2025-02-14 10:24:30 -05:00
|
|
|
# Copyright (C) 2020-2025 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
|
2022-08-23 12:51:49 -07:00
|
|
|
|
|
|
|
"""
|
|
|
|
Run clamscan tests.
|
|
|
|
"""
|
|
|
|
|
|
|
|
import os
|
|
|
|
import sys
|
|
|
|
|
|
|
|
sys.path.append('../unit_tests')
|
|
|
|
import testcase
|
|
|
|
|
|
|
|
|
|
|
|
class TC(testcase.TestCase):
|
|
|
|
@classmethod
|
|
|
|
def setUpClass(cls):
|
|
|
|
super(TC, cls).setUpClass()
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def tearDownClass(cls):
|
|
|
|
super(TC, cls).tearDownClass()
|
|
|
|
|
|
|
|
def setUp(self):
|
|
|
|
super(TC, self).setUp()
|
|
|
|
|
|
|
|
def tearDown(self):
|
|
|
|
super(TC, self).tearDown()
|
|
|
|
self.verify_valgrind_log()
|
|
|
|
|
|
|
|
def test_xls_jpeg_png(self):
|
|
|
|
self.step_name('Test that clamav can successfully extract jpeg and png images from XLS documents')
|
|
|
|
# Note: we aren't testing BMP, TIFF, or GIF because excel converts them to PNG when you try to insert them.
|
|
|
|
|
|
|
|
testfiles = TC.path_source / 'unit_tests' / 'input' / 'other_scanfiles' / 'has_png_and_jpeg.xls'
|
|
|
|
command = '{valgrind} {valgrind_args} {clamscan} -d {path_db} {testfiles} --gen-json --debug'.format(
|
|
|
|
valgrind=TC.valgrind, valgrind_args=TC.valgrind_args, clamscan=TC.clamscan,
|
|
|
|
path_db=TC.path_build / 'unit_tests' / 'input' / 'clamav.hdb',
|
|
|
|
testfiles=testfiles,
|
|
|
|
)
|
|
|
|
output = self.execute_command(command)
|
|
|
|
|
|
|
|
assert output.ec == 0 # no virus, no failures
|
|
|
|
|
|
|
|
expected_results = [
|
|
|
|
'Recognized PNG file',
|
|
|
|
'Recognized JPEG file',
|
2025-06-03 19:03:20 -04:00
|
|
|
'"sha2-256":"4b947f2c5a9bff880100adc319690ab0da05792951e7355d76dfee1da17bb674"',
|
|
|
|
'"sha2-256":"b5c25a21cb9a59489c0629a14a06b492181d166c956e4244bb3da91476f39ecf"',
|
2022-08-23 12:51:49 -07:00
|
|
|
]
|
|
|
|
self.verify_output(output.err, expected=expected_results)
|
|
|
|
|
|
|
|
def test_xls_with_detection(self):
|
|
|
|
self.step_name('Test that clamav can successfully alert on PNG image extracted from XLS documents')
|
|
|
|
# This tests a regression wherein extracted images weren't properly scanned, or the scan result recorded.
|
|
|
|
# Note: we aren't testing the JPEG detection because the JPEG attached to the sample XLS is not properly fuzzy-hashed by clamav, yet.
|
|
|
|
# TODO: Once it is working, add the JPEG detection test.
|
|
|
|
|
|
|
|
os.mkdir(str(TC.path_tmp / 'xls-jpeg-detection-sigs'))
|
|
|
|
|
|
|
|
(TC.path_tmp / 'logo.png.ldb').write_text(
|
|
|
|
"logo.png.good;Engine:150-255,Target:0;0;fuzzy_img#ea0f85d0de719887#0\n"
|
|
|
|
)
|
|
|
|
|
|
|
|
testfiles = TC.path_source / 'unit_tests' / 'input' / 'other_scanfiles' / 'has_png_and_jpeg.xls'
|
|
|
|
command = '{valgrind} {valgrind_args} {clamscan} -d {path_db} {testfiles} --gen-json --debug --allmatch'.format(
|
|
|
|
valgrind=TC.valgrind, valgrind_args=TC.valgrind_args, clamscan=TC.clamscan,
|
|
|
|
path_db=TC.path_tmp / 'logo.png.ldb',
|
|
|
|
testfiles=testfiles,
|
|
|
|
)
|
|
|
|
output = self.execute_command(command)
|
|
|
|
|
|
|
|
assert output.ec == 1 # no virus, no failures
|
|
|
|
|
|
|
|
expected_stderr = [
|
|
|
|
'Recognized PNG file',
|
|
|
|
'Recognized JPEG file',
|
2025-06-03 19:03:20 -04:00
|
|
|
'"sha2-256":"4b947f2c5a9bff880100adc319690ab0da05792951e7355d76dfee1da17bb674"',
|
|
|
|
'"sha2-256":"b5c25a21cb9a59489c0629a14a06b492181d166c956e4244bb3da91476f39ecf"',
|
2022-08-23 12:51:49 -07:00
|
|
|
]
|
|
|
|
self.verify_output(output.err, expected=expected_stderