finally {
mReadLock.unlock();
}
builder.setCurrent(current);
builder.setHead(head);
return builder.build();
}
#location 41
#vulnerability type THREAD_SAFETY_VIOLATION
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
@Test
public void avoidMultipleNotificationsAfterMultipleReconnection_cleanSessionFalseQoS1() throws Exception {
LOG.info("*** avoidMultipleNotificationsAfterMultipleReconnection_cleanSessionFalseQoS1, issue #16 ***");
MqttConnectOptions options = new MqttConnectOptions();
options.setCleanSession(false);
m_client.connect(options);
m_client.subscribe("/topic", 1);
m_client.disconnect();
publishFromAnotherClient("/topic", "Hello MQTT 1".getBytes(), 1);
m_callback.reinit();
m_client.connect(options);
assertNotNull(m_callback);
MqttMessage message = m_callback.getMessage(true);
assertNotNull(message);
assertEquals("Hello MQTT 1", message.toString());
m_client.disconnect();
//publish other message
publishFromAnotherClient("/topic", "Hello MQTT 2".getBytes(), 1);
//reconnect the second time
m_callback.reinit();
m_client.connect(options);
assertNotNull(m_callback);
message = m_callback.getMessage(true);
assertNotNull(message);
assertEquals("Hello MQTT 2", message.toString());
}
|
#vulnerable code
@Test
public void avoidMultipleNotificationsAfterMultipleReconnection_cleanSessionFalseQoS1() throws Exception {
LOG.info("*** avoidMultipleNotificationsAfterMultipleReconnection_cleanSessionFalseQoS1, issue #16 ***");
MqttConnectOptions options = new MqttConnectOptions();
options.setCleanSession(false);
m_client.connect(options);
m_client.subscribe("/topic", 1);
m_client.disconnect();
publishFromAnotherClient("/topic", "Hello MQTT 1".getBytes(), 1);
m_callback.reinit();
m_client.connect(options);
assertNotNull(m_callback);
assertNotNull(m_callback.getMessage());
assertEquals("Hello MQTT 1", m_callback.getMessage().toString());
m_client.disconnect();
//publish other message
publishFromAnotherClient("/topic", "Hello MQTT 2".getBytes(), 1);
//reconnect the second time
m_callback.reinit();
m_client.connect(options);
assertNotNull(m_callback);
assertNotNull(m_callback.getMessage());
assertEquals("Hello MQTT 2", m_callback.getMessage().toString());
}
#location 16
#vulnerability type NULL_DEREFERENCE
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
@Override
public int getNotifyReceivers(String fromUser, WFCMessage.Message.Builder messageBuilder, Set<String> notifyReceivers, boolean ignoreMsg) {
WFCMessage.Message message = messageBuilder.build();
HazelcastInstance hzInstance = m_Server.getHazelcastInstance();
int type = message.getConversation().getType();
int pullType = ProtoConstants.PullType.Pull_Normal;
if (ignoreMsg) {
if (type == ProtoConstants.ConversationType.ConversationType_ChatRoom) {
pullType = ProtoConstants.PullType.Pull_ChatRoom;
}
if (message.getContent().getPersistFlag() != Transparent) {
notifyReceivers.add(fromUser);
}
return pullType;
}
if (type == ProtoConstants.ConversationType.ConversationType_Private) {
notifyReceivers.add(fromUser);
notifyReceivers.add(message.getConversation().getTarget());
pullType = ProtoConstants.PullType.Pull_Normal;
} else if (type == ProtoConstants.ConversationType.ConversationType_Group) {
notifyReceivers.add(fromUser);
if (!StringUtil.isNullOrEmpty(message.getToUser())) {
notifyReceivers.add(message.getToUser());
} else if(message.getToList()!=null && !message.getToList().isEmpty()) {
MultiMap<String, WFCMessage.GroupMember> groupMembers = hzInstance.getMultiMap(GROUP_MEMBERS);
Collection<WFCMessage.GroupMember> members = groupMembers.get(message.getConversation().getTarget());
if (members == null || members.size() == 0) {
members = loadGroupMemberFromDB(hzInstance, message.getConversation().getTarget());
}
for (WFCMessage.GroupMember member : members) {
if (member.getType() != GroupMemberType_Removed && message.getToList().contains(member.getMemberId())) {
notifyReceivers.add(member.getMemberId());
}
}
} else {
MultiMap<String, WFCMessage.GroupMember> groupMembers = hzInstance.getMultiMap(GROUP_MEMBERS);
Collection<WFCMessage.GroupMember> members = groupMembers.get(message.getConversation().getTarget());
if (members == null || members.size() == 0) {
members = loadGroupMemberFromDB(hzInstance, message.getConversation().getTarget());
}
for (WFCMessage.GroupMember member : members) {
if (member.getType() != GroupMemberType_Removed) {
notifyReceivers.add(member.getMemberId());
}
}
}
//如果是群助手的消息,返回pull type group,否则返回normal
//群助手还没有实现
pullType = ProtoConstants.PullType.Pull_Normal;
} else if (type == ProtoConstants.ConversationType.ConversationType_ChatRoom) {
boolean isDirect = !StringUtil.isNullOrEmpty(message.getToUser());
Collection<UserClientEntry> entries = getChatroomMembers(message.getConversation().getTarget());
for (UserClientEntry entry : entries) {
if (isDirect) {
if (entry.userId.equals(message.getToUser())) {
notifyReceivers.add(message.getToUser());
break;
}
} else {
notifyReceivers.add(entry.userId);
}
}
pullType = ProtoConstants.PullType.Pull_ChatRoom;
} else if(type == ProtoConstants.ConversationType.ConversationType_Channel) {
WFCMessage.ChannelInfo channelInfo = getChannelInfo(message.getConversation().getTarget());
if (channelInfo != null) {
notifyReceivers.add(fromUser);
if (channelInfo.getOwner().equals(fromUser)) {
Collection<String> listeners = getChannelListener(message.getConversation().getTarget());
if (!StringUtil.isNullOrEmpty(message.getToUser())) {
if (listeners.contains(message.getToUser())) {
notifyReceivers.add(message.getToUser());
}
} else if(message.getToList() != null && !message.getToList().isEmpty()) {
for (String to:message.getToList()) {
if (listeners.contains(to)) {
notifyReceivers.add(to);
}
}
} else {
notifyReceivers.addAll(listeners);
}
} else {
if (StringUtil.isNullOrEmpty(channelInfo.getCallback()) || channelInfo.getAutomatic() == 0) {
notifyReceivers.add(channelInfo.getOwner());
}
}
} else {
LOG.error("Channel not exist");
}
}
if (message.getContent().getPersistFlag() == Transparent) {
notifyReceivers.remove(fromUser);
}
return pullType;
}
|
#vulnerable code
@Override
public int getNotifyReceivers(String fromUser, WFCMessage.Message.Builder messageBuilder, Set<String> notifyReceivers, boolean ignoreMsg) {
WFCMessage.Message message = messageBuilder.build();
HazelcastInstance hzInstance = m_Server.getHazelcastInstance();
int type = message.getConversation().getType();
int pullType = ProtoConstants.PullType.Pull_Normal;
if (ignoreMsg) {
if (type == ProtoConstants.ConversationType.ConversationType_ChatRoom) {
pullType = ProtoConstants.PullType.Pull_ChatRoom;
}
if (message.getContent().getPersistFlag() != Transparent) {
notifyReceivers.add(fromUser);
}
return pullType;
}
if (type == ProtoConstants.ConversationType.ConversationType_Private) {
notifyReceivers.add(fromUser);
notifyReceivers.add(message.getConversation().getTarget());
pullType = ProtoConstants.PullType.Pull_Normal;
} else if (type == ProtoConstants.ConversationType.ConversationType_Group) {
notifyReceivers.add(fromUser);
if (!StringUtil.isNullOrEmpty(message.getToUser())) {
notifyReceivers.add(message.getToUser());
} else if(message.getToList()!=null && !message.getToList().isEmpty()) {
MultiMap<String, WFCMessage.GroupMember> groupMembers = hzInstance.getMultiMap(GROUP_MEMBERS);
Collection<WFCMessage.GroupMember> members = groupMembers.get(message.getConversation().getTarget());
if (members == null || members.size() == 0) {
members = loadGroupMemberFromDB(hzInstance, message.getConversation().getTarget());
}
for (WFCMessage.GroupMember member : members) {
if (member.getType() != GroupMemberType_Removed && message.getToList().contains(member.getMemberId())) {
notifyReceivers.add(member.getMemberId());
}
}
} else {
MultiMap<String, WFCMessage.GroupMember> groupMembers = hzInstance.getMultiMap(GROUP_MEMBERS);
Collection<WFCMessage.GroupMember> members = groupMembers.get(message.getConversation().getTarget());
if (members == null || members.size() == 0) {
members = loadGroupMemberFromDB(hzInstance, message.getConversation().getTarget());
}
for (WFCMessage.GroupMember member : members) {
if (member.getType() != GroupMemberType_Removed) {
notifyReceivers.add(member.getMemberId());
}
}
}
//如果是群助手的消息,返回pull type group,否则返回normal
//群助手还没有实现
pullType = ProtoConstants.PullType.Pull_Normal;
} else if (type == ProtoConstants.ConversationType.ConversationType_ChatRoom) {
boolean isDirect = !StringUtil.isNullOrEmpty(message.getToUser());
Collection<UserClientEntry> entries = getChatroomMembers(message.getConversation().getTarget());
for (UserClientEntry entry : entries) {
if (isDirect) {
if (entry.userId.equals(message.getToUser())) {
notifyReceivers.add(message.getToUser());
break;
}
} else {
notifyReceivers.add(entry.userId);
}
}
pullType = ProtoConstants.PullType.Pull_ChatRoom;
} else if(type == ProtoConstants.ConversationType.ConversationType_Channel) {
WFCMessage.ChannelInfo channelInfo = getChannelInfo(message.getConversation().getTarget());
if (channelInfo != null) {
notifyReceivers.add(fromUser);
if (channelInfo.getOwner().equals(fromUser)) {
MultiMap<String, String> listeners = hzInstance.getMultiMap(CHANNEL_LISTENERS);
if (!StringUtil.isNullOrEmpty(message.getToUser())) {
if (listeners.values().contains(message.getToUser())) {
notifyReceivers.add(message.getToUser());
}
} else if(message.getToList() != null && !message.getToList().isEmpty()) {
Collection<String> ls = listeners.get(message.getConversation().getTarget());
for (String to:message.getToList()) {
if (ls.contains(to)) {
notifyReceivers.add(to);
}
}
} else {
notifyReceivers.addAll(listeners.get(message.getConversation().getTarget()));
}
} else {
if (StringUtil.isNullOrEmpty(channelInfo.getCallback()) || channelInfo.getAutomatic() == 0) {
notifyReceivers.add(channelInfo.getOwner());
}
}
} else {
LOG.error("Channel not exist");
}
}
if (message.getContent().getPersistFlag() == Transparent) {
notifyReceivers.remove(fromUser);
}
return pullType;
}
#location 3
#vulnerability type THREAD_SAFETY_VIOLATION
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
@Test
public void checkWillMessageIsWiredOnClientKeepAliveExpiry() throws Exception {
LOG.info("*** checkWillMessageIsWiredOnClientKeepAliveExpiry ***");
String willTestamentTopic = "/will/test";
String willTestamentMsg = "Bye bye";
m_willSubscriber.connect();
m_willSubscriber.subscribe(willTestamentTopic, 0);
connect(willTestamentTopic, willTestamentMsg);
long connectTime = System.currentTimeMillis();
//but after the 2 KEEP ALIVE timeout expires it gets fired,
//NB it's 1,5 * KEEP_ALIVE so 3 secs and some millis to propagate the message
MqttMessage msg = m_messageCollector.getMessage(3300);
long willMessageReceiveTime = System.currentTimeMillis();
assertNotNull("the will message should be fired after keep alive!", msg);
//the will message hasn't to be received before the elapsing of Keep Alive timeout
assertTrue(willMessageReceiveTime - connectTime > 3000);
assertEquals(willTestamentMsg, new String(msg.getPayload()));
m_willSubscriber.disconnect();
}
|
#vulnerable code
@Test
public void checkWillMessageIsWiredOnClientKeepAliveExpiry() throws Exception {
LOG.info("*** checkWillMessageIsWiredOnClientKeepAliveExpiry ***");
String willTestamentTopic = "/will/test";
String willTestamentMsg = "Bye bye";
m_willSubscriber.connect();
m_willSubscriber.subscribe(willTestamentTopic, 0);
int keepAlive = 2; //secs
ConnectMessage connectMessage = new ConnectMessage();
connectMessage.setProtocolVersion((byte) 3);
connectMessage.setClientID("FAKECLNT");
connectMessage.setKeepAlive(keepAlive);
connectMessage.setWillFlag(true);
connectMessage.setWillMessage(willTestamentMsg.getBytes());
connectMessage.setWillTopic(willTestamentTopic);
connectMessage.setWillQos(QOSType.MOST_ONE.byteValue());
//Execute
m_client.sendMessage(connectMessage);
long connectTime = System.currentTimeMillis();
//but after the 2 KEEP ALIVE timeout expires it gets fired,
//NB it's 1,5 * KEEP_ALIVE so 3 secs and some millis to propagate the message
MqttMessage msg = m_messageCollector.getMessage(3300);
long willMessageReceiveTime = System.currentTimeMillis();
if (msg == null) {
LOG.warn("testament message is null");
}
assertNotNull("the will message should be fired after keep alive!", msg);
//the will message hasn't to be received before the elapsing of Keep Alive timeout
assertTrue(willMessageReceiveTime - connectTime > 3000);
assertEquals(willTestamentMsg, new String(msg.getPayload()));
m_willSubscriber.disconnect();
}
#location 35
#vulnerability type NULL_DEREFERENCE
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
@Override
public WFCMessage.Message getMessage(long messageId) {
HazelcastInstance hzInstance = m_Server.getHazelcastInstance();
IMap<Long, MessageBundle> mIMap = hzInstance.getMap(MESSAGES_MAP);
MessageBundle bundle = mIMap.get(messageId);
if (bundle != null) {
return bundle.getMessage();
}
return null;
}
|
#vulnerable code
@Override
public WFCMessage.Message getMessage(long messageId) {
HazelcastInstance hzInstance = m_Server.getHazelcastInstance();
IMap<Long, MessageBundle> mIMap = hzInstance.getMap(MESSAGES_MAP);
MessageBundle bundle = mIMap.get(messageId);
if (bundle != null) {
return bundle.getMessage();
} else {
bundle = databaseStore.getMessage(messageId);
if (bundle != null)
return bundle.getMessage();
}
return null;
}
#location 9
#vulnerability type THREAD_SAFETY_VIOLATION
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
@Test
public void testPublishReceiveWithQoS2() throws Exception {
LOG.info("*** testPublishReceiveWithQoS2 ***");
MqttConnectOptions options = new MqttConnectOptions();
options.setCleanSession(false);
m_client.connect(options);
m_client.subscribe("/topic", 2);
m_client.disconnect();
//publish a QoS 2 message another client publish a message on the topic
publishFromAnotherClient("/topic", "Hello MQTT".getBytes(), 2);
m_callback.reinit();
m_client.connect(options);
assertNotNull(m_callback);
MqttMessage message = m_callback.getMessage(true);
assertNotNull(message);
assertEquals("Hello MQTT", message.toString());
}
|
#vulnerable code
@Test
public void testPublishReceiveWithQoS2() throws Exception {
LOG.info("*** testPublishReceiveWithQoS2 ***");
MqttConnectOptions options = new MqttConnectOptions();
options.setCleanSession(false);
m_client.connect(options);
m_client.subscribe("/topic", 2);
m_client.disconnect();
//publish a QoS 2 message another client publish a message on the topic
publishFromAnotherClient("/topic", "Hello MQTT".getBytes(), 2);
m_callback.reinit();
m_client.connect(options);
assertNotNull(m_callback);
assertNotNull(m_callback.getMessage());
assertEquals("Hello MQTT", m_callback.getMessage().toString());
}
#location 17
#vulnerability type NULL_DEREFERENCE
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
@Override
public void initialize(ProtocolProcessor processor, IConfig props, ISslContextCreator sslCtxCreator)
throws IOException {
LOG.info("Initializing Netty acceptor...");
nettySoBacklog = Integer.parseInt(props.getProperty(BrokerConstants.NETTY_SO_BACKLOG_PROPERTY_NAME, "128"));
nettySoReuseaddr = Boolean
.parseBoolean(props.getProperty(BrokerConstants.NETTY_SO_REUSEADDR_PROPERTY_NAME, "true"));
nettyTcpNodelay = Boolean
.parseBoolean(props.getProperty(BrokerConstants.NETTY_TCP_NODELAY_PROPERTY_NAME, "true"));
nettySoKeepalive = Boolean
.parseBoolean(props.getProperty(BrokerConstants.NETTY_SO_KEEPALIVE_PROPERTY_NAME, "true"));
nettyChannelTimeoutSeconds = Integer
.parseInt(props.getProperty(BrokerConstants.NETTY_CHANNEL_TIMEOUT_SECONDS_PROPERTY_NAME, "10"));
boolean epoll = Boolean.parseBoolean(props.getProperty(BrokerConstants.NETTY_EPOLL_PROPERTY_NAME, "false"));
if (epoll) {
// 由于目前只支持TCP MQTT, 所以bossGroup的线程数配置为1
LOG.info("Netty is using Epoll");
m_bossGroup = new EpollEventLoopGroup(1);
m_workerGroup = new EpollEventLoopGroup();
channelClass = EpollServerSocketChannel.class;
} else {
LOG.info("Netty is using NIO");
m_bossGroup = new NioEventLoopGroup(1);
m_workerGroup = new NioEventLoopGroup();
channelClass = NioServerSocketChannel.class;
}
final NettyMQTTHandler mqttHandler = new NettyMQTTHandler(processor);
final boolean useFineMetrics = Boolean.parseBoolean(props.getProperty(METRICS_ENABLE_PROPERTY_NAME, "false"));
if (useFineMetrics) {
DropWizardMetricsHandler metricsHandler = new DropWizardMetricsHandler();
metricsHandler.init(props);
this.metrics = Optional.of(metricsHandler);
} else {
this.metrics = Optional.empty();
}
this.errorsCather = Optional.empty();
initializePlainTCPTransport(mqttHandler, props);
initializeWebSocketTransport(mqttHandler, props);
String sslTcpPortProp = props.getProperty(BrokerConstants.SSL_PORT_PROPERTY_NAME);
String wssPortProp = props.getProperty(BrokerConstants.WSS_PORT_PROPERTY_NAME);
if (sslTcpPortProp != null || wssPortProp != null) {
SSLContext sslContext = sslCtxCreator.initSSLContext();
if (sslContext == null) {
LOG.error("Can't initialize SSLHandler layer! Exiting, check your configuration of jks");
return;
}
initializeSSLTCPTransport(mqttHandler, props, sslContext);
initializeWSSTransport(mqttHandler, props, sslContext);
}
}
|
#vulnerable code
@Override
public void initialize(ProtocolProcessor processor, IConfig props, ISslContextCreator sslCtxCreator)
throws IOException {
LOG.info("Initializing Netty acceptor...");
nettySoBacklog = Integer.parseInt(props.getProperty(BrokerConstants.NETTY_SO_BACKLOG_PROPERTY_NAME, "128"));
nettySoReuseaddr = Boolean
.parseBoolean(props.getProperty(BrokerConstants.NETTY_SO_REUSEADDR_PROPERTY_NAME, "true"));
nettyTcpNodelay = Boolean
.parseBoolean(props.getProperty(BrokerConstants.NETTY_TCP_NODELAY_PROPERTY_NAME, "true"));
nettySoKeepalive = Boolean
.parseBoolean(props.getProperty(BrokerConstants.NETTY_SO_KEEPALIVE_PROPERTY_NAME, "true"));
nettyChannelTimeoutSeconds = Integer
.parseInt(props.getProperty(BrokerConstants.NETTY_CHANNEL_TIMEOUT_SECONDS_PROPERTY_NAME, "10"));
boolean epoll = Boolean.parseBoolean(props.getProperty(BrokerConstants.NETTY_EPOLL_PROPERTY_NAME, "false"));
if (epoll) {
// 由于目前只支持TCP MQTT, 所以bossGroup的线程数配置为1
LOG.info("Netty is using Epoll");
m_bossGroup = new EpollEventLoopGroup(1);
m_workerGroup = new EpollEventLoopGroup();
channelClass = EpollServerSocketChannel.class;
} else {
LOG.info("Netty is using NIO");
m_bossGroup = new NioEventLoopGroup(1);
m_workerGroup = new NioEventLoopGroup();
channelClass = NioServerSocketChannel.class;
}
final NettyMQTTHandler mqttHandler = new NettyMQTTHandler(processor);
final boolean useFineMetrics = Boolean.parseBoolean(props.getProperty(METRICS_ENABLE_PROPERTY_NAME, "false"));
if (useFineMetrics) {
DropWizardMetricsHandler metricsHandler = new DropWizardMetricsHandler();
metricsHandler.init(props);
this.metrics = Optional.of(metricsHandler);
} else {
this.metrics = Optional.empty();
}
final boolean useBugSnag = Boolean.parseBoolean(props.getProperty(BUGSNAG_ENABLE_PROPERTY_NAME, "false"));
if (useBugSnag) {
BugSnagErrorsHandler bugSnagHandler = new BugSnagErrorsHandler();
bugSnagHandler.init(props);
this.errorsCather = Optional.of(bugSnagHandler);
} else {
this.errorsCather = Optional.empty();
}
initializePlainTCPTransport(mqttHandler, props);
initializeWebSocketTransport(mqttHandler, props);
String sslTcpPortProp = props.getProperty(BrokerConstants.SSL_PORT_PROPERTY_NAME);
String wssPortProp = props.getProperty(BrokerConstants.WSS_PORT_PROPERTY_NAME);
if (sslTcpPortProp != null || wssPortProp != null) {
SSLContext sslContext = sslCtxCreator.initSSLContext();
if (sslContext == null) {
LOG.error("Can't initialize SSLHandler layer! Exiting, check your configuration of jks");
return;
}
initializeSSLTCPTransport(mqttHandler, props, sslContext);
initializeWSSTransport(mqttHandler, props, sslContext);
}
}
#location 45
#vulnerability type RESOURCE_LEAK
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
@Override
public WFCMessage.PullMessageResult fetchMessage(String user, String exceptClientId, long fromMessageId, int pullType) {
WFCMessage.PullMessageResult.Builder builder = WFCMessage.PullMessageResult.newBuilder();
HazelcastInstance hzInstance = m_Server.getHazelcastInstance();
IMap<Long, MessageBundle> mIMap = hzInstance.getMap(MESSAGES_MAP);
MemorySessionStore.Session session = m_Server.getStore().sessionsStore().getSession(exceptClientId);
session.refreshLastActiveTime();
if (pullType != ProtoConstants.PullType.Pull_ChatRoom) {
session.setUnReceivedMsgs(0);
} else {
session.refreshLastChatroomActiveTime();
}
String chatroomId = null;
if (pullType == ProtoConstants.PullType.Pull_ChatRoom) {
chatroomId = (String)m_Server.getHazelcastInstance().getMap(USER_CHATROOM).get(user);
}
long head = fromMessageId;
long current = fromMessageId;
TreeMap<Long, Long> maps;
if (pullType != ProtoConstants.PullType.Pull_ChatRoom) {
maps = userMessages.get(user);
if (maps == null) {
loadUserMessages(user);
}
maps = userMessages.get(user);
} else {
maps = chatroomMessages.get(user);
if (maps == null) {
mWriteLock.lock();
try {
maps = chatroomMessages.get(user);
if (maps == null) {
maps = new TreeMap<>();
chatroomMessages.put(user, maps);
}
} finally {
mWriteLock.unlock();
}
}
}
mReadLock.lock();
int size = 0;
try {
if (pullType != ProtoConstants.PullType.Pull_ChatRoom) {
userMaxPullSeq.compute(user, (s, aLong) -> {
if (aLong == null || aLong < fromMessageId) {
return fromMessageId;
} else {
return aLong;
}
});
}
while (true) {
Map.Entry<Long, Long> entry = maps.higherEntry(current);
if (entry == null) {
break;
}
current = entry.getKey();
long targetMessageId = entry.getValue();
MessageBundle bundle = mIMap.get(targetMessageId);
if (bundle != null) {
if (exceptClientId == null || !exceptClientId.equals(bundle.getFromClientId()) || !user.equals(bundle.getFromUser())) {
if (pullType == ProtoConstants.PullType.Pull_ChatRoom) {
if (!bundle.getMessage().getConversation().getTarget().equals(chatroomId)) {
continue;
}
}
size += bundle.getMessage().getSerializedSize();
if (size >= 1 * 1024 * 1024) { //3M
break;
}
builder.addMessage(bundle.getMessage());
}
}
}
Map.Entry<Long, Long> lastEntry = maps.lastEntry();
if (lastEntry != null) {
head = lastEntry.getKey();
}
} finally {
mReadLock.unlock();
}
builder.setCurrent(current);
builder.setHead(head);
return builder.build();
}
|
#vulnerable code
@Override
public WFCMessage.PullMessageResult fetchMessage(String user, String exceptClientId, long fromMessageId, int pullType) {
WFCMessage.PullMessageResult.Builder builder = WFCMessage.PullMessageResult.newBuilder();
HazelcastInstance hzInstance = m_Server.getHazelcastInstance();
IMap<Long, MessageBundle> mIMap = hzInstance.getMap(MESSAGES_MAP);
MemorySessionStore.Session session = m_Server.getStore().sessionsStore().getSession(exceptClientId);
session.refreshLastActiveTime();
if (pullType != ProtoConstants.PullType.Pull_ChatRoom) {
session.setUnReceivedMsgs(0);
} else {
session.refreshLastChatroomActiveTime();
}
String chatroomId = null;
if (pullType == ProtoConstants.PullType.Pull_ChatRoom) {
chatroomId = (String)m_Server.getHazelcastInstance().getMap(USER_CHATROOM).get(user);
}
long head = fromMessageId;
long current = fromMessageId;
TreeMap<Long, Long> maps;
if (pullType != ProtoConstants.PullType.Pull_ChatRoom) {
maps = userMessages.get(user);
if (maps == null) {
loadUserMessages(user);
}
maps = userMessages.get(user);
} else {
maps = chatroomMessages.get(user);
if (maps == null) {
mWriteLock.lock();
try {
maps = chatroomMessages.get(user);
if (maps == null) {
maps = new TreeMap<>();
chatroomMessages.put(user, maps);
}
} finally {
mWriteLock.unlock();
}
}
}
mReadLock.lock();
int size = 0;
try {
if (pullType != ProtoConstants.PullType.Pull_ChatRoom) {
userMaxPullSeq.compute(user, (s, aLong) -> {
if (aLong == null || aLong < fromMessageId) {
return fromMessageId;
} else {
return aLong;
}
});
}
while (true) {
Map.Entry<Long, Long> entry = maps.higherEntry(current);
if (entry == null) {
break;
}
current = entry.getKey();
long targetMessageId = entry.getValue();
MessageBundle bundle = mIMap.get(targetMessageId);
if (bundle == null) {
bundle = databaseStore.getMessage(targetMessageId);
}
if (bundle != null) {
if (exceptClientId == null || !exceptClientId.equals(bundle.getFromClientId()) || !user.equals(bundle.getFromUser())) {
if (pullType == ProtoConstants.PullType.Pull_ChatRoom) {
if (!bundle.getMessage().getConversation().getTarget().equals(chatroomId)) {
continue;
}
}
size += bundle.getMessage().getSerializedSize();
if (size >= 1 * 1024 * 1024) { //3M
break;
}
builder.addMessage(bundle.getMessage());
}
}
}
Map.Entry<Long, Long> lastEntry = maps.lastEntry();
if (lastEntry != null) {
head = lastEntry.getKey();
}
} finally {
mReadLock.unlock();
}
builder.setCurrent(current);
builder.setHead(head);
return builder.build();
}
#location 72
#vulnerability type THREAD_SAFETY_VIOLATION
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
@Override
public void channelRead(ChannelHandlerContext ctx, Object message) {
AbstractMessage msg = (AbstractMessage) message;
LOG.info("Received a message of type {}", Utils.msgType2String(msg.getMessageType()));
try {
switch (msg.getMessageType()) {
case CONNECT:
case SUBSCRIBE:
case UNSUBSCRIBE:
case PUBLISH:
case PUBREC:
case PUBCOMP:
case PUBREL:
case DISCONNECT:
case PUBACK:
// NettyChannel channel;
// synchronized(m_channelMapper) {
// if (!m_channelMapper.containsKey(ctx)) {
// m_channelMapper.put(ctx, new NettyChannel(ctx));
// }
// channel = m_channelMapper.get(ctx);
// }
m_messaging.handleProtocolMessage(new NettyChannel(ctx), msg);
break;
case PINGREQ:
PingRespMessage pingResp = new PingRespMessage();
ctx.writeAndFlush(pingResp);
break;
}
} catch (Exception ex) {
LOG.error("Bad error in processing the message", ex);
}
}
|
#vulnerable code
@Override
public void channelRead(ChannelHandlerContext ctx, Object message) {
AbstractMessage msg = (AbstractMessage) message;
LOG.info("Received a message of type {}", Utils.msgType2String(msg.getMessageType()));
try {
switch (msg.getMessageType()) {
case CONNECT:
case SUBSCRIBE:
case UNSUBSCRIBE:
case PUBLISH:
case PUBREC:
case PUBCOMP:
case PUBREL:
case DISCONNECT:
case PUBACK:
NettyChannel channel;
synchronized(m_channelMapper) {
if (!m_channelMapper.containsKey(ctx)) {
m_channelMapper.put(ctx, new NettyChannel(ctx));
}
channel = m_channelMapper.get(ctx);
}
m_messaging.handleProtocolMessage(channel, msg);
break;
case PINGREQ:
PingRespMessage pingResp = new PingRespMessage();
ctx.writeAndFlush(pingResp);
break;
}
} catch (Exception ex) {
LOG.error("Bad error in processing the message", ex);
}
}
#location 24
#vulnerability type THREAD_SAFETY_VIOLATION
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
@Override
public ErrorCode handleFriendRequest(String userId, WFCMessage.HandleFriendRequest request, WFCMessage.Message.Builder msgBuilder, long[] heads, boolean isAdmin) {
HazelcastInstance hzInstance = m_Server.getHazelcastInstance();
if (isAdmin) {
MultiMap<String, FriendData> friendsMap = hzInstance.getMultiMap(USER_FRIENDS);
FriendData friendData1 = null;
Collection<FriendData> friendDatas = friendsMap.get(userId);
if (friendDatas == null || friendDatas.size() == 0) {
friendDatas = loadFriend(friendsMap, userId);
}
for (FriendData fd : friendDatas) {
if (fd.getFriendUid().equals(request.getTargetUid())) {
friendData1 = fd;
break;
}
}
if (friendData1 == null) {
friendData1 = new FriendData(userId, request.getTargetUid(), "", request.getStatus(), System.currentTimeMillis());
} else {
friendData1.setState(request.getStatus());
friendData1.setTimestamp(System.currentTimeMillis());
}
databaseStore.persistOrUpdateFriendData(friendData1);
if (request.getStatus() != 2) {
FriendData friendData2 = null;
friendDatas = friendsMap.get(request.getTargetUid());
if (friendDatas == null || friendDatas.size() == 0) {
friendDatas = loadFriend(friendsMap, request.getTargetUid());
}
for (FriendData fd : friendDatas) {
if (fd.getFriendUid().equals(userId)) {
friendData2 = fd;
break;
}
}
if (friendData2 == null) {
friendData2 = new FriendData(request.getTargetUid(), userId, "", request.getStatus(), friendData1.getTimestamp());
} else {
friendsMap.remove(request.getTargetUid(), friendData2);
friendData2.setState(request.getStatus());
friendData2.setTimestamp(System.currentTimeMillis());
}
databaseStore.persistOrUpdateFriendData(friendData2);
heads[0] = friendData2.getTimestamp();
} else {
heads[0] = 0;
}
heads[1] = friendData1.getTimestamp();
friendsMap.remove(userId);
friendsMap.remove(request.getTargetUid());
return ErrorCode.ERROR_CODE_SUCCESS;
}
MultiMap<String, WFCMessage.FriendRequest> requestMap = hzInstance.getMultiMap(USER_FRIENDS_REQUEST);
Collection<WFCMessage.FriendRequest> requests = requestMap.get(userId);
if (requests == null || requests.size() == 0) {
requests = loadFriendRequest(requestMap, userId);
}
WFCMessage.FriendRequest existRequest = null;
for (WFCMessage.FriendRequest tmpRequest : requests) {
if (tmpRequest.getFromUid().equals(request.getTargetUid())) {
existRequest = tmpRequest;
break;
}
}
if (existRequest != null) {
if (System.currentTimeMillis() - existRequest.getUpdateDt() > 7 * 24 * 60 * 60 * 1000) {
return ErrorCode.ERROR_CODE_FRIEND_REQUEST_OVERTIME;
} else {
existRequest = existRequest.toBuilder().setStatus(ProtoConstants.FriendRequestStatus.RequestStatus_Accepted).setUpdateDt(System.currentTimeMillis()).build();
databaseStore.persistOrUpdateFriendRequest(existRequest);
MultiMap<String, FriendData> friendsMap = hzInstance.getMultiMap(USER_FRIENDS);
FriendData friendData1 = new FriendData(userId, request.getTargetUid(), "", 0, System.currentTimeMillis());
databaseStore.persistOrUpdateFriendData(friendData1);
FriendData friendData2 = new FriendData(request.getTargetUid(), userId, "", 0, friendData1.getTimestamp());
databaseStore.persistOrUpdateFriendData(friendData2);
requestMap.remove(userId);
requestMap.remove(request.getTargetUid());
friendsMap.remove(userId);
friendsMap.remove(request.getTargetUid());
heads[0] = friendData2.getTimestamp();
heads[1] = friendData1.getTimestamp();
msgBuilder.setConversation(WFCMessage.Conversation.newBuilder().setTarget(userId).setLine(0).setType(ProtoConstants.ConversationType.ConversationType_Private).build());
msgBuilder.setContent(WFCMessage.MessageContent.newBuilder().setType(1).setSearchableContent(existRequest.getReason()).build());
return ErrorCode.ERROR_CODE_SUCCESS;
}
} else {
return ErrorCode.ERROR_CODE_NOT_EXIST;
}
}
|
#vulnerable code
@Override
public ErrorCode handleFriendRequest(String userId, WFCMessage.HandleFriendRequest request, WFCMessage.Message.Builder msgBuilder, long[] heads, boolean isAdmin) {
HazelcastInstance hzInstance = m_Server.getHazelcastInstance();
if (isAdmin) {
MultiMap<String, FriendData> friendsMap = hzInstance.getMultiMap(USER_FRIENDS);
FriendData friendData1 = null;
Collection<FriendData> friendDatas = friendsMap.get(userId);
if (friendDatas == null || friendDatas.size() == 0) {
friendDatas = loadFriend(friendsMap, userId);
}
for (FriendData fd : friendDatas) {
if (fd.getFriendUid().equals(request.getTargetUid())) {
friendData1 = fd;
break;
}
}
if (friendData1 == null) {
friendData1 = new FriendData(userId, request.getTargetUid(), "", request.getStatus(), System.currentTimeMillis());
} else {
friendData1.setState(request.getStatus());
friendData1.setTimestamp(System.currentTimeMillis());
}
databaseStore.persistOrUpdateFriendData(friendData1);
if (request.getStatus() != 2) {
FriendData friendData2 = null;
friendDatas = friendsMap.get(request.getTargetUid());
for (FriendData fd : friendDatas) {
if (fd.getFriendUid().equals(userId)) {
friendData2 = fd;
break;
}
}
if (friendData2 == null) {
friendData2 = new FriendData(request.getTargetUid(), userId, "", request.getStatus(), friendData1.getTimestamp());
} else {
friendsMap.remove(request.getTargetUid(), friendData2);
friendData2.setState(request.getStatus());
friendData2.setTimestamp(System.currentTimeMillis());
}
databaseStore.persistOrUpdateFriendData(friendData2);
heads[0] = friendData2.getTimestamp();
} else {
heads[0] = 0;
}
heads[1] = friendData1.getTimestamp();
friendsMap.remove(userId);
friendsMap.remove(request.getTargetUid());
return ErrorCode.ERROR_CODE_SUCCESS;
}
MultiMap<String, WFCMessage.FriendRequest> requestMap = hzInstance.getMultiMap(USER_FRIENDS_REQUEST);
Collection<WFCMessage.FriendRequest> requests = requestMap.get(userId);
if (requests == null || requests.size() == 0) {
requests = databaseStore.getPersistFriendRequests(userId);
if (requests != null) {
for (WFCMessage.FriendRequest r : requests
) {
requestMap.put(userId, r);
}
}
}
WFCMessage.FriendRequest existRequest = null;
for (WFCMessage.FriendRequest tmpRequest : requests) {
if (tmpRequest.getFromUid().equals(request.getTargetUid())) {
existRequest = tmpRequest;
break;
}
}
if (existRequest != null) {
if (System.currentTimeMillis() - existRequest.getUpdateDt() > 7 * 24 * 60 * 60 * 1000) {
return ErrorCode.ERROR_CODE_FRIEND_REQUEST_OVERTIME;
} else {
existRequest = existRequest.toBuilder().setStatus(ProtoConstants.FriendRequestStatus.RequestStatus_Accepted).setUpdateDt(System.currentTimeMillis()).build();
databaseStore.persistOrUpdateFriendRequest(existRequest);
MultiMap<String, FriendData> friendsMap = hzInstance.getMultiMap(USER_FRIENDS);
FriendData friendData1 = new FriendData(userId, request.getTargetUid(), "", 0, System.currentTimeMillis());
databaseStore.persistOrUpdateFriendData(friendData1);
FriendData friendData2 = new FriendData(request.getTargetUid(), userId, "", 0, friendData1.getTimestamp());
databaseStore.persistOrUpdateFriendData(friendData2);
requestMap.remove(userId);
requestMap.remove(request.getTargetUid());
friendsMap.remove(userId);
friendsMap.remove(request.getTargetUid());
heads[0] = friendData2.getTimestamp();
heads[1] = friendData1.getTimestamp();
msgBuilder.setConversation(WFCMessage.Conversation.newBuilder().setTarget(userId).setLine(0).setType(ProtoConstants.ConversationType.ConversationType_Private).build());
msgBuilder.setContent(WFCMessage.MessageContent.newBuilder().setType(1).setSearchableContent(existRequest.getReason()).build());
return ErrorCode.ERROR_CODE_SUCCESS;
}
} else {
return ErrorCode.ERROR_CODE_NOT_EXIST;
}
}
#location 71
#vulnerability type NULL_DEREFERENCE
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
public void run() {
m_startMillis = System.currentTimeMillis();
MQTT mqtt = new MQTT();
try {
// mqtt.setHost("test.mosquitto.org", 1883);
mqtt.setHost("localhost", 1883);
} catch (URISyntaxException ex) {
LOG.error(null, ex);
return;
}
mqtt.setClientId(m_clientID);
BlockingConnection connection = mqtt.blockingConnection();
try {
connection.connect();
} catch (Exception ex) {
LOG.error("Cant't CONNECT to the server", ex);
return;
}
long time = System.currentTimeMillis() - m_startMillis;
LOG.info(String.format("Producer %s connected in %d ms", Thread.currentThread().getName(), time));
LOG.info("Starting from index " + m_starIndex + " up to " + (m_starIndex + m_len));
m_startMillis = System.currentTimeMillis();
for (int i = m_starIndex; i < m_starIndex + m_len; i++) {
try {
// LOG.info("Publishing");
String payload = "Hello world MQTT!!" + i;
connection.publish("/topic", payload.getBytes(), QoS.AT_MOST_ONCE, false);
m_benchMarkOut.println(String.format("%d, %d", i, System.nanoTime()));
} catch (Exception ex) {
LOG.error("Cant't PUBLISH to the server", ex);
return;
}
}
time = System.currentTimeMillis() - m_startMillis;
LOG.info(String.format("Producer %s published %d messages in %d ms", Thread.currentThread().getName(), m_len, time));
m_startMillis = System.currentTimeMillis();
try {
LOG.info("Disconneting");
connection.disconnect();
LOG.info("Disconnected");
} catch (Exception ex) {
LOG.error("Cant't DISCONNECT to the server", ex);
}
time = System.currentTimeMillis() - m_startMillis;
LOG.info(String.format("Producer %s disconnected in %d ms", Thread.currentThread().getName(), time));
m_benchMarkOut.flush();
m_benchMarkOut.close();
try {
FileOutputStream fw = new FileOutputStream(String.format(BENCHMARK_FILE, m_clientID));
fw.write(m_baos.toByteArray());
fw.close();
} catch (IOException e) {
e.printStackTrace(); //To change body of catch statement use File | Settings | File Templates.
}
}
|
#vulnerable code
public void run() {
m_startMillis = System.currentTimeMillis();
MQTT mqtt = new MQTT();
try {
// mqtt.setHost("test.mosquitto.org", 1883);
mqtt.setHost("localhost", 1883);
} catch (URISyntaxException ex) {
LOG.error(null, ex);
return;
}
mqtt.setClientId(m_clientID);
BlockingConnection connection = mqtt.blockingConnection();
try {
connection.connect();
} catch (Exception ex) {
LOG.error("Cant't CONNECT to the server", ex);
return;
}
long time = System.currentTimeMillis() - m_startMillis;
LOG.info(String.format("Producer %s connected in %d ms", Thread.currentThread().getName(), time));
m_startMillis = System.currentTimeMillis();
for (int i = m_starIndex; i < m_starIndex + m_len; i++) {
try {
// LOG.info("Publishing");
String payload = "Hello world MQTT!!" + i;
connection.publish("/topic", payload.getBytes(), QoS.AT_MOST_ONCE, false);
m_benchMarkOut.println(String.format("%d, %d", i, System.nanoTime()));
} catch (Exception ex) {
LOG.error("Cant't PUBLISH to the server", ex);
return;
}
}
time = System.currentTimeMillis() - m_startMillis;
LOG.info(String.format("Producer %s published %d messages in %d ms", Thread.currentThread().getName(), m_len, time));
m_startMillis = System.currentTimeMillis();
try {
LOG.info("Disconneting");
connection.disconnect();
LOG.info("Disconnected");
} catch (Exception ex) {
LOG.error("Cant't DISCONNECT to the server", ex);
}
time = System.currentTimeMillis() - m_startMillis;
LOG.info(String.format("Producer %s disconnected in %d ms", Thread.currentThread().getName(), time));
m_benchMarkOut.close();
try {
FileWriter fw = new FileWriter(BENCHMARK_FILE);
fw.write(m_baos.toString());
} catch (IOException e) {
e.printStackTrace(); //To change body of catch statement use File | Settings | File Templates.
}
}
#location 56
#vulnerability type RESOURCE_LEAK
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
@Test
public void testLazyLoading() throws Exception {
final AtomicBoolean requestWasSent = new AtomicBoolean(false);
TestableConnectionProvider provider = new TestableConnectionProvider() {
@Override
public void sendRequest(URL url, Session session) {
requestWasSent.set(true);
assertThat(url, is(locationUrl));
}
@Override
public JSON readJsonResponse() {
return getJSON("updateAuthorizationResponse");
}
@Override
public void handleRetryAfter(String message) throws AcmeException {
// Just do nothing
}
};
Login login = provider.createLogin();
provider.putTestChallenge("http-01", Http01Challenge::new);
provider.putTestChallenge("dns-01", Dns01Challenge::new);
Authorization auth = new Authorization(login, locationUrl);
// Lazy loading
assertThat(requestWasSent.get(), is(false));
assertThat(auth.getDomain(), is("example.org"));
assertThat(requestWasSent.get(), is(true));
// Subsequent queries do not trigger another load
requestWasSent.set(false);
assertThat(auth.getDomain(), is("example.org"));
assertThat(auth.getStatus(), is(Status.VALID));
assertThat(auth.isWildcard(), is(false));
assertThat(auth.getExpires(), is(parseTimestamp("2016-01-02T17:12:40Z")));
assertThat(requestWasSent.get(), is(false));
provider.close();
}
|
#vulnerable code
@Test
public void testLazyLoading() throws Exception {
final AtomicBoolean requestWasSent = new AtomicBoolean(false);
TestableConnectionProvider provider = new TestableConnectionProvider() {
@Override
public void sendRequest(URL url, Session session) {
requestWasSent.set(true);
assertThat(url, is(locationUrl));
}
@Override
public JSON readJsonResponse() {
return getJSON("updateAuthorizationResponse");
}
@Override
public void handleRetryAfter(String message) throws AcmeException {
// Just do nothing
}
};
Login login = provider.createLogin();
provider.putTestChallenge("http-01", Http01Challenge::new);
provider.putTestChallenge("dns-01", Dns01Challenge::new);
Authorization auth = new Authorization(login, locationUrl);
// Lazy loading
assertThat(requestWasSent.get(), is(false));
assertThat(auth.getDomain(), is("example.org"));
assertThat(requestWasSent.get(), is(true));
// Subsequent queries do not trigger another load
requestWasSent.set(false);
assertThat(auth.getDomain(), is("example.org"));
assertThat(auth.getStatus(), is(Status.VALID));
assertThat(auth.getExpires(), is(parseTimestamp("2016-01-02T17:12:40Z")));
assertThat(requestWasSent.get(), is(false));
provider.close();
}
#location 10
#vulnerability type RESOURCE_LEAK
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
@Test
public void testRestoreChallenge() throws AcmeException {
Connection connection = new DummyConnection() {
@Override
public int sendRequest(URI uri) {
assertThat(uri, is(locationUri));
return HttpURLConnection.HTTP_ACCEPTED;
}
@Override
public Map<String, Object> readJsonResponse() {
return getJsonAsMap("updateHttpChallengeResponse");
}
};
TestableAbstractAcmeClient client = new TestableAbstractAcmeClient(connection);
client.putTestChallenge(Http01Challenge.TYPE, new Http01Challenge());
Challenge challenge = client.restoreChallenge(locationUri);
assertThat(challenge.getStatus(), is(Status.VALID));
assertThat(challenge.getLocation(), is(locationUri));
}
|
#vulnerable code
@Test
public void testRestoreChallenge() throws AcmeException {
Connection connection = new DummyConnection() {
@Override
public int sendRequest(URI uri) throws AcmeException {
assertThat(uri, is(locationUri));
return HttpURLConnection.HTTP_ACCEPTED;
}
@Override
public Map<String, Object> readJsonResponse() throws AcmeException {
return getJsonAsMap("updateHttpChallengeResponse");
}
};
TestableAbstractAcmeClient client = new TestableAbstractAcmeClient(connection);
client.putTestChallenge(Http01Challenge.TYPE, new Http01Challenge());
Challenge challenge = client.restoreChallenge(locationUri);
assertThat(challenge.getStatus(), is(Status.VALID));
assertThat(challenge.getLocation(), is(locationUri));
}
#location 19
#vulnerability type RESOURCE_LEAK
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
private List<Challenge> fetchChallenges(JSON json) {
Session session = getSession();
return Collections.unmodifiableList(json.get("challenges").asArray().stream()
.map(JSON.Value::asObject)
.map(session::createChallenge)
.collect(toList()));
}
|
#vulnerable code
private List<Challenge> fetchChallenges(JSON json) {
JSON.Array jsonChallenges = json.get("challenges").asArray();
List<Challenge> cr = new ArrayList<>();
for (JSON.Value c : jsonChallenges) {
Challenge ch = getSession().createChallenge(c.asObject());
if (ch != null) {
cr.add(ch);
}
}
return cr;
}
#location 5
#vulnerability type NULL_DEREFERENCE
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
@Test
public void testNewAuthorization() throws AcmeException {
Authorization auth = new Authorization();
auth.setDomain("example.org");
Connection connection = new DummyConnection() {
@Override
public int sendSignedRequest(URI uri, ClaimBuilder claims, Session session, Account account) throws AcmeException {
assertThat(uri, is(resourceUri));
assertThat(claims.toString(), sameJSONAs(getJson("newAuthorizationRequest")));
assertThat(session, is(notNullValue()));
assertThat(account, is(sameInstance(testAccount)));
return HttpURLConnection.HTTP_CREATED;
}
@Override
public Map<String, Object> readJsonResponse() throws AcmeException {
return getJsonAsMap("newAuthorizationResponse");
}
@Override
public URI getLocation() throws AcmeException {
return locationUri;
}
};
HttpChallenge httpChallenge = new HttpChallenge();
DnsChallenge dnsChallenge = new DnsChallenge();
TestableAbstractAcmeClient client = new TestableAbstractAcmeClient(connection);
client.putTestResource(Resource.NEW_AUTHZ, resourceUri);
client.putTestChallenge("http-01", httpChallenge);
client.putTestChallenge("dns-01", dnsChallenge);
client.newAuthorization(testAccount, auth);
assertThat(auth.getDomain(), is("example.org"));
assertThat(auth.getStatus(), is("pending"));
assertThat(auth.getExpires(), is(nullValue()));
assertThat(auth.getLocation(), is(locationUri));
assertThat(auth.getChallenges(), containsInAnyOrder(
(Challenge) httpChallenge, (Challenge) dnsChallenge));
assertThat(auth.getCombinations(), hasSize(2));
assertThat(auth.getCombinations().get(0), containsInAnyOrder(
(Challenge) httpChallenge));
assertThat(auth.getCombinations().get(1), containsInAnyOrder(
(Challenge) httpChallenge, (Challenge) dnsChallenge));
}
|
#vulnerable code
@Test
public void testNewAuthorization() throws AcmeException {
Authorization auth = new Authorization();
auth.setDomain("example.org");
Connection connection = new DummyConnection() {
@Override
public int sendSignedRequest(URI uri, ClaimBuilder claims, Session session, Account account) throws AcmeException {
assertThat(uri, is(resourceUri));
assertThat(claims.toString(), sameJSONAs(getJson("newAuthorizationRequest")));
assertThat(session, is(notNullValue()));
assertThat(account, is(sameInstance(testAccount)));
return HttpURLConnection.HTTP_CREATED;
}
@Override
public Map<String, Object> readJsonResponse() throws AcmeException {
return getJsonAsMap("newAuthorizationResponse");
}
};
HttpChallenge httpChallenge = new HttpChallenge();
DnsChallenge dnsChallenge = new DnsChallenge();
TestableAbstractAcmeClient client = new TestableAbstractAcmeClient(connection);
client.putTestResource(Resource.NEW_AUTHZ, resourceUri);
client.putTestChallenge("http-01", httpChallenge);
client.putTestChallenge("dns-01", dnsChallenge);
client.newAuthorization(testAccount, auth);
assertThat(auth.getDomain(), is("example.org"));
assertThat(auth.getStatus(), is("pending"));
assertThat(auth.getExpires(), is(nullValue()));
assertThat(auth.getChallenges(), containsInAnyOrder(
(Challenge) httpChallenge, (Challenge) dnsChallenge));
assertThat(auth.getCombinations(), hasSize(2));
assertThat(auth.getCombinations().get(0), containsInAnyOrder(
(Challenge) httpChallenge));
assertThat(auth.getCombinations().get(1), containsInAnyOrder(
(Challenge) httpChallenge, (Challenge) dnsChallenge));
}
#location 30
#vulnerability type RESOURCE_LEAK
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
@Test
public void testUpdate() throws Exception {
TestableConnectionProvider provider = new TestableConnectionProvider() {
@Override
public void sendRequest(URL url, Session session) {
assertThat(url, is(locationUrl));
}
@Override
public int accept(int... httpStatus) throws AcmeException {
assertThat(httpStatus, isIntArrayContainingInAnyOrder(HttpURLConnection.HTTP_OK));
return HttpURLConnection.HTTP_OK;
}
@Override
public JSON readJsonResponse() {
return getJSON("updateAuthorizationResponse");
}
@Override
public void handleRetryAfter(String message) throws AcmeException {
// Just do nothing
}
};
Session session = provider.createSession();
Http01Challenge httpChallenge = new Http01Challenge(session);
Dns01Challenge dnsChallenge = new Dns01Challenge(session);
provider.putTestChallenge("http-01", httpChallenge);
provider.putTestChallenge("dns-01", dnsChallenge);
Authorization auth = new Authorization(session, locationUrl);
auth.update();
assertThat(auth.getDomain(), is("example.org"));
assertThat(auth.getStatus(), is(Status.VALID));
assertThat(auth.getExpires(), is(parseTimestamp("2016-01-02T17:12:40Z")));
assertThat(auth.getLocation(), is(locationUrl));
assertThat(auth.getChallenges(), containsInAnyOrder(
(Challenge) httpChallenge, (Challenge) dnsChallenge));
provider.close();
}
|
#vulnerable code
@Test
public void testUpdate() throws Exception {
TestableConnectionProvider provider = new TestableConnectionProvider() {
@Override
public void sendRequest(URL url, Session session) {
assertThat(url, is(locationUrl));
}
@Override
public int accept(int... httpStatus) throws AcmeException {
assertThat(httpStatus, isIntArrayContainingInAnyOrder(HttpURLConnection.HTTP_OK));
return HttpURLConnection.HTTP_OK;
}
@Override
public JSON readJsonResponse() {
return getJSON("updateAuthorizationResponse");
}
@Override
public void handleRetryAfter(String message) throws AcmeException {
// Just do nothing
}
};
Session session = provider.createSession();
Http01Challenge httpChallenge = new Http01Challenge(session);
Dns01Challenge dnsChallenge = new Dns01Challenge(session);
provider.putTestChallenge("http-01", httpChallenge);
provider.putTestChallenge("dns-01", dnsChallenge);
Authorization auth = new Authorization(session, locationUrl);
auth.update();
assertThat(auth.getDomain(), is("example.org"));
assertThat(auth.getStatus(), is(Status.VALID));
assertThat(auth.getExpires(), is(parseTimestamp("2016-01-02T17:12:40Z")));
assertThat(auth.getLocation(), is(locationUrl));
assertThat(auth.getScope().getLocation(), is(url("https://example.com/order/123")));
assertThat(auth.getChallenges(), containsInAnyOrder(
(Challenge) httpChallenge, (Challenge) dnsChallenge));
provider.close();
}
#location 40
#vulnerability type NULL_DEREFERENCE
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
private List<Challenge> fetchChallenges(JSON json) {
Session session = getSession();
return Collections.unmodifiableList(json.get("challenges").asArray().stream()
.map(JSON.Value::asObject)
.map(session::createChallenge)
.collect(toList()));
}
|
#vulnerable code
private List<Challenge> fetchChallenges(JSON json) {
JSON.Array jsonChallenges = json.get("challenges").asArray();
List<Challenge> cr = new ArrayList<>();
for (JSON.Value c : jsonChallenges) {
Challenge ch = getSession().createChallenge(c.asObject());
if (ch != null) {
cr.add(ch);
}
}
return cr;
}
#location 4
#vulnerability type NULL_DEREFERENCE
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
@Test
public void testAuthorizeBadDomain() throws Exception {
TestableConnectionProvider provider = new TestableConnectionProvider();
// just provide a resource record so the provider returns a directory
provider.putTestResource(Resource.NEW_NONCE, resourceUrl);
Session session = provider.createSession();
Registration registration = Registration.bind(session, locationUrl);
try {
registration.preAuthorizeDomain(null);
fail("null domain was accepted");
} catch (NullPointerException ex) {
// expected
}
try {
registration.preAuthorizeDomain("");
fail("empty domain string was accepted");
} catch (IllegalArgumentException ex) {
// expected
}
try {
registration.preAuthorizeDomain("example.com");
fail("preauthorization was accepted");
} catch (AcmeException ex) {
// expected
assertThat(ex.getMessage(), is("Server does not allow pre-authorization"));
}
provider.close();
}
|
#vulnerable code
@Test
public void testAuthorizeBadDomain() throws Exception {
TestableConnectionProvider provider = new TestableConnectionProvider();
Session session = provider.createSession();
Registration registration = Registration.bind(session, locationUrl);
try {
registration.authorizeDomain(null);
fail("null domain was accepted");
} catch (NullPointerException ex) {
// expected
}
try {
registration.authorizeDomain("");
fail("empty domain string was accepted");
} catch (IllegalArgumentException ex) {
// expected
}
provider.close();
}
#location 8
#vulnerability type NULL_DEREFERENCE
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
@Test
public void testSendRequest() throws Exception {
when(mockUrlConnection.getResponseCode()).thenReturn(HttpURLConnection.HTTP_OK);
try (DefaultConnection conn = new DefaultConnection(mockHttpConnection) {
@Override
public String getNonce() {
return null;
}
}) {
conn.sendRequest(requestUrl, session);
}
verify(mockUrlConnection).setRequestMethod("GET");
verify(mockUrlConnection).setRequestProperty("Accept", "application/json");
verify(mockUrlConnection).setRequestProperty("Accept-Charset", "utf-8");
verify(mockUrlConnection).setRequestProperty("Accept-Language", "ja-JP");
verify(mockUrlConnection).setDoOutput(false);
verify(mockUrlConnection).connect();
verify(mockUrlConnection).getResponseCode();
verify(mockUrlConnection, atLeast(0)).getHeaderFields();
verifyNoMoreInteractions(mockUrlConnection);
}
|
#vulnerable code
@Test
public void testSendRequest() throws Exception {
when(mockUrlConnection.getResponseCode()).thenReturn(HttpURLConnection.HTTP_OK);
try (DefaultConnection conn = new DefaultConnection(mockHttpConnection)) {
conn.sendRequest(requestUrl, session);
}
verify(mockUrlConnection).setRequestMethod("GET");
verify(mockUrlConnection).setRequestProperty("Accept", "application/json");
verify(mockUrlConnection).setRequestProperty("Accept-Charset", "utf-8");
verify(mockUrlConnection).setRequestProperty("Accept-Language", "ja-JP");
verify(mockUrlConnection).setDoOutput(false);
verify(mockUrlConnection).connect();
verify(mockUrlConnection).getResponseCode();
verify(mockUrlConnection, atLeast(0)).getHeaderFields();
verifyNoMoreInteractions(mockUrlConnection);
}
#location 7
#vulnerability type RESOURCE_LEAK
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
@Test
public void testUpdateRetryAfter() throws Exception {
final Instant retryAfter = Instant.now().plus(Duration.ofSeconds(30));
TestableConnectionProvider provider = new TestableConnectionProvider() {
@Override
public void sendRequest(URL url, Session session) {
assertThat(url, is(locationUrl));
}
@Override
public JSON readJsonResponse() {
return getJSON("updateAuthorizationResponse");
}
@Override
public void handleRetryAfter(String message) throws AcmeException {
throw new AcmeRetryAfterException(message, retryAfter);
}
};
Login login = provider.createLogin();
provider.putTestChallenge("http-01", Http01Challenge::new);
provider.putTestChallenge("dns-01", Dns01Challenge::new);
Authorization auth = new Authorization(login, locationUrl);
try {
auth.update();
fail("Expected AcmeRetryAfterException");
} catch (AcmeRetryAfterException ex) {
assertThat(ex.getRetryAfter(), is(retryAfter));
}
assertThat(auth.getDomain(), is("example.org"));
assertThat(auth.getStatus(), is(Status.VALID));
assertThat(auth.isWildcard(), is(false));
assertThat(auth.getExpires(), is(parseTimestamp("2016-01-02T17:12:40Z")));
assertThat(auth.getLocation(), is(locationUrl));
assertThat(auth.getChallenges(), containsInAnyOrder(
provider.getChallenge(Http01Challenge.TYPE),
provider.getChallenge(Dns01Challenge.TYPE)));
provider.close();
}
|
#vulnerable code
@Test
public void testUpdateRetryAfter() throws Exception {
final Instant retryAfter = Instant.now().plus(Duration.ofSeconds(30));
TestableConnectionProvider provider = new TestableConnectionProvider() {
@Override
public void sendRequest(URL url, Session session) {
assertThat(url, is(locationUrl));
}
@Override
public JSON readJsonResponse() {
return getJSON("updateAuthorizationResponse");
}
@Override
public void handleRetryAfter(String message) throws AcmeException {
throw new AcmeRetryAfterException(message, retryAfter);
}
};
Login login = provider.createLogin();
provider.putTestChallenge("http-01", Http01Challenge::new);
provider.putTestChallenge("dns-01", Dns01Challenge::new);
Authorization auth = new Authorization(login, locationUrl);
try {
auth.update();
fail("Expected AcmeRetryAfterException");
} catch (AcmeRetryAfterException ex) {
assertThat(ex.getRetryAfter(), is(retryAfter));
}
assertThat(auth.getDomain(), is("example.org"));
assertThat(auth.getStatus(), is(Status.VALID));
assertThat(auth.getExpires(), is(parseTimestamp("2016-01-02T17:12:40Z")));
assertThat(auth.getLocation(), is(locationUrl));
assertThat(auth.getChallenges(), containsInAnyOrder(
provider.getChallenge(Http01Challenge.TYPE),
provider.getChallenge(Dns01Challenge.TYPE)));
provider.close();
}
#location 9
#vulnerability type RESOURCE_LEAK
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
@Test
public void testSendCertificateRequest() throws Exception {
final String nonce1 = Base64Url.encode("foo-nonce-1-foo".getBytes());
final String nonce2 = Base64Url.encode("foo-nonce-2-foo".getBytes());
final ByteArrayOutputStream outputStream = new ByteArrayOutputStream();
when(mockUrlConnection.getResponseCode()).thenReturn(HttpURLConnection.HTTP_OK);
when(mockUrlConnection.getOutputStream()).thenReturn(outputStream);
try (DefaultConnection conn = new DefaultConnection(mockHttpConnection) {
@Override
public void resetNonce(Session session) {
assertThat(session, is(sameInstance(DefaultConnectionTest.this.session)));
if (session.getNonce() == null) {
session.setNonce(nonce1);
} else {
fail("unknown nonce");
}
}
@Override
public String getNonce() {
assertThat(session, is(sameInstance(DefaultConnectionTest.this.session)));
if (session.getNonce() == nonce1) {
return nonce2;
} else {
fail("unknown nonce");
return null;
}
}
}) {
conn.sendCertificateRequest(requestUrl, login);
}
verify(mockUrlConnection).setRequestMethod("POST");
verify(mockUrlConnection).setRequestProperty("Accept", "application/pem-certificate-chain");
verify(mockUrlConnection).setRequestProperty("Accept-Charset", "utf-8");
verify(mockUrlConnection).setRequestProperty("Accept-Language", "ja-JP");
verify(mockUrlConnection).setRequestProperty("Content-Type", "application/jose+json");
verify(mockUrlConnection).setDoOutput(true);
verify(mockUrlConnection).connect();
verify(mockUrlConnection).setFixedLengthStreamingMode(outputStream.toByteArray().length);
verify(mockUrlConnection).getResponseCode();
verify(mockUrlConnection).getOutputStream();
verify(mockUrlConnection, atLeast(0)).getHeaderFields();
verifyNoMoreInteractions(mockUrlConnection);
}
|
#vulnerable code
@Test
public void testSendCertificateRequest() throws Exception {
when(mockUrlConnection.getResponseCode()).thenReturn(HttpURLConnection.HTTP_OK);
try (DefaultConnection conn = new DefaultConnection(mockHttpConnection)) {
conn.sendCertificateRequest(requestUrl, session);
}
verify(mockUrlConnection).setRequestMethod("GET");
verify(mockUrlConnection).setRequestProperty("Accept", "application/pem-certificate-chain");
verify(mockUrlConnection).setRequestProperty("Accept-Charset", "utf-8");
verify(mockUrlConnection).setRequestProperty("Accept-Language", "ja-JP");
verify(mockUrlConnection).setDoOutput(false);
verify(mockUrlConnection).connect();
verify(mockUrlConnection).getResponseCode();
verify(mockUrlConnection, atLeast(0)).getHeaderFields();
verifyNoMoreInteractions(mockUrlConnection);
}
#location 7
#vulnerability type RESOURCE_LEAK
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
@Test
public void testArray() {
JSON json = TestUtils.getJsonAsObject("json");
JSON.Array array = json.get("array").asArray();
assertThat(array.size(), is(4));
assertThat(array.isEmpty(), is(false));
assertThat(array.get(0), is(notNullValue()));
assertThat(array.get(1), is(notNullValue()));
assertThat(array.get(2), is(notNullValue()));
assertThat(array.get(3), is(notNullValue()));
}
|
#vulnerable code
@Test
public void testArray() {
JSON json = TestUtils.getJsonAsObject("json");
JSON.Array array = json.get("array").asArray();
assertThat(array.size(), is(4));
assertThat(array.get(0), is(notNullValue()));
assertThat(array.get(1), is(notNullValue()));
assertThat(array.get(2), is(notNullValue()));
assertThat(array.get(3), is(notNullValue()));
}
#location 6
#vulnerability type NULL_DEREFERENCE
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
private void throwAcmeException() throws AcmeException {
try {
String contentType = AcmeUtils.getContentType(conn.getHeaderField(CONTENT_TYPE_HEADER));
if (!"application/problem+json".equals(contentType)) {
throw new AcmeException("HTTP " + conn.getResponseCode() + ": " + conn.getResponseMessage());
}
JSON problemJson = readJsonResponse();
if (problemJson == null) {
throw new AcmeProtocolException("Empty problem response");
}
Problem problem = new Problem(problemJson, conn.getURL());
String error = AcmeUtils.stripErrorPrefix(problem.getType().toString());
if ("unauthorized".equals(error)) {
throw new AcmeUnauthorizedException(problem);
}
if ("userActionRequired".equals(error)) {
URI tos = collectLinks("terms-of-service").stream()
.findFirst()
.map(this::resolveUri)
.orElse(null);
throw new AcmeUserActionRequiredException(problem, tos);
}
if ("rateLimited".equals(error)) {
Optional<Instant> retryAfter = getRetryAfterHeader();
Collection<URL> rateLimits = getLinks("urn:ietf:params:acme:documentation");
throw new AcmeRateLimitedException(problem, retryAfter.orElse(null), rateLimits);
}
throw new AcmeServerException(problem);
} catch (IOException ex) {
throw new AcmeNetworkException(ex);
}
}
|
#vulnerable code
private void throwAcmeException() throws AcmeException {
try {
String contentType = AcmeUtils.getContentType(conn.getHeaderField(CONTENT_TYPE_HEADER));
if (!"application/problem+json".equals(contentType)) {
throw new AcmeException("HTTP " + conn.getResponseCode() + ": " + conn.getResponseMessage());
}
Problem problem = new Problem(readJsonResponse(), conn.getURL());
if (problem.getType() == null) {
throw new AcmeException(problem.getDetail());
}
String error = AcmeUtils.stripErrorPrefix(problem.getType().toString());
if ("unauthorized".equals(error)) {
throw new AcmeUnauthorizedException(problem);
}
if ("userActionRequired".equals(error)) {
URI tos = collectLinks("terms-of-service").stream()
.findFirst()
.map(this::resolveUri)
.orElse(null);
throw new AcmeUserActionRequiredException(problem, tos);
}
if ("rateLimited".equals(error)) {
Optional<Instant> retryAfter = getRetryAfterHeader();
Collection<URL> rateLimits = getLinks("urn:ietf:params:acme:documentation");
throw new AcmeRateLimitedException(problem, retryAfter.orElse(null), rateLimits);
}
throw new AcmeServerException(problem);
} catch (IOException ex) {
throw new AcmeNetworkException(ex);
}
}
#location 10
#vulnerability type NULL_DEREFERENCE
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
@Test
public void testSendRequest() throws Exception {
when(mockUrlConnection.getResponseCode()).thenReturn(HttpURLConnection.HTTP_OK);
try (DefaultConnection conn = new DefaultConnection(mockHttpConnection) {
@Override
public String getNonce() {
return null;
}
}) {
conn.sendRequest(requestUrl, session);
}
verify(mockUrlConnection).setRequestMethod("GET");
verify(mockUrlConnection).setRequestProperty("Accept", "application/json");
verify(mockUrlConnection).setRequestProperty("Accept-Charset", "utf-8");
verify(mockUrlConnection).setRequestProperty("Accept-Language", "ja-JP");
verify(mockUrlConnection).setDoOutput(false);
verify(mockUrlConnection).connect();
verify(mockUrlConnection).getResponseCode();
verify(mockUrlConnection, atLeast(0)).getHeaderFields();
verifyNoMoreInteractions(mockUrlConnection);
}
|
#vulnerable code
@Test
public void testSendRequest() throws Exception {
when(mockUrlConnection.getResponseCode()).thenReturn(HttpURLConnection.HTTP_OK);
try (DefaultConnection conn = new DefaultConnection(mockHttpConnection)) {
conn.sendRequest(requestUrl, session);
}
verify(mockUrlConnection).setRequestMethod("GET");
verify(mockUrlConnection).setRequestProperty("Accept", "application/json");
verify(mockUrlConnection).setRequestProperty("Accept-Charset", "utf-8");
verify(mockUrlConnection).setRequestProperty("Accept-Language", "ja-JP");
verify(mockUrlConnection).setDoOutput(false);
verify(mockUrlConnection).connect();
verify(mockUrlConnection).getResponseCode();
verify(mockUrlConnection, atLeast(0)).getHeaderFields();
verifyNoMoreInteractions(mockUrlConnection);
}
#location 7
#vulnerability type RESOURCE_LEAK
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
private AcmeException createAcmeException(Problem problem) {
if (problem.getType() == null) {
return new AcmeException(problem.getDetail());
}
String error = AcmeUtils.stripErrorPrefix(problem.getType().toString());
if ("unauthorized".equals(error)) {
return new AcmeUnauthorizedException(problem);
}
if ("userActionRequired".equals(error)) {
Collection<URI> links = getLinks("terms-of-service");
URI tos = links != null ? links.stream().findFirst().orElse(null) : null;
return new AcmeUserActionRequiredException(problem, tos);
}
if ("rateLimited".equals(error)) {
Optional<Instant> retryAfter = getRetryAfterHeader();
Collection<URI> rateLimits = getLinks("urn:ietf:params:acme:documentation");
return new AcmeRateLimitExceededException(problem, retryAfter.orElse(null), rateLimits);
}
return new AcmeServerException(problem);
}
|
#vulnerable code
private AcmeException createAcmeException(Problem problem) {
if (problem.getType() == null) {
return new AcmeException(problem.getDetail());
}
String error = AcmeUtils.stripErrorPrefix(problem.getType().toString());
if ("unauthorized".equals(error)) {
return new AcmeUnauthorizedException(problem);
}
if ("userActionRequired".equals(error)) {
URI tos = getLinks("terms-of-service").stream().findFirst().orElse(null);
return new AcmeUserActionRequiredException(problem, tos);
}
if ("rateLimited".equals(error)) {
Optional<Instant> retryAfter = getRetryAfterHeader();
Collection<URI> rateLimits = getLinks("urn:ietf:params:acme:documentation");
return new AcmeRateLimitExceededException(problem, retryAfter.orElse(null), rateLimits);
}
return new AcmeServerException(problem);
}
#location 13
#vulnerability type NULL_DEREFERENCE
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
public AcmeProvider provider() {
return provider;
}
|
#vulnerable code
public AcmeProvider provider() {
synchronized (this) {
if (provider == null) {
List<AcmeProvider> candidates = new ArrayList<>();
for (AcmeProvider acp : ServiceLoader.load(AcmeProvider.class)) {
if (acp.accepts(serverUri)) {
candidates.add(acp);
}
}
if (candidates.isEmpty()) {
throw new IllegalArgumentException("No ACME provider found for " + serverUri);
} else if (candidates.size() > 1) {
throw new IllegalStateException("There are " + candidates.size() + " "
+ AcmeProvider.class.getSimpleName() + " accepting " + serverUri
+ ". Please check your classpath.");
} else {
provider = candidates.get(0);
}
}
}
return provider;
}
#location 22
#vulnerability type THREAD_SAFETY_VIOLATION
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
@Test
public void testSendCertificateRequest() throws Exception {
final String nonce1 = Base64Url.encode("foo-nonce-1-foo".getBytes());
final String nonce2 = Base64Url.encode("foo-nonce-2-foo".getBytes());
final ByteArrayOutputStream outputStream = new ByteArrayOutputStream();
when(mockUrlConnection.getResponseCode()).thenReturn(HttpURLConnection.HTTP_OK);
when(mockUrlConnection.getOutputStream()).thenReturn(outputStream);
try (DefaultConnection conn = new DefaultConnection(mockHttpConnection) {
@Override
public void resetNonce(Session session) {
assertThat(session, is(sameInstance(DefaultConnectionTest.this.session)));
if (session.getNonce() == null) {
session.setNonce(nonce1);
} else {
fail("unknown nonce");
}
}
@Override
public String getNonce() {
assertThat(session, is(sameInstance(DefaultConnectionTest.this.session)));
if (session.getNonce() == nonce1) {
return nonce2;
} else {
fail("unknown nonce");
return null;
}
}
}) {
conn.sendCertificateRequest(requestUrl, login);
}
verify(mockUrlConnection).setRequestMethod("POST");
verify(mockUrlConnection).setRequestProperty("Accept", "application/pem-certificate-chain");
verify(mockUrlConnection).setRequestProperty("Accept-Charset", "utf-8");
verify(mockUrlConnection).setRequestProperty("Accept-Language", "ja-JP");
verify(mockUrlConnection).setRequestProperty("Content-Type", "application/jose+json");
verify(mockUrlConnection).setDoOutput(true);
verify(mockUrlConnection).connect();
verify(mockUrlConnection).setFixedLengthStreamingMode(outputStream.toByteArray().length);
verify(mockUrlConnection).getResponseCode();
verify(mockUrlConnection).getOutputStream();
verify(mockUrlConnection, atLeast(0)).getHeaderFields();
verifyNoMoreInteractions(mockUrlConnection);
}
|
#vulnerable code
@Test
public void testSendCertificateRequest() throws Exception {
when(mockUrlConnection.getResponseCode()).thenReturn(HttpURLConnection.HTTP_OK);
try (DefaultConnection conn = new DefaultConnection(mockHttpConnection)) {
conn.sendCertificateRequest(requestUrl, session);
}
verify(mockUrlConnection).setRequestMethod("GET");
verify(mockUrlConnection).setRequestProperty("Accept", "application/pem-certificate-chain");
verify(mockUrlConnection).setRequestProperty("Accept-Charset", "utf-8");
verify(mockUrlConnection).setRequestProperty("Accept-Language", "ja-JP");
verify(mockUrlConnection).setDoOutput(false);
verify(mockUrlConnection).connect();
verify(mockUrlConnection).getResponseCode();
verify(mockUrlConnection, atLeast(0)).getHeaderFields();
verifyNoMoreInteractions(mockUrlConnection);
}
#location 7
#vulnerability type RESOURCE_LEAK
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
@Override
public int accept(int... httpStatus) throws AcmeException {
assertConnectionIsOpen();
try {
int rc = conn.getResponseCode();
OptionalInt match = Arrays.stream(httpStatus).filter(s -> s == rc).findFirst();
if (match.isPresent()) {
return match.getAsInt();
}
if (!"application/problem+json".equals(conn.getHeaderField(CONTENT_TYPE_HEADER))) {
throw new AcmeException("HTTP " + rc + ": " + conn.getResponseMessage());
}
throw createAcmeException(readJsonResponse());
} catch (IOException ex) {
throw new AcmeNetworkException(ex);
}
}
|
#vulnerable code
@Override
public int accept(int... httpStatus) throws AcmeException {
assertConnectionIsOpen();
try {
int rc = conn.getResponseCode();
OptionalInt match = Arrays.stream(httpStatus).filter(s -> s == rc).findFirst();
if (match.isPresent()) {
return match.getAsInt();
}
if (!"application/problem+json".equals(conn.getHeaderField(CONTENT_TYPE_HEADER))) {
throw new AcmeException("HTTP " + rc + ": " + conn.getResponseMessage());
}
JSON json = readJsonResponse();
if (rc == HttpURLConnection.HTTP_CONFLICT) {
throw new AcmeConflictException(json.get("detail").asString(), getLocation());
}
throw createAcmeException(json);
} catch (IOException ex) {
throw new AcmeNetworkException(ex);
}
}
#location 19
#vulnerability type NULL_DEREFERENCE
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
@Override
public HttpURLConnection openConnection(URL url, Proxy proxy) throws IOException {
HttpURLConnection conn = super.openConnection(url, proxy);
if (conn instanceof HttpsURLConnection) {
HttpsURLConnection conns = (HttpsURLConnection) conn;
conns.setSSLSocketFactory(createSocketFactory());
conns.setHostnameVerifier(ALLOW_ALL_HOSTNAME_VERIFIER);
}
return conn;
}
|
#vulnerable code
@Override
public HttpURLConnection openConnection(URL url, Proxy proxy) throws IOException {
HttpURLConnection conn = super.openConnection(url, proxy);
if (conn instanceof HttpsURLConnection) {
((HttpsURLConnection) conn).setSSLSocketFactory(createSocketFactory());
}
return conn;
}
#location 7
#vulnerability type RESOURCE_LEAK
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
@Override
public int sendSignedRequest(URI uri, ClaimBuilder claims, Session session, Registration registration)
throws AcmeException {
if (uri == null) {
throw new NullPointerException("uri must not be null");
}
if (claims == null) {
throw new NullPointerException("claims must not be null");
}
if (session == null) {
throw new NullPointerException("session must not be null");
}
if (registration == null) {
throw new NullPointerException("registration must not be null");
}
if (conn != null) {
throw new IllegalStateException("Connection was not closed. Race condition?");
}
try {
KeyPair keypair = registration.getKeyPair();
if (session.getNonce() == null) {
LOG.debug("Getting initial nonce, HEAD {}", uri);
conn = httpConnector.openConnection(uri);
conn.setRequestMethod("HEAD");
conn.connect();
updateSession(session);
conn = null;
}
if (session.getNonce() == null) {
throw new AcmeException("No nonce available");
}
LOG.debug("POST {} with claims: {}", uri, claims);
conn = httpConnector.openConnection(uri);
conn.setRequestMethod("POST");
conn.setRequestProperty("Accept", "application/json");
conn.setRequestProperty("Accept-Charset", "utf-8");
conn.setRequestProperty("Content-Type", "application/json");
conn.setDoOutput(true);
final PublicJsonWebKey jwk = PublicJsonWebKey.Factory.newPublicJwk(keypair.getPublic());
JsonWebSignature jws = new JsonWebSignature();
jws.setPayload(claims.toString());
jws.getHeaders().setObjectHeaderValue("nonce", Base64Url.encode(session.getNonce()));
jws.getHeaders().setJwkHeaderValue("jwk", jwk);
jws.setAlgorithmHeaderValue(SignatureUtils.keyAlgorithm(jwk));
jws.setKey(keypair.getPrivate());
byte[] outputData = jws.getCompactSerialization().getBytes("utf-8");
conn.setFixedLengthStreamingMode(outputData.length);
conn.connect();
try (OutputStream out = conn.getOutputStream()) {
out.write(outputData);
}
logHeaders();
updateSession(session);
return conn.getResponseCode();
} catch (JoseException | IOException ex) {
throw new AcmeException("Request failed: " + uri, ex);
}
}
|
#vulnerable code
@Override
public int sendSignedRequest(URI uri, ClaimBuilder claims, Session session, Registration registration)
throws AcmeException {
if (uri == null) {
throw new NullPointerException("uri must not be null");
}
if (claims == null) {
throw new NullPointerException("claims must not be null");
}
if (session == null) {
throw new NullPointerException("session must not be null");
}
if (registration == null) {
throw new NullPointerException("registration must not be null");
}
if (conn != null) {
throw new IllegalStateException("Connection was not closed. Race condition?");
}
try {
KeyPair keypair = registration.getKeyPair();
if (session.getNonce() == null) {
LOG.debug("Getting initial nonce, HEAD {}", uri);
conn = httpConnector.openConnection(uri);
conn.setRequestMethod("HEAD");
conn.connect();
updateSession(session);
conn = null;
}
if (session.getNonce() == null) {
throw new AcmeException("No nonce available");
}
LOG.debug("POST {} with claims: {}", uri, claims);
conn = httpConnector.openConnection(uri);
conn.setRequestMethod("POST");
conn.setRequestProperty("Accept", "application/json");
conn.setRequestProperty("Accept-Charset", "utf-8");
conn.setRequestProperty("Content-Type", "application/json");
conn.setDoOutput(true);
final PublicJsonWebKey jwk = PublicJsonWebKey.Factory.newPublicJwk(keypair.getPublic());
JsonWebSignature jws = new JsonWebSignature();
jws.setPayload(claims.toString());
jws.getHeaders().setObjectHeaderValue("nonce", Base64Url.encode(session.getNonce()));
jws.getHeaders().setJwkHeaderValue("jwk", jwk);
jws.setAlgorithmHeaderValue(AlgorithmIdentifiers.RSA_USING_SHA256);
jws.setKey(keypair.getPrivate());
byte[] outputData = jws.getCompactSerialization().getBytes("utf-8");
conn.setFixedLengthStreamingMode(outputData.length);
conn.connect();
try (OutputStream out = conn.getOutputStream()) {
out.write(outputData);
}
logHeaders();
updateSession(session);
return conn.getResponseCode();
} catch (JoseException | IOException ex) {
throw new AcmeException("Request failed: " + uri, ex);
}
}
#location 29
#vulnerability type RESOURCE_LEAK
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
@GetMapping("/employees/{id}")
public Mono<EntityModel<Employee>> findOne(@PathVariable Integer id) {
WebFluxEmployeeController controller = methodOn(WebFluxEmployeeController.class);
Mono<Link> selfLink = linkTo(controller.findOne(id)).withSelfRel() //
.andAffordance(controller.updateEmployee(null, id)) //
.andAffordance(controller.partiallyUpdateEmployee(null, id)) //
.toMono();
Mono<Link> employeesLink = linkTo(controller.all()).withRel("employees") //
.toMono();
return selfLink.zipWith(employeesLink) //
.map(function((left, right) -> Links.of(left, right))) //
.map(links -> {
return new EntityModel<>(EMPLOYEES.get(id), links);
});
}
|
#vulnerable code
@GetMapping("/employees/{id}")
public Mono<EntityModel<Employee>> findOne(@PathVariable Integer id) {
WebFluxEmployeeController controller = methodOn(WebFluxEmployeeController.class);
Mono<Link> selfLink = linkTo(controller.findOne(id)).withSelfRel() //
.andAffordance(controller.updateEmployee(null, id)) //
.andAffordance(controller.partiallyUpdateEmployee(null, id)) //
.toMono();
Mono<Link> employeesLink = linkTo(controller.all()).withRel("employees") //
.toMono();
return selfLink.zipWith(employeesLink) //
.map(function((left, right) -> Links.of(left, right))) //
.map(links -> new EntityModel<>(EMPLOYEES.get(id), links));
}
#location 7
#vulnerability type NULL_DEREFERENCE
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
public static HalLinkRelation of(@Nullable LinkRelation relation) {
Assert.notNull(relation, "LinkRelation must not be null!");
if (relation instanceof HalLinkRelation) {
return (HalLinkRelation) relation;
}
return of(relation.value());
}
|
#vulnerable code
public static HalLinkRelation of(@Nullable LinkRelation relation) {
Assert.notNull(relation, "LinkRelation must not be null!");
if (HalLinkRelation.class.isInstance(relation)) {
return HalLinkRelation.class.cast(relation);
}
return of(relation.value());
}
#location 9
#vulnerability type NULL_DEREFERENCE
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
public static UriComponentsBuilder getBuilder() {
if (RequestContextHolder.getRequestAttributes() == null) {
return UriComponentsBuilder.fromPath("/");
}
return ServletUriComponentsBuilder.fromServletMapping(getCurrentRequest());
}
|
#vulnerable code
public static UriComponentsBuilder getBuilder() {
if (RequestContextHolder.getRequestAttributes() == null) {
return UriComponentsBuilder.fromPath("/");
}
HttpServletRequest request = getCurrentRequest();
ServletUriComponentsBuilder builder = ServletUriComponentsBuilder.fromServletMapping(request);
// Spring 5.1 can handle X-Forwarded-Ssl headers...
if (isSpringAtLeast5_1()) {
return builder;
} else {
return handleXForwardedSslHeader(request, builder);
}
}
#location 14
#vulnerability type NULL_DEREFERENCE
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
@Test
public void testCreate() throws IOException {
HDFSDataset dataset = repo.create("test1", testSchema);
Assert.assertTrue("HDFSDataset data directory exists",
fileSystem.exists(new Path(testDirectory, "data/test1/data")));
Assert.assertTrue("HDFSDataset metadata file exists",
fileSystem.exists(new Path(testDirectory, "data/test1/schema.avsc")));
Schema serializedSchema = new Schema.Parser().parse(new File(testDirectory
.toUri().getPath(), "data/test1/schema.avsc"));
Schema schema = dataset.getSchema();
Assert.assertEquals("HDFSDataset schema matches what's serialized to disk",
schema, serializedSchema);
Assert.assertNotNull(schema);
Assert.assertTrue(schema.getType().equals(Type.RECORD));
Assert.assertNotNull(schema.getField("name"));
Assert.assertTrue(schema.getField("name").schema().getType()
.equals(Type.STRING));
}
|
#vulnerable code
@Test
public void testCreate() throws IOException {
Dataset dataset = repo.create("test1", testSchema);
Assert.assertTrue("Dataset data directory exists",
fileSystem.exists(new Path(testDirectory, "data/test1/data")));
Assert.assertTrue("Dataset metadata file exists",
fileSystem.exists(new Path(testDirectory, "data/test1/schema.avsc")));
Schema serializedSchema = new Schema.Parser().parse(new File(testDirectory
.toUri().getPath(), "data/test1/schema.avsc"));
Schema schema = dataset.getSchema();
Assert.assertEquals("Dataset schema matches what's serialized to disk",
schema, serializedSchema);
Assert.assertNotNull(schema);
Assert.assertTrue(schema.getType().equals(Type.RECORD));
Assert.assertNotNull(schema.getField("name"));
Assert.assertTrue(schema.getField("name").schema().getType()
.equals(Type.STRING));
}
#location 13
#vulnerability type RESOURCE_LEAK
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
@Override
public List<Word> segImpl(String text) {
//文本长度
final int textLen = text.length();
//开始虚拟节点,注意值的长度只能为1
Node start = new Node("S", 0);
start.score = 1F;
//结束虚拟节点
Node end = new Node("END", textLen+1);
//以文本中每一个字的位置(从1开始)作为二维数组的横坐标
//以每一个字开始所能切分出来的所有的词的顺序作为纵坐标(从0开始)
Node[][] dag = new Node[textLen+2][0];
dag[0] = new Node[] { start };
dag[textLen+1] = new Node[] { end };
for(int i=0; i<textLen; i++){
dag[i+1] = fullSeg(text, i);
}
dump(dag);
//标注路径
int following = 0;
Node node = null;
for (int i = 0; i < dag.length - 1; i++) {
for (int j = 0; j < dag[i].length; j++) {
node = dag[i][j];
following = node.getFollowing();
for (int k = 0; k < dag[following].length; k++) {
dag[following][k].setPrevious(node);
}
}
}
dump(dag);
return toWords(end);
}
|
#vulnerable code
@Override
public List<Word> segImpl(String text) {
if(text.length() > PROCESS_TEXT_LENGTH_LESS_THAN){
return RMM.segImpl(text);
}
//获取全切分结果
List<Word>[] array = fullSeg(text);
//利用ngram计算分值
Map<List<Word>, Float> words = ngram(array);
//歧义消解(ngram分值优先、词个数少优先)
List<Word> result = disambiguity(words);
return result;
}
#location 11
#vulnerability type NULL_DEREFERENCE
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
@Test
public void testGet() {
assertEquals(100, genericTrie.get("杨尚川").intValue());
assertEquals(99, genericTrie.get("杨尚喜").intValue());
assertEquals(98, genericTrie.get("杨尚丽").intValue());
assertEquals(1, genericTrie.get("中华人民共和国").intValue());
assertEquals(null, genericTrie.get("杨"));
assertEquals(null, genericTrie.get("杨尚"));
}
|
#vulnerable code
@Test
public void testGet() {
Assert.assertEquals(100, trie.get("杨尚川"), 0);
Assert.assertEquals(99, trie.get("杨尚喜"), 0);
Assert.assertEquals(98, trie.get("杨尚丽"), 0);
Assert.assertEquals(1, trie.get("中华人民共和国"), 0);
Assert.assertEquals(null, trie.get("杨"));
Assert.assertEquals(null, trie.get("杨尚"));
}
#location 3
#vulnerability type NULL_DEREFERENCE
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
@Override
public List<Word> seg(String text) {
List<String> sentences = Punctuation.seg(text, KEEP_PUNCTUATION);
if(sentences.size() == 1){
return segSentence(sentences.get(0));
}
//如果是多个句子,可以利用多线程提升分词速度
List<Future<List<Word>>> futures = new ArrayList<>(sentences.size());
for(String sentence : sentences){
futures.add(submit(sentence));
}
sentences.clear();
List<Word> result = new ArrayList<>();
for(Future<List<Word>> future : futures){
List<Word> words;
try {
words = future.get();
if(words != null){
result.addAll(words);
}
} catch (InterruptedException | ExecutionException ex) {
LOGGER.error("获取分词结果失败", ex);
}
}
futures.clear();
return result;
}
|
#vulnerable code
@Override
public List<Word> seg(String text) {
List<Word> result = new ArrayList<>();
List<String> sentences = Punctuation.seg(text, KEEP_PUNCTUATION);
if(sentences.size() == 1){
result = segSentence(sentences.get(0));
}else {
//如果是多个句子,可以利用多线程提升分词速度
List<Future<List<Word>>> futures = new ArrayList<>(sentences.size());
for (String sentence : sentences) {
futures.add(submit(sentence));
}
sentences.clear();
for (Future<List<Word>> future : futures) {
List<Word> words;
try {
words = future.get();
if (words != null) {
result.addAll(words);
}
} catch (InterruptedException | ExecutionException ex) {
LOGGER.error("获取分词结果失败", ex);
}
}
futures.clear();
}
if(refine) {
LOGGER.debug("对分词结果进行refine之前:{}", result);
List<Word> finalResult = refine(result);
LOGGER.debug("对分词结果进行refine之后:{}", finalResult);
result.clear();
return finalResult;
}else{
return result;
}
}
#location 31
#vulnerability type NULL_DEREFERENCE
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
@Test
public void testClear() {
assertEquals(100, genericTrie.get("杨尚川").intValue());
assertEquals(1, genericTrie.get("中华人民共和国").intValue());
genericTrie.clear();
assertEquals(null, genericTrie.get("杨尚川"));
assertEquals(null, genericTrie.get("中华人民共和国"));
}
|
#vulnerable code
@Test
public void testClear() {
Assert.assertEquals(100, trie.get("杨尚川"), 0);
Assert.assertEquals(1, trie.get("中华人民共和国"), 0);
trie.clear();
Assert.assertEquals(null, trie.get("杨尚川"));
Assert.assertEquals(null, trie.get("中华人民共和国"));
}
#location 3
#vulnerability type NULL_DEREFERENCE
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
@Override
public final boolean incrementToken() throws IOException {
String token = getToken();
if (token != null) {
charTermAttribute.setEmpty().append(token);
return true;
}
return false;
}
|
#vulnerable code
@Override
public final boolean incrementToken() throws IOException {
Word word = getWord();
if (word != null) {
int positionIncrement = 1;
//忽略停用词
while(StopWord.is(word.getText())){
positionIncrement++;
startOffset += word.getText().length();
LOGGER.debug("忽略停用词:"+word.getText());
word = getWord();
if(word == null){
return false;
}
}
charTermAttribute.setEmpty().append(word.getText());
offsetAttribute.setOffset(startOffset, startOffset+word.getText().length());
positionIncrementAttribute.setPositionIncrement(positionIncrement);
startOffset += word.getText().length();
//词性标注
if(POS){
PartOfSpeechTagging.process(Arrays.asList(word));
partOfSpeechAttribute.setEmpty().append(word.getPartOfSpeech().getPos());
}
//拼音标注
if(PINYIN){
PinyinTagging.process(Arrays.asList(word));
acronymPinyinAttribute.setEmpty().append(word.getAcronymPinYin());
fullPinyinAttribute.setEmpty().append(word.getFullPinYin());
}
//同义标注
if(SYNONYM){
SynonymTagging.process(Arrays.asList(word));
StringBuilder synonym = new StringBuilder();
word.getSynonym().forEach(w -> synonym.append(w.getText()).append(" "));
synonymAttribute.setEmpty().append(synonym.toString().trim());
}
//反义标注
if(ANTONYM){
AntonymTagging.process(Arrays.asList(word));
StringBuilder antonym = new StringBuilder();
word.getAntonym().forEach(w -> antonym.append(w.getText()).append(" "));
antonymAttribute.setEmpty().append(antonym.toString().trim());
}
return true;
}
return false;
}
#location 17
#vulnerability type NULL_DEREFERENCE
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
@Override
protected void doStartProxy(KubernetesContainerProxy proxy) throws Exception {
String kubeNamespace = getProperty(PROPERTY_NAMESPACE, proxy.getApp(), DEFAULT_NAMESPACE);
String apiVersion = getProperty(PROPERTY_API_VERSION, proxy.getApp(), DEFAULT_API_VERSION);
String[] volumeStrings = Optional.ofNullable(proxy.getApp().getDockerVolumes()).orElse(new String[] {});
Volume[] volumes = new Volume[volumeStrings.length];
VolumeMount[] volumeMounts = new VolumeMount[volumeStrings.length];
for (int i = 0; i < volumeStrings.length; i++) {
String[] volume = volumeStrings[i].split(":");
String hostSource = volume[0];
String containerDest = volume[1];
String name = "shinyproxy-volume-" + i;
volumes[i] = new VolumeBuilder()
.withNewHostPath(hostSource)
.withName(name)
.build();
volumeMounts[i] = new VolumeMountBuilder()
.withMountPath(containerDest)
.withName(name)
.build();
}
List<EnvVar> envVars = new ArrayList<>();
for (String envString : buildEnv(proxy.getUserId(), proxy.getApp())) {
int idx = envString.indexOf('=');
if (idx == -1) log.warn("Invalid environment variable: " + envString);
envVars.add(new EnvVar(envString.substring(0, idx), envString.substring(idx + 1), null));
}
SecurityContext security = new SecurityContextBuilder()
.withPrivileged(Boolean.valueOf(getProperty(PROPERTY_PRIVILEGED, proxy.getApp(), DEFAULT_PRIVILEGED)))
.build();
ContainerBuilder containerBuilder = new ContainerBuilder()
.withImage(proxy.getApp().getDockerImage())
.withName("shiny-container")
.withPorts(new ContainerPortBuilder().withContainerPort(getAppPort(proxy)).build())
.withVolumeMounts(volumeMounts)
.withSecurityContext(security)
.withEnv(envVars);
String imagePullPolicy = getProperty(PROPERTY_IMG_PULL_POLICY, proxy.getApp(), null);
if (imagePullPolicy != null) containerBuilder.withImagePullPolicy(imagePullPolicy);
if (proxy.getApp().getDockerCmd() != null) containerBuilder.withCommand(proxy.getApp().getDockerCmd());
String[] imagePullSecrets = getProperty(PROPERTY_IMG_PULL_SECRETS, proxy.getApp(), String[].class, null);
if (imagePullSecrets == null) {
String imagePullSecret = getProperty(PROPERTY_IMG_PULL_SECRET, proxy.getApp(), null);
if (imagePullSecret != null) {
imagePullSecrets = new String[] {imagePullSecret};
} else {
imagePullSecrets = new String[0];
}
}
Pod pod = kubeClient.pods().inNamespace(kubeNamespace).createNew()
.withApiVersion(apiVersion)
.withKind("Pod")
.withNewMetadata()
.withName(proxy.getName())
.addToLabels("app", proxy.getName())
.endMetadata()
.withNewSpec()
.withContainers(Collections.singletonList(containerBuilder.build()))
.withVolumes(volumes)
.withImagePullSecrets(Arrays.asList(imagePullSecrets).stream()
.map(LocalObjectReference::new).collect(Collectors.toList()))
.endSpec()
.done();
proxy.setPod(kubeClient.resource(pod).waitUntilReady(600, TimeUnit.SECONDS));
if (!isUseInternalNetwork()) {
// If SP runs outside the cluster, a NodePort service is needed to access the pod externally.
Service service = kubeClient.services().inNamespace(kubeNamespace).createNew()
.withApiVersion(apiVersion)
.withKind("Service")
.withNewMetadata()
.withName(proxy.getName() + "service")
.endMetadata()
.withNewSpec()
.addToSelector("app", proxy.getName())
.withType("NodePort")
.withPorts(new ServicePortBuilder()
.withPort(getAppPort(proxy))
.build())
.endSpec()
.done();
// Retry, because if this is done too fast, an 'endpoint not found' exception will be thrown.
Utils.retry(i -> {
try {
proxy.setService(kubeClient.resource(service).waitUntilReady(600, TimeUnit.SECONDS));
} catch (Exception e) {
return false;
}
return true;
}, 5, 1000);
releasePort(proxy.getPort());
proxy.setPort(proxy.getService().getSpec().getPorts().get(0).getNodePort());
}
}
|
#vulnerable code
@Override
protected void doStartProxy(KubernetesContainerProxy proxy) throws Exception {
String kubeNamespace = getProperty(PROPERTY_NAMESPACE, proxy.getApp(), DEFAULT_NAMESPACE);
String[] volumeStrings = Optional.ofNullable(proxy.getApp().getDockerVolumes()).orElse(new String[] {});
Volume[] volumes = new Volume[volumeStrings.length];
VolumeMount[] volumeMounts = new VolumeMount[volumeStrings.length];
for (int i = 0; i < volumeStrings.length; i++) {
String[] volume = volumeStrings[i].split(":");
String hostSource = volume[0];
String containerDest = volume[1];
String name = "shinyproxy-volume-" + i;
volumes[i] = new VolumeBuilder()
.withNewHostPath(hostSource)
.withName(name)
.build();
volumeMounts[i] = new VolumeMountBuilder()
.withMountPath(containerDest)
.withName(name)
.build();
}
List<EnvVar> envVars = new ArrayList<>();
for (String envString : buildEnv(proxy.getUserId(), proxy.getApp())) {
int idx = envString.indexOf('=');
if (idx == -1) log.warn("Invalid environment variable: " + envString);
envVars.add(new EnvVar(envString.substring(0, idx), envString.substring(idx + 1), null));
}
SecurityContext security = new SecurityContextBuilder()
.withPrivileged(Boolean.valueOf(getProperty(PROPERTY_PRIVILEGED, proxy.getApp(), DEFAULT_PRIVILEGED)))
.build();
ContainerBuilder containerBuilder = new ContainerBuilder()
.withImage(proxy.getApp().getDockerImage())
.withName("shiny-container")
.withPorts(new ContainerPortBuilder().withContainerPort(getAppPort(proxy)).build())
.withVolumeMounts(volumeMounts)
.withSecurityContext(security)
.withEnv(envVars);
String imagePullPolicy = getProperty(PROPERTY_IMG_PULL_POLICY, proxy.getApp(), null);
if (imagePullPolicy != null) containerBuilder.withImagePullPolicy(imagePullPolicy);
if (proxy.getApp().getDockerCmd() != null) containerBuilder.withCommand(proxy.getApp().getDockerCmd());
String[] imagePullSecrets = getProperty(PROPERTY_IMG_PULL_SECRETS, proxy.getApp(), String[].class, null);
if (imagePullSecrets == null) {
String imagePullSecret = getProperty(PROPERTY_IMG_PULL_SECRET, proxy.getApp(), null);
if (imagePullSecret != null) {
imagePullSecrets = new String[] {imagePullSecret};
} else {
imagePullSecrets = new String[0];
}
}
Pod pod = kubeClient.pods().inNamespace(kubeNamespace).createNew()
.withApiVersion("v1")
.withKind("Pod")
.withNewMetadata()
.withName(proxy.getName())
.addToLabels("app", proxy.getName())
.endMetadata()
.withNewSpec()
.withContainers(Collections.singletonList(containerBuilder.build()))
.withVolumes(volumes)
.withImagePullSecrets(Arrays.asList(imagePullSecrets).stream()
.map(LocalObjectReference::new).collect(Collectors.toList()))
.endSpec()
.done();
proxy.setPod(kubeClient.resource(pod).waitUntilReady(600, TimeUnit.SECONDS));
if (!isUseInternalNetwork()) {
// If SP runs outside the cluster, a NodePort service is needed to access the pod externally.
Service service = kubeClient.services().inNamespace(kubeNamespace).createNew()
.withApiVersion("v1")
.withKind("Service")
.withNewMetadata()
.withName(proxy.getName() + "service")
.endMetadata()
.withNewSpec()
.addToSelector("app", proxy.getName())
.withType("NodePort")
.withPorts(new ServicePortBuilder()
.withPort(getAppPort(proxy))
.build())
.endSpec()
.done();
proxy.setService(kubeClient.resource(service).waitUntilReady(600, TimeUnit.SECONDS));
releasePort(proxy.getPort());
proxy.setPort(proxy.getService().getSpec().getPorts().get(0).getNodePort());
}
}
#location 5
#vulnerability type NULL_DEREFERENCE
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
@Override
public HttpResponse execute(HttpRequest request) throws HttpClientException {
HttpResponse response = null;
try {
URI uri = new URI(request.getURI().toString(), false,
Consts.UTF_8.name());
org.apache.commons.httpclient.HttpMethod httpMethod = method2method(request
.getMethod());
if (request.getMethod() == HttpMethod.TRACE) {
httpMethod = new TraceMethod(uri.getEscapedURI());
} else {
httpMethod.setURI(uri);
}
HttpParams params = request.getParams();
if (params != null) {
Proxy proxy = params.getProxy();
if (proxy != null) {
InetSocketAddress socketAddress = (InetSocketAddress) proxy
.address();
httpClient.getHostConfiguration().setProxy(
socketAddress.getHostName(),
socketAddress.getPort());
}
SSLContext sslContext = params.getSSLContext();
if (sslContext != null) {
Protocol.registerProtocol("https", new Protocol("https",
new SSLProtocolSocketFactory(sslContext), 443));
}
httpClient.getHttpConnectionManager().getParams()
.setConnectionTimeout(params.getConnectTimeout());
httpClient.getHttpConnectionManager().getParams()
.setSendBufferSize(params.getChunkSize());
httpMethod.getParams().setUriCharset(Consts.UTF_8.name());
httpMethod.getParams().setSoTimeout(params.getSocketTimeout());
httpMethod.getParams().setContentCharset(Consts.UTF_8.name());
}
com.foxinmy.weixin4j.http.HttpHeaders headers = request
.getHeaders();
if (headers == null) {
headers = new HttpHeaders();
}
if (!headers.containsKey(HttpHeaders.HOST)) {
headers.set(HttpHeaders.HOST, uri.getHost());
}
// Add default accept headers
if (!headers.containsKey(HttpHeaders.ACCEPT)) {
headers.set(HttpHeaders.ACCEPT, "*/*");
}
// Add default user agent
if (!headers.containsKey(HttpHeaders.USER_AGENT)) {
headers.set(HttpHeaders.USER_AGENT, "apache/httpclient3");
}
for (Iterator<Entry<String, List<String>>> headerIterator = headers
.entrySet().iterator(); headerIterator.hasNext();) {
Entry<String, List<String>> header = headerIterator.next();
if (HttpHeaders.COOKIE.equalsIgnoreCase(header.getKey())) {
httpMethod.setRequestHeader(header.getKey(),
StringUtil.join(header.getValue(), ';'));
} else {
for (String headerValue : header.getValue()) {
httpMethod.addRequestHeader(header.getKey(),
headerValue != null ? headerValue : "");
}
}
}
HttpEntity entity = request.getEntity();
if (entity != null) {
if (entity.getContentLength() > 0l) {
httpMethod.addRequestHeader(HttpHeaders.CONTENT_LENGTH,
Long.toString(entity.getContentLength()));
}
if (entity.getContentType() != null) {
httpMethod.addRequestHeader(HttpHeaders.CONTENT_TYPE,
entity.getContentType().toString());
}
RequestEntity requestEntity = null;
if (entity instanceof MultipartEntity) {
ByteArrayOutputStream os = new ByteArrayOutputStream();
entity.writeTo(os);
os.flush();
requestEntity = new ByteArrayRequestEntity(
os.toByteArray(), entity.getContentType()
.toString());
os.close();
} else {
requestEntity = new InputStreamRequestEntity(
entity.getContent(), entity.getContentType()
.toString());
}
((EntityEnclosingMethod) httpMethod)
.setRequestEntity(requestEntity);
}
httpClient.executeMethod(httpMethod);
response = new HttpComponent3Response(httpMethod);
handleResponse(response);
} catch (IOException e) {
throw new HttpClientException("I/O error on "
+ request.getMethod().name() + " request for \""
+ request.getURI().toString() + "\":" + e.getMessage(), e);
} finally {
if (response != null) {
response.close();
}
}
return response;
}
|
#vulnerable code
@Override
public HttpResponse execute(HttpRequest request) throws HttpClientException {
HttpResponse response = null;
try {
URI uri = new URI(request.getURI().toString(), false,
Consts.UTF_8.name());
org.apache.commons.httpclient.HttpMethod httpMethod = methodMap
.get(request.getMethod());
if (request.getMethod() == HttpMethod.TRACE) {
httpMethod = new TraceMethod(uri.getEscapedURI());
} else {
httpMethod.setURI(uri);
}
HttpParams params = request.getParams();
if (params != null) {
Proxy proxy = params.getProxy();
if (proxy != null) {
InetSocketAddress socketAddress = (InetSocketAddress) proxy
.address();
httpClient.getHostConfiguration().setProxy(
socketAddress.getHostName(),
socketAddress.getPort());
}
SSLContext sslContext = params.getSSLContext();
if (sslContext != null) {
Protocol.registerProtocol("https", new Protocol("https",
new SSLProtocolSocketFactory(sslContext), 443));
}
httpClient.getHttpConnectionManager().getParams()
.setConnectionTimeout(params.getConnectTimeout());
httpClient.getHttpConnectionManager().getParams()
.setSendBufferSize(params.getChunkSize());
httpMethod.getParams().setUriCharset(Consts.UTF_8.name());
httpMethod.getParams().setSoTimeout(params.getSocketTimeout());
httpMethod.getParams().setContentCharset(Consts.UTF_8.name());
}
com.foxinmy.weixin4j.http.HttpHeaders headers = request
.getHeaders();
if (headers == null) {
headers = new HttpHeaders();
}
if (!headers.containsKey(HttpHeaders.HOST)) {
headers.set(HttpHeaders.HOST, uri.getHost());
}
// Add default accept headers
if (!headers.containsKey(HttpHeaders.ACCEPT)) {
headers.set(HttpHeaders.ACCEPT, "*/*");
}
// Add default user agent
if (!headers.containsKey(HttpHeaders.USER_AGENT)) {
headers.set(HttpHeaders.USER_AGENT, "apache/httpclient3");
}
for (Iterator<Entry<String, List<String>>> headerIterator = headers
.entrySet().iterator(); headerIterator.hasNext();) {
Entry<String, List<String>> header = headerIterator.next();
if (HttpHeaders.COOKIE.equalsIgnoreCase(header.getKey())) {
httpMethod.setRequestHeader(header.getKey(),
StringUtil.join(header.getValue(), ';'));
} else {
for (String headerValue : header.getValue()) {
httpMethod.addRequestHeader(header.getKey(),
headerValue != null ? headerValue : "");
}
}
}
HttpEntity entity = request.getEntity();
if (entity != null) {
if (entity.getContentLength() > 0l) {
httpMethod.addRequestHeader(HttpHeaders.CONTENT_LENGTH,
Long.toString(entity.getContentLength()));
}
if (entity.getContentType() != null) {
httpMethod.addRequestHeader(HttpHeaders.CONTENT_TYPE,
entity.getContentType().toString());
}
RequestEntity requestEntity = null;
if (entity instanceof MultipartEntity) {
ByteArrayOutputStream os = new ByteArrayOutputStream();
entity.writeTo(os);
os.flush();
requestEntity = new ByteArrayRequestEntity(
os.toByteArray(), entity.getContentType()
.toString());
os.close();
} else {
requestEntity = new InputStreamRequestEntity(
entity.getContent(), entity.getContentType()
.toString());
}
((EntityEnclosingMethod) httpMethod)
.setRequestEntity(requestEntity);
}
httpClient.executeMethod(httpMethod);
response = new HttpComponent3Response(httpMethod);
handleResponse(response);
} catch (IOException e) {
throw new HttpClientException("I/O error on "
+ request.getMethod().name() + " request for \""
+ request.getURI().toString() + "\":" + e.getMessage(), e);
} finally {
if (response != null) {
response.close();
}
}
return response;
}
#location 83
#vulnerability type NULL_DEREFERENCE
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
public MchPayRequest createMicroPayRequest(String authCode, String body,
String outTradeNo, double totalFee, String createIp, String attach)
throws WeixinException {
MchPayPackage payPackage = new MchPayPackage(body, outTradeNo,
totalFee, null, createIp, TradeType.MICROPAY, null, authCode,
null, attach);
return createPayRequest(payPackage);
}
|
#vulnerable code
public MchPayRequest createMicroPayRequest(String authCode, String body,
String outTradeNo, double totalFee, String createIp, String attach)
throws WeixinException {
// 刷卡支付不需要设置TradeType.MICROPAY
MchPayPackage payPackage = new MchPayPackage(body, outTradeNo,
totalFee, null, createIp, null, null, authCode, null, attach);
return createPayRequest(payPackage);
}
#location 5
#vulnerability type NULL_DEREFERENCE
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
public Order orderQuery(IdQuery idQuery) throws WeixinException {
Map<String, String> map = baseMap(idQuery);
String sign = PayUtil.paysignMd5(map, weixinAccount.getPaySignKey());
map.put("sign", sign);
String param = XmlStream.map2xml(map);
String orderquery_uri = getRequestUri("orderquery_v3_uri");
WeixinResponse response = weixinClient.post(orderquery_uri, param);
return ListsuffixResultDeserializer.deserialize(response.getAsString(),
Order.class, "couponList");
}
|
#vulnerable code
public Order orderQuery(IdQuery idQuery) throws WeixinException {
Map<String, String> map = baseMap(idQuery);
String sign = PayUtil.paysignMd5(map, weixinAccount.getPaySignKey());
map.put("sign", sign);
String param = XmlStream.map2xml(map);
String orderquery_uri = getRequestUri("orderquery_v3_uri");
WeixinResponse response = weixinClient.post(orderquery_uri, param);
return ListsuffixResultDeserializer.containCouponDeserialize(
response.getAsString(), Order.class);
}
#location 8
#vulnerability type NULL_DEREFERENCE
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
@Override
public HttpResponse execute(HttpRequest request) throws HttpClientException {
HttpResponse response = null;
try {
org.apache.commons.httpclient.HttpMethod httpMethod = createHttpMethod(
request.getMethod(), request.getURI());
boolean useSSL = "https".equals(request.getURI().getScheme());
SSLContext sslContext = null;
HttpParams params = request.getParams();
if (params != null) {
Proxy proxy = params.getProxy();
if (proxy != null) {
InetSocketAddress socketAddress = (InetSocketAddress) proxy
.address();
httpClient.getHostConfiguration().setProxy(
socketAddress.getHostName(),
socketAddress.getPort());
useSSL = false;
}
sslContext = params.getSSLContext();
httpClient.getHttpConnectionManager().getParams()
.setConnectionTimeout(params.getConnectTimeout());
httpClient.getHttpConnectionManager().getParams()
.setSendBufferSize(params.getChunkSize());
httpMethod.getParams().setUriCharset(Consts.UTF_8.name());
httpMethod.getParams().setSoTimeout(params.getSocketTimeout());
httpMethod.getParams().setContentCharset(Consts.UTF_8.name());
}
if (useSSL) {
if (sslContext == null) {
sslContext = HttpClientFactory.allowSSLContext();
}
Protocol.registerProtocol("https", new Protocol("https",
new SSLProtocolSocketFactory(sslContext), 443));
}
com.foxinmy.weixin4j.http.HttpHeaders headers = request
.getHeaders();
if (headers == null) {
headers = new HttpHeaders();
}
if (!headers.containsKey(HttpHeaders.HOST)) {
headers.set(HttpHeaders.HOST, request.getURI().getHost());
}
// Add default accept headers
if (!headers.containsKey(HttpHeaders.ACCEPT)) {
headers.set(HttpHeaders.ACCEPT, "*/*");
}
// Add default user agent
if (!headers.containsKey(HttpHeaders.USER_AGENT)) {
headers.set(HttpHeaders.USER_AGENT, "apache/httpclient3");
}
for (Iterator<Entry<String, List<String>>> headerIterator = headers
.entrySet().iterator(); headerIterator.hasNext();) {
Entry<String, List<String>> header = headerIterator.next();
if (HttpHeaders.COOKIE.equalsIgnoreCase(header.getKey())) {
httpMethod.setRequestHeader(header.getKey(),
StringUtil.join(header.getValue(), ';'));
} else {
for (String headerValue : header.getValue()) {
httpMethod.addRequestHeader(header.getKey(),
headerValue != null ? headerValue : "");
}
}
}
HttpEntity entity = request.getEntity();
if (entity != null) {
if (entity.getContentLength() > 0l) {
httpMethod.addRequestHeader(HttpHeaders.CONTENT_LENGTH,
Long.toString(entity.getContentLength()));
}
if (entity.getContentType() != null) {
httpMethod.addRequestHeader(HttpHeaders.CONTENT_TYPE,
entity.getContentType().toString());
}
RequestEntity requestEntity = null;
if (entity instanceof MultipartEntity) {
ByteArrayOutputStream os = new ByteArrayOutputStream();
entity.writeTo(os);
os.flush();
requestEntity = new ByteArrayRequestEntity(
os.toByteArray(), entity.getContentType()
.toString());
os.close();
} else {
requestEntity = new InputStreamRequestEntity(
entity.getContent(), entity.getContentType()
.toString());
}
((EntityEnclosingMethod) httpMethod)
.setRequestEntity(requestEntity);
}
httpClient.executeMethod(httpMethod);
response = new HttpComponent3Response(httpMethod);
handleResponse(response);
} catch (IOException e) {
throw new HttpClientException("I/O error on "
+ request.getMethod().name() + " request for \""
+ request.getURI().toString() + "\":" + e.getMessage(), e);
} finally {
if (response != null) {
response.close();
}
}
return response;
}
|
#vulnerable code
@Override
public HttpResponse execute(HttpRequest request) throws HttpClientException {
HttpResponse response = null;
try {
URI uri = new URI(request.getURI().toString(), false,
Consts.UTF_8.name());
org.apache.commons.httpclient.HttpMethod httpMethod = method2method(request
.getMethod());
if (request.getMethod() == HttpMethod.TRACE) {
httpMethod = new TraceMethod(uri.getEscapedURI());
} else {
httpMethod.setURI(uri);
}
boolean useSSL = "https".equals(uri.getScheme());
SSLContext sslContext = null;
HttpParams params = request.getParams();
if (params != null) {
Proxy proxy = params.getProxy();
if (proxy != null) {
InetSocketAddress socketAddress = (InetSocketAddress) proxy
.address();
httpClient.getHostConfiguration().setProxy(
socketAddress.getHostName(),
socketAddress.getPort());
useSSL = false;
}
sslContext = params.getSSLContext();
httpClient.getHttpConnectionManager().getParams()
.setConnectionTimeout(params.getConnectTimeout());
httpClient.getHttpConnectionManager().getParams()
.setSendBufferSize(params.getChunkSize());
httpMethod.getParams().setUriCharset(Consts.UTF_8.name());
httpMethod.getParams().setSoTimeout(params.getSocketTimeout());
httpMethod.getParams().setContentCharset(Consts.UTF_8.name());
}
if (useSSL) {
if (sslContext == null) {
sslContext = HttpClientFactory.allowSSLContext();
}
Protocol.registerProtocol("https", new Protocol("https",
new SSLProtocolSocketFactory(sslContext), 443));
}
com.foxinmy.weixin4j.http.HttpHeaders headers = request
.getHeaders();
if (headers == null) {
headers = new HttpHeaders();
}
if (!headers.containsKey(HttpHeaders.HOST)) {
headers.set(HttpHeaders.HOST, uri.getHost());
}
// Add default accept headers
if (!headers.containsKey(HttpHeaders.ACCEPT)) {
headers.set(HttpHeaders.ACCEPT, "*/*");
}
// Add default user agent
if (!headers.containsKey(HttpHeaders.USER_AGENT)) {
headers.set(HttpHeaders.USER_AGENT, "apache/httpclient3");
}
for (Iterator<Entry<String, List<String>>> headerIterator = headers
.entrySet().iterator(); headerIterator.hasNext();) {
Entry<String, List<String>> header = headerIterator.next();
if (HttpHeaders.COOKIE.equalsIgnoreCase(header.getKey())) {
httpMethod.setRequestHeader(header.getKey(),
StringUtil.join(header.getValue(), ';'));
} else {
for (String headerValue : header.getValue()) {
httpMethod.addRequestHeader(header.getKey(),
headerValue != null ? headerValue : "");
}
}
}
HttpEntity entity = request.getEntity();
if (entity != null) {
if (entity.getContentLength() > 0l) {
httpMethod.addRequestHeader(HttpHeaders.CONTENT_LENGTH,
Long.toString(entity.getContentLength()));
}
if (entity.getContentType() != null) {
httpMethod.addRequestHeader(HttpHeaders.CONTENT_TYPE,
entity.getContentType().toString());
}
RequestEntity requestEntity = null;
if (entity instanceof MultipartEntity) {
ByteArrayOutputStream os = new ByteArrayOutputStream();
entity.writeTo(os);
os.flush();
requestEntity = new ByteArrayRequestEntity(
os.toByteArray(), entity.getContentType()
.toString());
os.close();
} else {
requestEntity = new InputStreamRequestEntity(
entity.getContent(), entity.getContentType()
.toString());
}
((EntityEnclosingMethod) httpMethod)
.setRequestEntity(requestEntity);
}
httpClient.executeMethod(httpMethod);
response = new HttpComponent3Response(httpMethod);
handleResponse(response);
} catch (IOException e) {
throw new HttpClientException("I/O error on "
+ request.getMethod().name() + " request for \""
+ request.getURI().toString() + "\":" + e.getMessage(), e);
} finally {
if (response != null) {
response.close();
}
}
return response;
}
#location 12
#vulnerability type NULL_DEREFERENCE
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
public static List<Class<?>> getClasses(String packageName) {
String packageFileName = packageName.replace(POINT, File.separator);
URL fullPath = getDefaultClassLoader().getResource(packageFileName);
if (fullPath == null) {
fullPath = ClassUtil.class.getProtectionDomain().getCodeSource().getLocation();
}
String protocol = fullPath.getProtocol();
if (protocol.equals(ServerToolkits.PROTOCOL_FILE)) {
try {
File dir = new File(fullPath.toURI());
return findClassesByFile(dir, packageName);
} catch (URISyntaxException e) {
throw new RuntimeException(e);
}
} else if (protocol.equals(ServerToolkits.PROTOCOL_JAR)) {
try {
return findClassesByJar(((JarURLConnection) fullPath.openConnection()).getJarFile(), packageName);
} catch (IOException e) {
throw new RuntimeException(e);
}
}
throw new RuntimeException("the " + packageName + " not found classes.");
}
|
#vulnerable code
public static List<Class<?>> getClasses(String packageName) {
String packageFileName = packageName.replace(POINT, File.separator);
URL fullPath = getDefaultClassLoader().getResource(packageFileName);
if (fullPath == null) {
fullPath = ClassUtil.class.getClassLoader().getResource(
packageFileName);
}
String protocol = fullPath.getProtocol();
if (protocol.equals(ServerToolkits.PROTOCOL_FILE)) {
try {
File dir = new File(fullPath.toURI());
return findClassesByFile(dir, packageName);
} catch (URISyntaxException e) {
throw new RuntimeException(e);
}
} else if (protocol.equals(ServerToolkits.PROTOCOL_JAR)) {
try {
return findClassesByJar(
((JarURLConnection) fullPath.openConnection())
.getJarFile(),
packageName);
} catch (IOException e) {
throw new RuntimeException(e);
}
}
return null;
}
#location 8
#vulnerability type NULL_DEREFERENCE
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
public Order orderQuery(IdQuery idQuery) throws WeixinException {
Map<String, String> map = baseMap(idQuery);
String sign = PayUtil.paysignMd5(map, weixinAccount.getPaySignKey());
map.put("sign", sign);
String param = XmlStream.map2xml(map);
String orderquery_uri = getRequestUri("orderquery_v3_uri");
WeixinResponse response = weixinClient.post(orderquery_uri, param);
return ListsuffixResultDeserializer.deserialize(response.getAsString(),
Order.class);
}
|
#vulnerable code
public Order orderQuery(IdQuery idQuery) throws WeixinException {
Map<String, String> map = baseMap(idQuery);
String sign = PayUtil.paysignMd5(map, weixinAccount.getPaySignKey());
map.put("sign", sign);
String param = XmlStream.map2xml(map);
String orderquery_uri = getRequestUri("orderquery_v3_uri");
WeixinResponse response = weixinClient.post(orderquery_uri, param);
return ListsuffixResultDeserializer.deserialize(response.getAsString(),
Order.class, "couponList");
}
#location 8
#vulnerability type NULL_DEREFERENCE
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
private void sendMessage(String ircCatHost, int ircCatPort, String message, String channel) throws IOException {
Socket socket = new Socket(ircCatHost, ircCatPort);
Closer closer = Closer.create();
try {
Writer out = closer.register(new OutputStreamWriter(socket.getOutputStream()));
out.write(format("%s %s\n", channel, message));
out.flush();
} catch (IOException e) {
socket.close();
throw closer.rethrow(e);
} finally {
closer.close();
}
}
|
#vulnerable code
private void sendMessage(String ircCatHost, int ircCatPort, String message, String channel) throws IOException {
Socket socket = new Socket(ircCatHost, ircCatPort);
Writer out = new OutputStreamWriter(socket.getOutputStream());
try {
out.write(format("%s %s\n", channel, message));
out.flush();
} catch (IOException e) {
Closeables.closeQuietly(out);
socket.close();
}
}
#location 10
#vulnerability type RESOURCE_LEAK
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
private void sendMessage(String ircCatHost, int ircCatPort, String message, String channel) throws IOException {
Socket socket = new Socket(ircCatHost, ircCatPort);
Closer closer = Closer.create();
try {
Writer out = closer.register(new OutputStreamWriter(socket.getOutputStream()));
out.write(format("%s %s\n", channel, message));
out.flush();
} catch (IOException e) {
socket.close();
throw closer.rethrow(e);
} finally {
closer.close();
}
}
|
#vulnerable code
private void sendMessage(String ircCatHost, int ircCatPort, String message, String channel) throws IOException {
Socket socket = new Socket(ircCatHost, ircCatPort);
Writer out = new OutputStreamWriter(socket.getOutputStream());
try {
out.write(format("%s %s\n", channel, message));
out.flush();
} catch (IOException e) {
Closeables.closeQuietly(out);
socket.close();
}
}
#location 10
#vulnerability type RESOURCE_LEAK
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
@Override
public RulesProfile createProfile(final ValidationMessages messages) {
LOGGER.info("Creating Swift Profile");
Reader config = null;
final RulesProfile profile = RulesProfile.create("Swift", Swift.KEY);
profile.setDefaultProfile(true);
try {
// Add swift lint rules
config = new InputStreamReader(getClass().getResourceAsStream(SwiftLintProfile.PROFILE_PATH));
RulesProfile ocLintRulesProfile = this.swiftLintProfileImporter.importProfile(config, messages);
for (ActiveRule rule : ocLintRulesProfile.getActiveRules()) {
profile.addActiveRule(rule);
}
return profile;
} finally {
Closeables.closeQuietly(config);
}
}
|
#vulnerable code
@Override
public RulesProfile createProfile(final ValidationMessages messages) {
LOGGER.info("Creating Swift Profile");
Reader config = null;
final RulesProfile profile = RulesProfile.create("Swift", Swift.KEY);
profile.setDefaultProfile(true);
try {
// add swift lint rules
config = new InputStreamReader(getClass().getResourceAsStream(SwiftLintProfile.PROFILE_PATH));
RulesProfile ocLintRulesProfile = this.swiftLintProfileImporter.importProfile(config, messages);
for (ActiveRule rule : ocLintRulesProfile.getActiveRules()) {
profile.addActiveRule(rule);
}
//add tailor rules
config = new InputStreamReader(getClass().getResourceAsStream(TailorProfile.PROFILE_PATH));
RulesProfile ocTailorRulesProfile = this.tailorProfileImporter.importProfile(config, messages);
for (ActiveRule rule : ocTailorRulesProfile.getActiveRules()) {
profile.addActiveRule(rule);
}
return profile;
} finally {
Closeables.closeQuietly(config);
}
}
#location 19
#vulnerability type RESOURCE_LEAK
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
@Override
public RulesProfile createProfile(final ValidationMessages messages) {
LOGGER.info("Creating Swift Profile");
Reader config = null;
final RulesProfile profile = RulesProfile.create("Swift", Swift.KEY);
profile.setDefaultProfile(true);
try {
// Add swift lint rules
config = new InputStreamReader(getClass().getResourceAsStream(SwiftLintProfile.PROFILE_PATH));
RulesProfile ocLintRulesProfile = this.swiftLintProfileImporter.importProfile(config, messages);
for (ActiveRule rule : ocLintRulesProfile.getActiveRules()) {
profile.addActiveRule(rule);
}
return profile;
} finally {
Closeables.closeQuietly(config);
}
}
|
#vulnerable code
@Override
public RulesProfile createProfile(final ValidationMessages messages) {
LOGGER.info("Creating Swift Profile");
Reader config = null;
final RulesProfile profile = RulesProfile.create("Swift", Swift.KEY);
profile.setDefaultProfile(true);
try {
// add swift lint rules
config = new InputStreamReader(getClass().getResourceAsStream(SwiftLintProfile.PROFILE_PATH));
RulesProfile ocLintRulesProfile = this.swiftLintProfileImporter.importProfile(config, messages);
for (ActiveRule rule : ocLintRulesProfile.getActiveRules()) {
profile.addActiveRule(rule);
}
//add tailor rules
config = new InputStreamReader(getClass().getResourceAsStream(TailorProfile.PROFILE_PATH));
RulesProfile ocTailorRulesProfile = this.tailorProfileImporter.importProfile(config, messages);
for (ActiveRule rule : ocTailorRulesProfile.getActiveRules()) {
profile.addActiveRule(rule);
}
return profile;
} finally {
Closeables.closeQuietly(config);
}
}
#location 21
#vulnerability type NULL_DEREFERENCE
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
public void next() {
if (_waitingToEmit.isEmpty()) {
fill();
}
while (true) {
MessageAndOffset msgAndOffset = _waitingToEmit.pollFirst();
if (msgAndOffset != null) {
Long key = msgAndOffset.offset();
Message msg = msgAndOffset.message();
try {
_lastEnquedOffset = key;
if (_lastEnquedOffset >= _lastComittedOffset) {
if (msg.payload() != null) {
_receiver.store(msg.payload());
LOG.info("Store for topic " + _topic + " for partition " + _partition.partition + " is : "+ _lastEnquedOffset);
}
}
} catch (Exception e) {
LOG.info("Process Failed for offset " + key + " for "
+ _partition + " for topic " + _topic
+ " with Exception" + e.getMessage());
e.printStackTrace();
}
}else{
break;
}
}
long now = System.currentTimeMillis();
if ((_lastEnquedOffset > _lastComittedOffset) && ((now - _lastCommitMs) > _kafkaconfig._stateUpdateIntervalMs)) {
commit();
LOG.info("After commit , Waiting To Emit queue size is "
+ _waitingToEmit.size());
_lastCommitMs = System.currentTimeMillis();
}
}
|
#vulnerable code
public void next() {
if (_waitingToEmit.isEmpty()) {
fill();
}
while (true) {
MessageAndOffset msgAndOffset = _waitingToEmit.pollFirst();
if (msgAndOffset != null) {
Long key = msgAndOffset.offset();
Message msg = msgAndOffset.message();
try {
_lastEnquedOffset = key;
if (_lastEnquedOffset > _lastComittedOffset) {
if (msg.payload() != null) {
synchronized (_receiver) {
_receiver.store(new String(Utils.toByteArray(msg.payload())));
}
LOG.info("Store for topic " + _topic + " for partition " + _partition.partition + " is : "+ _lastEnquedOffset);
}
}
} catch (Exception e) {
LOG.info("Process Failed for offset " + key + " for "
+ _partition + " for topic " + _topic
+ " with Exception" + e.getMessage());
e.printStackTrace();
}
}else{
break;
}
}
long now = System.currentTimeMillis();
if ((_lastEnquedOffset > _lastComittedOffset) && ((now - _lastCommitMs) > _kafkaconfig._stateUpdateIntervalMs)) {
commit();
LOG.info("After commit , Waiting To Emit queue size is "
+ _waitingToEmit.size());
_lastCommitMs = System.currentTimeMillis();
}
}
#location 25
#vulnerability type THREAD_SAFETY_VIOLATION
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
public void next() {
if (_waitingToEmit.isEmpty()) {
fill();
}
while (true) {
MessageAndOffset msgAndOffset = _waitingToEmit.pollFirst();
if (msgAndOffset != null) {
Long key = msgAndOffset.offset();
Message msg = msgAndOffset.message();
try {
_lastEnquedOffset = key;
if (_lastEnquedOffset >= _lastComittedOffset) {
if (msg.payload() != null) {
_receiver.store(msg.payload());
LOG.info("Store for topic " + _topic + " for partition " + _partition.partition + " is : "+ _lastEnquedOffset);
}
}
} catch (Exception e) {
LOG.info("Process Failed for offset " + key + " for "
+ _partition + " for topic " + _topic
+ " with Exception" + e.getMessage());
e.printStackTrace();
}
}else{
break;
}
}
long now = System.currentTimeMillis();
if ((_lastEnquedOffset > _lastComittedOffset) && ((now - _lastCommitMs) > _kafkaconfig._stateUpdateIntervalMs)) {
commit();
LOG.info("After commit , Waiting To Emit queue size is "
+ _waitingToEmit.size());
_lastCommitMs = System.currentTimeMillis();
}
}
|
#vulnerable code
public void next() {
if (_waitingToEmit.isEmpty()) {
fill();
}
while (true) {
MessageAndOffset msgAndOffset = _waitingToEmit.pollFirst();
if (msgAndOffset != null) {
Long key = msgAndOffset.offset();
Message msg = msgAndOffset.message();
try {
_lastEnquedOffset = key;
if (_lastEnquedOffset > _lastComittedOffset) {
if (msg.payload() != null) {
synchronized (_receiver) {
_receiver.store(new String(Utils.toByteArray(msg.payload())));
}
LOG.info("Store for topic " + _topic + " for partition " + _partition.partition + " is : "+ _lastEnquedOffset);
}
}
} catch (Exception e) {
LOG.info("Process Failed for offset " + key + " for "
+ _partition + " for topic " + _topic
+ " with Exception" + e.getMessage());
e.printStackTrace();
}
}else{
break;
}
}
long now = System.currentTimeMillis();
if ((_lastEnquedOffset > _lastComittedOffset) && ((now - _lastCommitMs) > _kafkaconfig._stateUpdateIntervalMs)) {
commit();
LOG.info("After commit , Waiting To Emit queue size is "
+ _waitingToEmit.size());
_lastCommitMs = System.currentTimeMillis();
}
}
#location 43
#vulnerability type THREAD_SAFETY_VIOLATION
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
public void next() {
if (_waitingToEmit.isEmpty()) {
fill();
}
while (true) {
MessageAndOffset msgAndOffset = _waitingToEmit.pollFirst();
if (msgAndOffset != null) {
Long key = msgAndOffset.offset();
Message msg = msgAndOffset.message();
try {
_lastEnquedOffset = key;
if (_lastEnquedOffset >= _lastComittedOffset) {
if (msg.payload() != null) {
_receiver.store(msg.payload());
LOG.info("Store for topic " + _topic + " for partition " + _partition.partition + " is : "+ _lastEnquedOffset);
}
}
} catch (Exception e) {
LOG.info("Process Failed for offset " + key + " for "
+ _partition + " for topic " + _topic
+ " with Exception" + e.getMessage());
e.printStackTrace();
}
}else{
break;
}
}
long now = System.currentTimeMillis();
if ((_lastEnquedOffset > _lastComittedOffset) && ((now - _lastCommitMs) > _kafkaconfig._stateUpdateIntervalMs)) {
commit();
LOG.info("After commit , Waiting To Emit queue size is "
+ _waitingToEmit.size());
_lastCommitMs = System.currentTimeMillis();
}
}
|
#vulnerable code
public void next() {
if (_waitingToEmit.isEmpty()) {
fill();
}
while (true) {
MessageAndOffset msgAndOffset = _waitingToEmit.pollFirst();
if (msgAndOffset != null) {
Long key = msgAndOffset.offset();
Message msg = msgAndOffset.message();
try {
_lastEnquedOffset = key;
if (_lastEnquedOffset > _lastComittedOffset) {
if (msg.payload() != null) {
synchronized (_receiver) {
_receiver.store(new String(Utils.toByteArray(msg.payload())));
}
LOG.info("Store for topic " + _topic + " for partition " + _partition.partition + " is : "+ _lastEnquedOffset);
}
}
} catch (Exception e) {
LOG.info("Process Failed for offset " + key + " for "
+ _partition + " for topic " + _topic
+ " with Exception" + e.getMessage());
e.printStackTrace();
}
}else{
break;
}
}
long now = System.currentTimeMillis();
if ((_lastEnquedOffset > _lastComittedOffset) && ((now - _lastCommitMs) > _kafkaconfig._stateUpdateIntervalMs)) {
commit();
LOG.info("After commit , Waiting To Emit queue size is "
+ _waitingToEmit.size());
_lastCommitMs = System.currentTimeMillis();
}
}
#location 4
#vulnerability type THREAD_SAFETY_VIOLATION
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
public void next() {
if (_waitingToEmit.isEmpty()) {
fill();
}
while (true) {
MessageAndOffset msgAndOffset = _waitingToEmit.pollFirst();
if (msgAndOffset != null) {
Long key = msgAndOffset.offset();
Message msg = msgAndOffset.message();
try {
_lastEnquedOffset = key;
if (_lastEnquedOffset >= _lastComittedOffset) {
if (msg.payload() != null) {
_receiver.store(msg.payload());
LOG.info("Store for topic " + _topic + " for partition " + _partition.partition + " is : "+ _lastEnquedOffset);
}
}
} catch (Exception e) {
LOG.info("Process Failed for offset " + key + " for "
+ _partition + " for topic " + _topic
+ " with Exception" + e.getMessage());
e.printStackTrace();
}
}else{
break;
}
}
long now = System.currentTimeMillis();
if ((_lastEnquedOffset > _lastComittedOffset) && ((now - _lastCommitMs) > _kafkaconfig._stateUpdateIntervalMs)) {
commit();
LOG.info("After commit , Waiting To Emit queue size is "
+ _waitingToEmit.size());
_lastCommitMs = System.currentTimeMillis();
}
}
|
#vulnerable code
public void next() {
if (_waitingToEmit.isEmpty()) {
fill();
}
while (true) {
MessageAndOffset msgAndOffset = _waitingToEmit.pollFirst();
if (msgAndOffset != null) {
Long key = msgAndOffset.offset();
Message msg = msgAndOffset.message();
try {
_lastEnquedOffset = key;
if (_lastEnquedOffset > _lastComittedOffset) {
if (msg.payload() != null) {
synchronized (_receiver) {
_receiver.store(new String(Utils.toByteArray(msg.payload())));
}
LOG.info("Store for topic " + _topic + " for partition " + _partition.partition + " is : "+ _lastEnquedOffset);
}
}
} catch (Exception e) {
LOG.info("Process Failed for offset " + key + " for "
+ _partition + " for topic " + _topic
+ " with Exception" + e.getMessage());
e.printStackTrace();
}
}else{
break;
}
}
long now = System.currentTimeMillis();
if ((_lastEnquedOffset > _lastComittedOffset) && ((now - _lastCommitMs) > _kafkaconfig._stateUpdateIntervalMs)) {
commit();
LOG.info("After commit , Waiting To Emit queue size is "
+ _waitingToEmit.size());
_lastCommitMs = System.currentTimeMillis();
}
}
#location 42
#vulnerability type THREAD_SAFETY_VIOLATION
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
public void next() {
if (_waitingToEmit.isEmpty()) {
fill();
}
while (true) {
MessageAndOffset msgAndOffset = _waitingToEmit.pollFirst();
if (msgAndOffset != null) {
Long key = msgAndOffset.offset();
Message msg = msgAndOffset.message();
try {
_lastEnquedOffset = key;
if (_lastEnquedOffset >= _lastComittedOffset) {
if (msg.payload() != null) {
MessageAndMetadata mmeta = new MessageAndMetadata();
mmeta.setTopic(_topic);
mmeta.setConsumer(_ConsumerId);
mmeta.setOffset(_lastEnquedOffset);
mmeta.setPartition(_partition);
byte[] payload = new byte[msg.payload().remaining()];
msg.payload().get(payload);
mmeta.setPayload(payload);
if (msg.hasKey()){
byte[] msgKey = new byte[msg.key().remaining()];
msg.key().get(msgKey);
mmeta.setKey(msgKey);
}
_dataBuffer.add(mmeta);
LOG.info("Store for topic " + _topic
+ " for partition " + _partition.partition
+ " is : " + _lastEnquedOffset);
}
}
} catch (Exception e) {
LOG.error("Process Failed for offset " + key + " for "
+ _partition + " for topic " + _topic
+ " with Exception" + e.getMessage());
e.printStackTrace();
}
} else {
break;
}
}
if ((_lastEnquedOffset >= _lastComittedOffset)
&& (_waitingToEmit.isEmpty())) {
try{
synchronized (_receiver) {
if(!_dataBuffer.isEmpty())
_receiver.store(_dataBuffer.iterator());
commit();
_dataBuffer.clear();
}
}catch(Exception ex){
_emittedToOffset = _lastComittedOffset;
_dataBuffer.clear();
_receiver.reportError("Error While Store for Partition "+ _partition, ex);
}
}
}
|
#vulnerable code
public void next() {
if (_waitingToEmit.isEmpty()) {
if (_lastFillTime == null
|| (System.currentTimeMillis() - _lastFillTime) > _kafkaconfig._fillFreqMs) {
LOG.info("_waitingToEmit is empty for topic " + _topic
+ " for partition " + _partition.partition
+ ".. Filling it every "+ _kafkaconfig._fillFreqMs +" miliseconds");
fill();
_lastFillTime = System.currentTimeMillis();
}
}
while (true) {
MessageAndOffset msgAndOffset = _waitingToEmit.pollFirst();
if (msgAndOffset != null) {
Long key = msgAndOffset.offset();
Message msg = msgAndOffset.message();
try {
_lastEnquedOffset = key;
if (_lastEnquedOffset >= _lastComittedOffset) {
if (msg.payload() != null) {
MessageAndMetadata mmeta = new MessageAndMetadata();
mmeta.setTopic(_topic);
mmeta.setConsumer(_ConsumerId);
mmeta.setOffset(_lastEnquedOffset);
mmeta.setPartition(_partition);
byte[] payload = new byte[msg.payload().remaining()];
msg.payload().get(payload);
mmeta.setPayload(payload);
if (msg.hasKey()){
byte[] msgKey = new byte[msg.key().remaining()];
msg.key().get(msgKey);
mmeta.setKey(msgKey);
}
_dataBuffer.add(mmeta);
LOG.info("Store for topic " + _topic
+ " for partition " + _partition.partition
+ " is : " + _lastEnquedOffset);
}
}
} catch (Exception e) {
LOG.error("Process Failed for offset " + key + " for "
+ _partition + " for topic " + _topic
+ " with Exception" + e.getMessage());
e.printStackTrace();
}
} else {
break;
}
}
if ((_lastEnquedOffset >= _lastComittedOffset)
&& (_waitingToEmit.isEmpty())) {
if(_dataBuffer.size() > 0){
try{
synchronized (_receiver) {
_receiver.store(_dataBuffer.iterator());
commit();
_dataBuffer.clear();
}
}catch(Exception ex){
_emittedToOffset = _lastComittedOffset;
_dataBuffer.clear();
_receiver.reportError("Error While Store for Partition "+ _partition, ex);
}
}
}
}
#location 10
#vulnerability type THREAD_SAFETY_VIOLATION
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
public void next() {
if (_waitingToEmit.isEmpty()) {
fill();
}
while (true) {
MessageAndOffset msgAndOffset = _waitingToEmit.pollFirst();
if (msgAndOffset != null) {
Long key = msgAndOffset.offset();
Message msg = msgAndOffset.message();
try {
_lastEnquedOffset = key;
if (_lastEnquedOffset >= _lastComittedOffset) {
if (msg.payload() != null) {
_receiver.store(msg.payload());
LOG.info("Store for topic " + _topic + " for partition " + _partition.partition + " is : "+ _lastEnquedOffset);
}
}
} catch (Exception e) {
LOG.info("Process Failed for offset " + key + " for "
+ _partition + " for topic " + _topic
+ " with Exception" + e.getMessage());
e.printStackTrace();
}
}else{
break;
}
}
long now = System.currentTimeMillis();
if ((_lastEnquedOffset > _lastComittedOffset) && ((now - _lastCommitMs) > _kafkaconfig._stateUpdateIntervalMs)) {
commit();
LOG.info("After commit , Waiting To Emit queue size is "
+ _waitingToEmit.size());
_lastCommitMs = System.currentTimeMillis();
}
}
|
#vulnerable code
public void next() {
if (_waitingToEmit.isEmpty()) {
fill();
}
while (true) {
MessageAndOffset msgAndOffset = _waitingToEmit.pollFirst();
if (msgAndOffset != null) {
Long key = msgAndOffset.offset();
Message msg = msgAndOffset.message();
try {
_lastEnquedOffset = key;
if (_lastEnquedOffset > _lastComittedOffset) {
if (msg.payload() != null) {
synchronized (_receiver) {
_receiver.store(new String(Utils.toByteArray(msg.payload())));
}
LOG.info("Store for topic " + _topic + " for partition " + _partition.partition + " is : "+ _lastEnquedOffset);
}
}
} catch (Exception e) {
LOG.info("Process Failed for offset " + key + " for "
+ _partition + " for topic " + _topic
+ " with Exception" + e.getMessage());
e.printStackTrace();
}
}else{
break;
}
}
long now = System.currentTimeMillis();
if ((_lastEnquedOffset > _lastComittedOffset) && ((now - _lastCommitMs) > _kafkaconfig._stateUpdateIntervalMs)) {
commit();
LOG.info("After commit , Waiting To Emit queue size is "
+ _waitingToEmit.size());
_lastCommitMs = System.currentTimeMillis();
}
}
#location 46
#vulnerability type THREAD_SAFETY_VIOLATION
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
public void next() {
if (_waitingToEmit.isEmpty()) {
fill();
}
while (true) {
MessageAndOffset msgAndOffset = _waitingToEmit.pollFirst();
if (msgAndOffset != null) {
Long key = msgAndOffset.offset();
Message msg = msgAndOffset.message();
try {
_lastEnquedOffset = key;
if (_lastEnquedOffset >= _lastComittedOffset) {
if (msg.payload() != null) {
MessageAndMetadata mmeta = new MessageAndMetadata();
mmeta.setTopic(_topic);
mmeta.setConsumer(_ConsumerId);
mmeta.setOffset(_lastEnquedOffset);
mmeta.setPartition(_partition);
byte[] payload = new byte[msg.payload().remaining()];
msg.payload().get(payload);
mmeta.setPayload(payload);
if (msg.hasKey()){
byte[] msgKey = new byte[msg.key().remaining()];
msg.key().get(msgKey);
mmeta.setKey(msgKey);
}
_dataBuffer.add(mmeta);
LOG.info("Store for topic " + _topic
+ " for partition " + _partition.partition
+ " is : " + _lastEnquedOffset);
}
}
} catch (Exception e) {
LOG.error("Process Failed for offset " + key + " for "
+ _partition + " for topic " + _topic
+ " with Exception" + e.getMessage());
e.printStackTrace();
}
} else {
break;
}
}
if ((_lastEnquedOffset >= _lastComittedOffset)
&& (_waitingToEmit.isEmpty())) {
try{
synchronized (_receiver) {
if(!_dataBuffer.isEmpty())
_receiver.store(_dataBuffer.iterator());
commit();
_dataBuffer.clear();
}
}catch(Exception ex){
_emittedToOffset = _lastComittedOffset;
_dataBuffer.clear();
_receiver.reportError("Error While Store for Partition "+ _partition, ex);
}
}
}
|
#vulnerable code
public void next() {
if (_waitingToEmit.isEmpty()) {
if (_lastFillTime == null
|| (System.currentTimeMillis() - _lastFillTime) > _kafkaconfig._fillFreqMs) {
LOG.info("_waitingToEmit is empty for topic " + _topic
+ " for partition " + _partition.partition
+ ".. Filling it every "+ _kafkaconfig._fillFreqMs +" miliseconds");
fill();
_lastFillTime = System.currentTimeMillis();
}
}
while (true) {
MessageAndOffset msgAndOffset = _waitingToEmit.pollFirst();
if (msgAndOffset != null) {
Long key = msgAndOffset.offset();
Message msg = msgAndOffset.message();
try {
_lastEnquedOffset = key;
if (_lastEnquedOffset >= _lastComittedOffset) {
if (msg.payload() != null) {
MessageAndMetadata mmeta = new MessageAndMetadata();
mmeta.setTopic(_topic);
mmeta.setConsumer(_ConsumerId);
mmeta.setOffset(_lastEnquedOffset);
mmeta.setPartition(_partition);
byte[] payload = new byte[msg.payload().remaining()];
msg.payload().get(payload);
mmeta.setPayload(payload);
if (msg.hasKey()){
byte[] msgKey = new byte[msg.key().remaining()];
msg.key().get(msgKey);
mmeta.setKey(msgKey);
}
_dataBuffer.add(mmeta);
LOG.info("Store for topic " + _topic
+ " for partition " + _partition.partition
+ " is : " + _lastEnquedOffset);
}
}
} catch (Exception e) {
LOG.error("Process Failed for offset " + key + " for "
+ _partition + " for topic " + _topic
+ " with Exception" + e.getMessage());
e.printStackTrace();
}
} else {
break;
}
}
if ((_lastEnquedOffset >= _lastComittedOffset)
&& (_waitingToEmit.isEmpty())) {
if(_dataBuffer.size() > 0){
try{
synchronized (_receiver) {
_receiver.store(_dataBuffer.iterator());
commit();
_dataBuffer.clear();
}
}catch(Exception ex){
_emittedToOffset = _lastComittedOffset;
_dataBuffer.clear();
_receiver.reportError("Error While Store for Partition "+ _partition, ex);
}
}
}
}
#location 5
#vulnerability type THREAD_SAFETY_VIOLATION
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
public void next() {
if (_waitingToEmit.isEmpty()) {
fill();
}
while (true) {
MessageAndOffset msgAndOffset = _waitingToEmit.pollFirst();
if (msgAndOffset != null) {
Long key = msgAndOffset.offset();
Message msg = msgAndOffset.message();
try {
_lastEnquedOffset = key;
if (_lastEnquedOffset >= _lastComittedOffset) {
if (msg.payload() != null) {
_receiver.store(msg.payload());
LOG.info("Store for topic " + _topic + " for partition " + _partition.partition + " is : "+ _lastEnquedOffset);
}
}
} catch (Exception e) {
LOG.info("Process Failed for offset " + key + " for "
+ _partition + " for topic " + _topic
+ " with Exception" + e.getMessage());
e.printStackTrace();
}
}else{
break;
}
}
long now = System.currentTimeMillis();
if ((_lastEnquedOffset > _lastComittedOffset) && ((now - _lastCommitMs) > _kafkaconfig._stateUpdateIntervalMs)) {
commit();
LOG.info("After commit , Waiting To Emit queue size is "
+ _waitingToEmit.size());
_lastCommitMs = System.currentTimeMillis();
}
}
|
#vulnerable code
public void next() {
if (_waitingToEmit.isEmpty()) {
fill();
}
while (true) {
MessageAndOffset msgAndOffset = _waitingToEmit.pollFirst();
if (msgAndOffset != null) {
Long key = msgAndOffset.offset();
Message msg = msgAndOffset.message();
try {
_lastEnquedOffset = key;
if (_lastEnquedOffset > _lastComittedOffset) {
if (msg.payload() != null) {
synchronized (_receiver) {
_receiver.store(new String(Utils.toByteArray(msg.payload())));
}
LOG.info("Store for topic " + _topic + " for partition " + _partition.partition + " is : "+ _lastEnquedOffset);
}
}
} catch (Exception e) {
LOG.info("Process Failed for offset " + key + " for "
+ _partition + " for topic " + _topic
+ " with Exception" + e.getMessage());
e.printStackTrace();
}
}else{
break;
}
}
long now = System.currentTimeMillis();
if ((_lastEnquedOffset > _lastComittedOffset) && ((now - _lastCommitMs) > _kafkaconfig._stateUpdateIntervalMs)) {
commit();
LOG.info("After commit , Waiting To Emit queue size is "
+ _waitingToEmit.size());
_lastCommitMs = System.currentTimeMillis();
}
}
#location 17
#vulnerability type THREAD_SAFETY_VIOLATION
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
@Test
public void testSession_whenCreateIsTrue() {
when(servletRequest.getSession(true)).thenReturn(httpSession);
assertEquals("A Session with an HTTPSession from the Request should have been created because create parameter " +
"was set to true",
httpSession, request.session(true).raw());
}
|
#vulnerable code
@Test
public void testSession_whenCreateIsTrue() {
when(servletRequest.getSession(true)).thenReturn(httpSession);
Request request = new Request(match, servletRequest);
assertEquals("A Session with an HTTPSession from the Request should have been created because create parameter " +
"was set to true",
httpSession, request.session(true).raw());
}
#location 10
#vulnerability type NULL_DEREFERENCE
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
@BeforeClass
public static void setup() {
testUtil = new SparkTestUtil(PORT);
final Server server = new Server();
ServerConnector connector = new ServerConnector(server);
// Set some timeout options to make debugging easier.
connector.setIdleTimeout(1000 * 60 * 60);
connector.setSoLingerTime(-1);
connector.setPort(PORT);
server.setConnectors(new Connector[]{connector});
WebAppContext bb = new WebAppContext();
bb.setServer(server);
bb.setContextPath(SOMEPATH);
bb.setWar("src/test/webapp");
server.setHandler(bb);
new Thread(new Runnable() {
@Override
public void run() {
try {
System.out.println(">>> STARTING EMBEDDED JETTY SERVER for jUnit testing of SparkFilter");
server.start();
System.in.read();
System.out.println(">>> STOPPING EMBEDDED JETTY SERVER");
server.stop();
server.join();
} catch (Exception e) {
e.printStackTrace();
System.exit(100);
}
}
}).start();
sleep(1000);
}
|
#vulnerable code
@BeforeClass
public static void setup() {
testUtil = new SparkTestUtil(PORT);
final Server server = new Server();
ServerConnector connector = new ServerConnector(server);
// Set some timeout options to make debugging easier.
connector.setIdleTimeout(1000 * 60 * 60);
connector.setSoLingerTime(-1);
connector.setPort(PORT);
server.setConnectors(new Connector[] { connector });
WebAppContext bb = new WebAppContext();
bb.setServer(server);
bb.setContextPath(SOMEPATH);
bb.setWar("src/test/webapp");
server.setHandler(bb);
new Thread(new Runnable() {
@Override
public void run() {
try {
System.out.println(">>> STARTING EMBEDDED JETTY SERVER for jUnit testing of SparkFilter");
server.start();
System.in.read();
System.out.println(">>> STOPPING EMBEDDED JETTY SERVER");
server.stop();
server.join();
} catch (Exception e) {
e.printStackTrace();
System.exit(100);
}
}
}).start();
sleep(1000);
}
#location 12
#vulnerability type RESOURCE_LEAK
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
public String body() {
if (body == null) {
body = StringUtils.toString(bodyAsBytes(), servletRequest.getCharacterEncoding());
}
return body;
}
|
#vulnerable code
public String body() {
if (body == null) {
if (servletRequest.getCharacterEncoding() != null) {
try {
body = new String(bodyAsBytes(), servletRequest.getCharacterEncoding());
} catch (UnsupportedEncodingException e) {
body = new String(bodyAsBytes());
}
} else {
body = new String(bodyAsBytes());
}
}
return body;
}
#location 7
#vulnerability type NULL_DEREFERENCE
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
public void clear() {
if (staticResourceHandlers != null) {
staticResourceHandlers.clear();
staticResourceHandlers = null;
}
staticResourcesSet = false;
externalStaticResourcesSet = false;
}
|
#vulnerable code
public void clear() {
if (staticResourceHandlers != null) {
staticResourceHandlers.clear();
staticResourceHandlers = null;
}
if (jarResourceHandlers != null) {
jarResourceHandlers.clear();
jarResourceHandlers = null;
}
staticResourcesSet = false;
externalStaticResourcesSet = false;
}
#location 9
#vulnerability type THREAD_SAFETY_VIOLATION
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
public static Object getFor(int status, Request request, Response response) {
Object customRenderer = CustomErrorPages.getInstance().customPages.get(status);
Object customPage;
customPage = status == 400 ? NOT_FOUND : INTERNAL_ERROR;
if (customRenderer instanceof String) {
customPage = customRenderer;
} else if (customRenderer instanceof Route) {
try {
customPage = ((Route) customRenderer).handle(request, response);
} catch (Exception e) {
// customPage is already set to default error so nothing needed here
}
}
return customPage;
}
|
#vulnerable code
public static Object getFor(int status, Request request, Response response) {
Object customRenderer = CustomErrorPages.getInstance().customPages.get(status);
Object customPage;
if (customRenderer instanceof String) {
customPage = customRenderer;
} else {
try {
customPage = ((Route) customRenderer).handle(request, response);
} catch (Exception e) {
customPage = status == 400 ? NOT_FOUND : INTERNAL_ERROR;
}
}
return customPage;
}
#location 10
#vulnerability type NULL_DEREFERENCE
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
public boolean consume(HttpServletRequest httpRequest,
HttpServletResponse httpResponse) throws IOException {
if (consumeWithFileResourceHandlers(httpRequest, httpResponse)) {
return true;
}
return false;
}
|
#vulnerable code
public boolean consume(HttpServletRequest httpRequest,
HttpServletResponse httpResponse) throws IOException {
if (consumeWithFileResourceHandlers(httpRequest, httpResponse)) {
return true;
}
if (consumeWithJarResourceHandler(httpRequest, httpResponse)) {
return true;
}
return false;
}
#location 8
#vulnerability type THREAD_SAFETY_VIOLATION
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
public void clear() {
if (staticResourceHandlers != null) {
staticResourceHandlers.clear();
staticResourceHandlers = null;
}
staticResourcesSet = false;
externalStaticResourcesSet = false;
}
|
#vulnerable code
public void clear() {
if (staticResourceHandlers != null) {
staticResourceHandlers.clear();
staticResourceHandlers = null;
}
if (jarResourceHandlers != null) {
jarResourceHandlers.clear();
jarResourceHandlers = null;
}
staticResourcesSet = false;
externalStaticResourcesSet = false;
}
#location 10
#vulnerability type THREAD_SAFETY_VIOLATION
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
public void doFilter(ServletRequest servletRequest, ServletResponse servletResponse, // NOSONAR
FilterChain chain) throws IOException, ServletException { // NOSONAR
HttpServletRequest httpRequest = (HttpServletRequest) servletRequest; // NOSONAR
HttpServletResponse httpResponse = (HttpServletResponse) servletResponse;
// handle static resources
boolean consumedByStaticFile = StaticFiles.consume(httpRequest, httpResponse);
if (consumedByStaticFile) {
return;
}
String method = httpRequest.getHeader(HTTP_METHOD_OVERRIDE_HEADER);
if (method == null) {
method = httpRequest.getMethod();
}
String httpMethodStr = method.toLowerCase(); // NOSONAR
String uri = httpRequest.getPathInfo(); // NOSONAR
String acceptType = httpRequest.getHeader(ACCEPT_TYPE_REQUEST_MIME_HEADER);
Object bodyContent = null;
RequestWrapper requestWrapper = new RequestWrapper();
ResponseWrapper responseWrapper = new ResponseWrapper();
Response response = RequestResponseFactory.create(httpResponse);
LOG.debug("httpMethod:" + httpMethodStr + ", uri: " + uri);
try {
// BEFORE filters
List<RouteMatch> matchSet = routeMatcher.findTargetsForRequestedRoute(HttpMethod.before, uri, acceptType);
for (RouteMatch filterMatch : matchSet) {
Object filterTarget = filterMatch.getTarget();
if (filterTarget instanceof FilterImpl) {
Request request = RequestResponseFactory.create(filterMatch, httpRequest);
FilterImpl filter = (FilterImpl) filterTarget;
requestWrapper.setDelegate(request);
responseWrapper.setDelegate(response);
filter.handle(requestWrapper, responseWrapper);
String bodyAfterFilter = Access.getBody(response);
if (bodyAfterFilter != null) {
bodyContent = bodyAfterFilter;
}
}
}
// BEFORE filters, END
HttpMethod httpMethod = HttpMethod.valueOf(httpMethodStr);
RouteMatch match = null;
match = routeMatcher.findTargetForRequestedRoute(httpMethod, uri, acceptType);
Object target = null;
if (match != null) {
target = match.getTarget();
} else if (httpMethod == HttpMethod.head && bodyContent == null) {
// See if get is mapped to provide default head mapping
bodyContent =
routeMatcher.findTargetForRequestedRoute(HttpMethod.get, uri, acceptType) != null ? "" : null;
}
if (target != null) {
try {
Object result = null;
if (target instanceof RouteImpl) {
RouteImpl route = ((RouteImpl) target);
if (requestWrapper.getDelegate() == null) {
Request request = RequestResponseFactory.create(match, httpRequest);
requestWrapper.setDelegate(request);
} else {
requestWrapper.changeMatch(match);
}
responseWrapper.setDelegate(response);
Object element = route.handle(requestWrapper, responseWrapper);
result = route.render(element);
// result = element.toString(); // TODO: Remove later when render fixed
}
if (result != null) {
bodyContent = result;
}
} catch (HaltException hEx) { // NOSONAR
throw hEx; // NOSONAR
}
}
// AFTER filters
matchSet = routeMatcher.findTargetsForRequestedRoute(HttpMethod.after, uri, acceptType);
for (RouteMatch filterMatch : matchSet) {
Object filterTarget = filterMatch.getTarget();
if (filterTarget instanceof FilterImpl) {
if (requestWrapper.getDelegate() == null) {
Request request = RequestResponseFactory.create(filterMatch, httpRequest);
requestWrapper.setDelegate(request);
} else {
requestWrapper.changeMatch(filterMatch);
}
responseWrapper.setDelegate(response);
FilterImpl filter = (FilterImpl) filterTarget;
filter.handle(requestWrapper, responseWrapper);
String bodyAfterFilter = Access.getBody(response);
if (bodyAfterFilter != null) {
bodyContent = bodyAfterFilter;
}
}
}
// AFTER filters, END
} catch (HaltException hEx) {
LOG.debug("halt performed");
httpResponse.setStatus(hEx.getStatusCode());
if (hEx.getBody() != null) {
bodyContent = hEx.getBody();
} else {
bodyContent = "";
}
} catch (Exception e) {
ExceptionHandlerImpl handler = ExceptionMapper.getInstance().getHandler(e);
if (handler != null) {
handler.handle(e, requestWrapper, responseWrapper);
String bodyAfterFilter = Access.getBody(responseWrapper.getDelegate());
if (bodyAfterFilter != null) {
bodyContent = bodyAfterFilter;
}
} else {
LOG.error("", e);
httpResponse.setStatus(HttpServletResponse.SC_INTERNAL_SERVER_ERROR);
bodyContent = INTERNAL_ERROR;
}
}
// If redirected and content is null set to empty string to not throw NotConsumedException
if (bodyContent == null && responseWrapper.isRedirected()) {
bodyContent = "";
}
boolean consumed = bodyContent != null;
if (!consumed && hasOtherHandlers) {
if (servletRequest instanceof HttpRequestWrapper) {
((HttpRequestWrapper) servletRequest).notConsumed(true);
return;
}
}
if (!consumed && !isServletContext) {
LOG.info("The requested route [" + uri + "] has not been mapped in Spark");
httpResponse.setStatus(HttpServletResponse.SC_NOT_FOUND);
bodyContent = String.format(NOT_FOUND);
consumed = true;
}
if (consumed) {
// Write body content
if (!httpResponse.isCommitted()) {
if (httpResponse.getContentType() == null) {
httpResponse.setContentType("text/html; charset=utf-8");
}
// Check if gzip is wanted/accepted and in that case handle that
OutputStream outputStream = GzipUtils.checkAndWrap(httpRequest, httpResponse, true);
// serialize the body to output stream
serializerChain.process(outputStream, bodyContent);
outputStream.flush(); // needed for GZIP stream. NOt sure where the HTTP response actually gets cleaned up
outputStream.close(); // needed for GZIP
}
} else if (chain != null) {
chain.doFilter(httpRequest, httpResponse);
}
}
|
#vulnerable code
public void doFilter(ServletRequest servletRequest, ServletResponse servletResponse, // NOSONAR
FilterChain chain) throws IOException, ServletException { // NOSONAR
HttpServletRequest httpRequest = (HttpServletRequest) servletRequest; // NOSONAR
HttpServletResponse httpResponse = (HttpServletResponse) servletResponse;
// handle static resources
boolean consumedByStaticFile = StaticFiles.consume(httpRequest, httpResponse);
if (consumedByStaticFile) {
return;
}
String method = httpRequest.getHeader(HTTP_METHOD_OVERRIDE_HEADER);
if (method == null) {
method = httpRequest.getMethod();
}
String httpMethodStr = method.toLowerCase(); // NOSONAR
String uri = httpRequest.getPathInfo(); // NOSONAR
String acceptType = httpRequest.getHeader(ACCEPT_TYPE_REQUEST_MIME_HEADER);
Object bodyContent = null;
RequestWrapper requestWrapper = new RequestWrapper();
ResponseWrapper responseWrapper = new ResponseWrapper();
Response response = RequestResponseFactory.create(httpResponse);
LOG.debug("httpMethod:" + httpMethodStr + ", uri: " + uri);
try {
// BEFORE filters
List<RouteMatch> matchSet = routeMatcher.findTargetsForRequestedRoute(HttpMethod.before, uri, acceptType);
for (RouteMatch filterMatch : matchSet) {
Object filterTarget = filterMatch.getTarget();
if (filterTarget instanceof FilterImpl) {
Request request = RequestResponseFactory.create(filterMatch, httpRequest);
FilterImpl filter = (FilterImpl) filterTarget;
requestWrapper.setDelegate(request);
responseWrapper.setDelegate(response);
filter.handle(requestWrapper, responseWrapper);
String bodyAfterFilter = Access.getBody(response);
if (bodyAfterFilter != null) {
bodyContent = bodyAfterFilter;
}
}
}
// BEFORE filters, END
HttpMethod httpMethod = HttpMethod.valueOf(httpMethodStr);
RouteMatch match = null;
match = routeMatcher.findTargetForRequestedRoute(httpMethod, uri, acceptType);
Object target = null;
if (match != null) {
target = match.getTarget();
} else if (httpMethod == HttpMethod.head && bodyContent == null) {
// See if get is mapped to provide default head mapping
bodyContent =
routeMatcher.findTargetForRequestedRoute(HttpMethod.get, uri, acceptType) != null ? "" : null;
}
if (target != null) {
try {
Object result = null;
if (target instanceof RouteImpl) {
RouteImpl route = ((RouteImpl) target);
if (requestWrapper.getDelegate() == null) {
Request request = RequestResponseFactory.create(match, httpRequest);
requestWrapper.setDelegate(request);
} else {
requestWrapper.changeMatch(match);
}
responseWrapper.setDelegate(response);
Object element = route.handle(requestWrapper, responseWrapper);
result = route.render(element);
// result = element.toString(); // TODO: Remove later when render fixed
}
if (result != null) {
bodyContent = result;
}
} catch (HaltException hEx) { // NOSONAR
throw hEx; // NOSONAR
}
}
// AFTER filters
matchSet = routeMatcher.findTargetsForRequestedRoute(HttpMethod.after, uri, acceptType);
for (RouteMatch filterMatch : matchSet) {
Object filterTarget = filterMatch.getTarget();
if (filterTarget instanceof FilterImpl) {
if (requestWrapper.getDelegate() == null) {
Request request = RequestResponseFactory.create(filterMatch, httpRequest);
requestWrapper.setDelegate(request);
} else {
requestWrapper.changeMatch(filterMatch);
}
responseWrapper.setDelegate(response);
FilterImpl filter = (FilterImpl) filterTarget;
filter.handle(requestWrapper, responseWrapper);
String bodyAfterFilter = Access.getBody(response);
if (bodyAfterFilter != null) {
bodyContent = bodyAfterFilter;
}
}
}
// AFTER filters, END
} catch (HaltException hEx) {
LOG.debug("halt performed");
httpResponse.setStatus(hEx.getStatusCode());
if (hEx.getBody() != null) {
bodyContent = hEx.getBody();
} else {
bodyContent = "";
}
} catch (Exception e) {
ExceptionHandlerImpl handler = ExceptionMapper.getInstance().getHandler(e);
if (handler != null) {
handler.handle(e, requestWrapper, responseWrapper);
String bodyAfterFilter = Access.getBody(responseWrapper.getDelegate());
if (bodyAfterFilter != null) {
bodyContent = bodyAfterFilter;
}
} else {
LOG.error("", e);
httpResponse.setStatus(HttpServletResponse.SC_INTERNAL_SERVER_ERROR);
bodyContent = INTERNAL_ERROR;
}
}
// If redirected and content is null set to empty string to not throw NotConsumedException
if (bodyContent == null && responseWrapper.isRedirected()) {
bodyContent = "";
}
boolean consumed = bodyContent != null;
if (!consumed && hasOtherHandlers) {
if (servletRequest instanceof HttpRequestWrapper) {
((HttpRequestWrapper) servletRequest).notConsumed(true);
return;
}
}
if (!consumed && !isServletContext) {
LOG.info("The requested route [" + uri + "] has not been mapped in Spark");
httpResponse.setStatus(HttpServletResponse.SC_NOT_FOUND);
bodyContent = String.format(NOT_FOUND);
consumed = true;
}
if (consumed) {
// Write body content
if (!httpResponse.isCommitted()) {
if (httpResponse.getContentType() == null) {
httpResponse.setContentType("text/html; charset=utf-8");
}
// Check if gzip is wanted/accepted and in that case handle that
OutputStream outputStream = GzipUtils.checkAndWrap(httpRequest, httpResponse);
// serialize the body to output stream
serializerChain.process(outputStream, bodyContent);
outputStream.flush();//needed for GZIP stream. NOt sure where the HTTP response actually gets cleaned up
}
} else if (chain != null) {
chain.doFilter(httpRequest, httpResponse);
}
}
#location 179
#vulnerability type RESOURCE_LEAK
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
public String getContent(InputStream instream, long contentLength, String charset) throws IOException {
try {
if (instream == null) {
return null;
}
int i = (int)contentLength;
if (i < 0) {
i = 4096;
}
Reader reader = new InputStreamReader(instream, charset);
CharArrayBuffer buffer = new CharArrayBuffer(i);
char[] tmp = new char[1024];
int l;
while((l = reader.read(tmp)) != -1) {
buffer.append(tmp, 0, l);
}
return buffer.toString();
} finally {
Objects.requireNonNull(instream).reset();
}
}
|
#vulnerable code
public String getContent(InputStream instream, long contentLength, String charset) throws IOException {
try {
if (instream == null) {
return null;
}
int i = (int)contentLength;
if (i < 0) {
i = 4096;
}
Reader reader = new InputStreamReader(instream, charset);
CharArrayBuffer buffer = new CharArrayBuffer(i);
char[] tmp = new char[1024];
int l;
while((l = reader.read(tmp)) != -1) {
buffer.append(tmp, 0, l);
}
return buffer.toString();
} finally {
instream.reset();
}
}
#location 17
#vulnerability type RESOURCE_LEAK
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
@Override
public void messageReceived(ChannelHandlerContext ctx, MessageEvent e) throws Exception {
if ((e.getMessage() instanceof CoapMessage) && receiveEnabled) {
CoapMessage coapMessage = (CoapMessage) e.getMessage();
receivedMessages.put(System.currentTimeMillis(), coapMessage);
log.info("Incoming #{} (from {}): {}.",
new Object[]{getReceivedMessages().size(), e.getRemoteAddress(), coapMessage});
}
}
|
#vulnerable code
@Override
public void messageReceived(ChannelHandlerContext ctx, MessageEvent e) throws Exception {
if ((e.getMessage() instanceof CoapMessage) && receiveEnabled) {
CoapMessage coapMessage = (CoapMessage) e.getMessage();
receivedMessages.put(System.currentTimeMillis(), coapMessage);
log.info("Incoming (from " + e.getRemoteAddress() + ") # " + getReceivedMessages().size() + ": "
+ coapMessage);
if(writeEnabled && (coapMessage instanceof CoapRequest)){
if (responsesToSend.isEmpty()) {
fail("responsesToSend is empty. This could be caused by an unexpected request.");
}
MessageReceiverResponse responseToSend = responsesToSend.remove(0);
if (responseToSend == null) {
throw new InternalError("Unexpected request received. No response for: " + coapMessage);
}
CoapResponse coapResponse = responseToSend;
if (responseToSend.getReceiverSetsMsgID()) {
coapResponse.setMessageID(coapMessage.getMessageID());
}
if (responseToSend.getReceiverSetsToken()) {
coapResponse.setToken(coapMessage.getToken());
}
Channels.write(channel, coapResponse, e.getRemoteAddress());
}
}
}
#location 10
#vulnerability type THREAD_SAFETY_VIOLATION
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
@Override
public void writeRequested(ChannelHandlerContext ctx, MessageEvent me) throws Exception{
if(!(me.getMessage() instanceof CoapMessage)){
ctx.sendDownstream(me);
return;
}
CoapMessage coapMessage = (CoapMessage) me.getMessage();
log.debug("Outgoing " + coapMessage.getMessageType() + " (MsgID " + coapMessage.getMessageID() +
", MsgHash " + Integer.toHexString(coapMessage.hashCode()) + ", Rcpt " + me.getRemoteAddress() +
", Block " + coapMessage.getBlockNumber(OptionRegistry.OptionName.BLOCK_2) + ").");
if(coapMessage.getMessageID() == -1){
coapMessage.setMessageID(messageIDFactory.nextMessageID());
log.debug("Set message ID " + coapMessage.getMessageID());
if(coapMessage.getMessageType() == MsgType.CON){
if(!waitingForACK.contains(me.getRemoteAddress(), coapMessage.getMessageID())){
MessageRetransmissionScheduler scheduler =
new MessageRetransmissionScheduler((InetSocketAddress) me.getRemoteAddress(), coapMessage);
executorService.schedule(scheduler, 0, TimeUnit.MILLISECONDS);
}
}
}
ctx.sendDownstream(me);
}
|
#vulnerable code
@Override
public void writeRequested(ChannelHandlerContext ctx, MessageEvent me) throws Exception{
if(!(me.getMessage() instanceof CoapMessage)){
ctx.sendDownstream(me);
return;
}
CoapMessage coapMessage = (CoapMessage) me.getMessage();
log.debug("Handle downstream event for message with ID " +
coapMessage.getMessageID() + " for " + me.getRemoteAddress() );
if(coapMessage.getMessageID() == -1){
coapMessage.setMessageID(messageIDFactory.nextMessageID());
log.debug("Set message ID " + coapMessage.getMessageID());
if(coapMessage.getMessageType() == MsgType.CON){
if(!openOutgoingConMsg.contains(me.getRemoteAddress(), coapMessage.getMessageID())){
synchronized (getClass()){
openOutgoingConMsg.put((InetSocketAddress) me.getRemoteAddress(),
coapMessage.getMessageID(),
coapMessage.getToken());
//Schedule first retransmission
MessageRetransmitter messageRetransmitter
= new MessageRetransmitter((InetSocketAddress) me.getRemoteAddress(), coapMessage);
int delay = (int) (TIMEOUT_MILLIS * messageRetransmitter.randomFactor);
executorService.schedule(messageRetransmitter, delay, TimeUnit.MILLISECONDS);
log.debug("First retransmit for " +
coapMessage.getMessageType() + " message with ID " + coapMessage.getMessageID() +
" to be confirmed by " + me.getRemoteAddress() + " scheduled with a delay of " +
delay + " millis.");
}
}
}
}
ctx.sendDownstream(me);
}
#location 16
#vulnerability type THREAD_SAFETY_VIOLATION
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
public static OptionType getOptionType(OptionName opt_name){
OptionSyntaxConstraints osc = syntaxConstraints.get(opt_name);
if(osc == null) {
throw new NullPointerException("OptionSyntaxConstraints does not exists!");
}
return osc.opt_type;
}
|
#vulnerable code
public static OptionType getOptionType(OptionName opt_name){
return syntaxConstraints.get(opt_name).opt_type;
}
#location 2
#vulnerability type NULL_DEREFERENCE
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
@Override
public void writeRequested(ChannelHandlerContext ctx, MessageEvent me) throws Exception{
if(log.isDebugEnabled()){
log.debug("[IncomingMessageReliablityHandler] Handle Downstream Message Event.");
}
if(me.getMessage() instanceof CoapResponse){
CoapResponse coapResponse = (CoapResponse) me.getMessage();
if(log.isDebugEnabled()){
log.debug("[IncomingMessageReliabilityHandler] Handle downstream event for message with ID " +
coapResponse.getMessageID() + " for " + me.getRemoteAddress() );
}
Boolean alreadyConfirmed;
synchronized(monitor){
alreadyConfirmed = incomingMessagesToBeConfirmed.remove(me.getRemoteAddress(),
coapResponse.getMessageID());
}
if (alreadyConfirmed == null){
System.out.println("Object o ist NULL!!!");
coapResponse.getHeader().setMsgType(MsgType.NON);
}
else{
System.out.println("Object o ist NICHT NULL!!!");
if(alreadyConfirmed){
coapResponse.getHeader().setMsgType(MsgType.CON);
}
else{
coapResponse.getHeader().setMsgType(MsgType.ACK);
}
}
}
ctx.sendDownstream(me);
}
|
#vulnerable code
@Override
public void writeRequested(ChannelHandlerContext ctx, MessageEvent me) throws Exception{
if(log.isDebugEnabled()){
log.debug("[IncomingMessageReliablityHandler] Handle Downstream Message Event.");
}
if(me.getMessage() instanceof CoapResponse){
CoapResponse coapResponse = (CoapResponse) me.getMessage();
if(log.isDebugEnabled()){
log.debug("[OutgoingMessageReliabilityHandler] Handle downstream event for message with ID " +
coapResponse.getMessageID() + " for " + me.getRemoteAddress() );
}
boolean alreadyConfirmed;
synchronized(monitor){
Object o = incomingMessagesToBeConfirmed.remove(me.getRemoteAddress(),
coapResponse.getMessageID());
if (o == null){
System.out.println("Object o ist NULL!!!");
}
else{
System.out.println("Object o ist NICHT NULL!!!");
}
alreadyConfirmed = (Boolean) o;
}
if(alreadyConfirmed){
coapResponse.getHeader().setMsgType(MsgType.CON);
}
else{
coapResponse.getHeader().setMsgType(MsgType.ACK);
}
}
ctx.sendDownstream(me);
}
#location 27
#vulnerability type NULL_DEREFERENCE
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
@Override
public void handleRetransmissionTimout() {
if(!timeoutNotificationTimes.add(System.currentTimeMillis())){
log.error("Could not add notification time for retransmission timeout.");
}
}
|
#vulnerable code
@Override
public void handleRetransmissionTimout() {
if(receiveEnabled && !timeoutNotificationTimes.add(System.currentTimeMillis())){
log.error("Could not add notification time for retransmission timeout.");
}
}
#location 3
#vulnerability type THREAD_SAFETY_VIOLATION
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
@Override
public void messageReceived(ChannelHandlerContext ctx, MessageEvent me){
if(!(me.getMessage() instanceof CoapMessage)){
ctx.sendUpstream(me);
return;
}
CoapMessage coapMessage = (CoapMessage) me.getMessage();
if(coapMessage.getCode().isError() || coapMessage.getMessageType().equals(MsgType.RST)){
errorMessageReceived(ctx, me);
return;
}
if(me.getMessage() instanceof CoapResponse){
CoapResponse response = (CoapResponse) me.getMessage();
final byte[] token = response.getToken();
BlockwiseTransfer transfer;
//Add latest received payload to already received payload
synchronized (incompleteResponseMonitor){
transfer = incompleteResponsePayload.get(new ByteArrayWrapper(token));
if(transfer != null){
try {
if(response.getBlockNumber(BLOCK_2) == transfer.getNextBlockNumber()){
log.debug("Received response (Token: " + (new ByteArrayWrapper(token).toHexString()) +
" , Block: " + response.getBlockNumber(BLOCK_2) + "), ");
if (log.isDebugEnabled()){
//Copy Payload
ChannelBuffer payloadCopy = ChannelBuffers.copiedBuffer(response.getPayload());
byte[] bytes = new byte[payloadCopy.readableBytes()];
payloadCopy.getBytes(0, bytes);
log.debug("Payload Hex: " + new ByteArrayWrapper(bytes).toHexString());
}
transfer.getPartialPayload()
.writeBytes(response.getPayload(), 0, response.getPayload().readableBytes());
transfer.setNextBlockNumber(transfer.getNextBlockNumber() + 1);
}
else{
log.debug("Received unexpected response (Token: " + (new ByteArrayWrapper(token).toHexString()) +
" , Block: " + response.getBlockNumber(BLOCK_2) + "). IGNORE!");
me.getFuture().setSuccess();
return;
}
}
catch (InvalidOptionException e) {
log.error("This should never happen!", e);
}
}
}
//Check whether payload of the response is complete
if(transfer != null){
try {
if(response.isLastBlock(BLOCK_2)){
//Send response with complete payload to application
log.debug("Block " + response.getBlockNumber(BLOCK_2) + " for response with token " +
new ByteArrayWrapper(token).toHexString() +
" received. Payload complete. Forward to client application.");
response.getOptionList().removeAllOptions(BLOCK_2);
response.setPayload(transfer.getPartialPayload());
MessageEvent event = new UpstreamMessageEvent(me.getChannel(), response, me.getRemoteAddress());
ctx.sendUpstream(event);
synchronized (incompleteResponseMonitor){
if(incompleteResponsePayload.remove(new ByteArrayWrapper(token)) == null){
log.error("This should never happen! No incomplete payload found for token " +
new ByteArrayWrapper(token).toHexString());
}
else{
log.debug("Deleted not anymore incomplete payload for token " +
new ByteArrayWrapper(token).toHexString() + " from list");
}
}
return;
}
else{
final long receivedBlockNumber = response.getBlockNumber(BLOCK_2);
log.debug("Block " + receivedBlockNumber + " for response with token " +
new ByteArrayWrapper(token).toHexString() +
" received. Payload (still) incomplete.");
CoapRequest nextCoapRequest = (CoapRequest) transfer.getCoapMessage();
nextCoapRequest.setMessageID(-1);
nextCoapRequest.setBlockOption(BLOCK_2, receivedBlockNumber + 1,
false, response.getMaxBlocksizeForResponse());
ChannelFuture future = Channels.future(me.getChannel());
future.addListener(new ChannelFutureListener() {
@Override
public void operationComplete(ChannelFuture future) throws Exception {
log.debug("Request for block " + (receivedBlockNumber + 1) + " for token " +
new ByteArrayWrapper(token).toHexString() + " sent succesfully.");
}
});
MessageEvent event = new DownstreamMessageEvent(me.getChannel(),
future, nextCoapRequest, me.getRemoteAddress());
log.debug("Send request for block " + (receivedBlockNumber + 1) + " for token " +
new ByteArrayWrapper(token).toHexString() + ".");
ctx.sendDownstream(event);
return;
}
}
catch (InvalidOptionException e) {
log.error("This should never happen!", e);
}
catch (MessageDoesNotAllowPayloadException e) {
log.error("This should never happen!", e);
}
catch (ToManyOptionsException e){
log.error("This should never happen!", e);
}
catch (InvalidHeaderException e) {
log.error("This should never happen!", e);
}
}
}
ctx.sendUpstream(me);
}
|
#vulnerable code
@Override
public void messageReceived(ChannelHandlerContext ctx, MessageEvent me){
if(!(me.getMessage() instanceof CoapMessage)){
ctx.sendUpstream(me);
return;
}
if(me.getMessage() instanceof CoapResponse){
CoapResponse response = (CoapResponse) me.getMessage();
if(response.getMaxBlocksizeForResponse() != null){
final byte[] token = response.getToken();
//Add latest received payload to already received payload
BlockwiseTransfer transfer;
synchronized (incompleteResponseMonitor){
transfer = incompleteResponsePayload.get(new ByteArrayWrapper(token));
try {
if(response.getBlockNumber(BLOCK_2) == transfer.getNextBlockNumber()){
log.debug("Received response (Token: " + (new ByteArrayWrapper(token).toHexString()) +
" , Block: " + response.getBlockNumber(BLOCK_2) + "), ");
//Copy Payload
ChannelBuffer payloadCopy = ChannelBuffers.copiedBuffer(response.getPayload());
byte[] bytes = new byte[payloadCopy.readableBytes()];
payloadCopy.getBytes(0, bytes);
log.debug("Payload Hex: " + new ByteArrayWrapper(bytes).toHexString());
//**********************************************
transfer.getPartialPayload()
.writeBytes(response.getPayload(), 0, response.getPayload().readableBytes());
transfer.setNextBlockNumber(transfer.getNextBlockNumber() + 1);
}
else{
log.debug("Received duplicate response (Token: " + (new ByteArrayWrapper(token).toHexString()) +
" , Block: " + response.getBlockNumber(BLOCK_2) + "). IGNORE!");
me.getFuture().setSuccess();
return;
}
}
catch (InvalidOptionException e) {
log.error("This should never happen!", e);
}
}
//Check whether payload of the response is complete
try {
if(response.isLastBlock(BLOCK_2)){
//Send response with complete payload to application
log.debug("Block " + response.getBlockNumber(BLOCK_2) + " for response with token " +
new ByteArrayWrapper(token).toHexString() +
" received. Payload complete. Forward to client application.");
response.getOptionList().removeAllOptions(BLOCK_2);
response.setPayload(transfer.getPartialPayload());
MessageEvent event = new UpstreamMessageEvent(me.getChannel(), response, me.getRemoteAddress());
ctx.sendUpstream(event);
synchronized (incompleteResponseMonitor){
if(incompleteResponsePayload.remove(new ByteArrayWrapper(token)) == null){
log.error("This should never happen! No incomplete payload found for token " +
new ByteArrayWrapper(token).toHexString());
}
else{
log.debug("Deleted not anymore incomplete payload for token " +
new ByteArrayWrapper(token).toHexString() + " from list");
}
}
//End the original ChannelFuture
me.getFuture().isSuccess();
return;
}
else{
final long receivedBlockNumber = response.getBlockNumber(BLOCK_2);
log.debug("Block " + receivedBlockNumber + " for response with token " +
new ByteArrayWrapper(token).toHexString() +
" received. Payload (still) incomplete.");
CoapRequest nextCoapRequest = (CoapRequest) transfer.getCoapMessage();
nextCoapRequest.setMessageID(-1);
nextCoapRequest.setBlockOption(BLOCK_2, receivedBlockNumber + 1,
false, response.getMaxBlocksizeForResponse());
ChannelFuture future = Channels.future(me.getChannel());
future.addListener(new ChannelFutureListener() {
@Override
public void operationComplete(ChannelFuture future) throws Exception {
log.debug("Request for block " + (receivedBlockNumber + 1) + " for token " +
new ByteArrayWrapper(token).toHexString() + " sent succesfully.");
}
});
MessageEvent event = new DownstreamMessageEvent(me.getChannel(),
future, nextCoapRequest, me.getRemoteAddress());
log.debug("Send request for block " + (receivedBlockNumber + 1) + " for token " +
new ByteArrayWrapper(token).toHexString() + ".");
ctx.sendDownstream(event);
return;
}
}
catch (InvalidOptionException e) {
log.error("This should never happen!", e);
}
catch (MessageDoesNotAllowPayloadException e) {
log.error("This should never happen!", e);
}
catch (ToManyOptionsException e) {
log.error("This should never happen!", e);
} catch (InvalidHeaderException e) {
log.error("This should never happen!", e);
}
}
ctx.sendUpstream(me);
}
}
#location 20
#vulnerability type NULL_DEREFERENCE
|
Below is the vulnerable code, please generate the patch based on the following information.
|
#fixed code
@Override
public void receiveEmptyACK(){
if(!emptyAckNotificationTimes.add(System.currentTimeMillis())){
log.error("Could not add notification time for empty ACK.");
}
}
|
#vulnerable code
@Override
public void receiveEmptyACK(){
if(receiveEnabled && !emptyAckNotificationTimes.add(System.currentTimeMillis())){
log.error("Could not add notification time for empty ACK.");
}
}
#location 3
#vulnerability type THREAD_SAFETY_VIOLATION
|
Below is the vulnerable code, please generate the patch based on the following information.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.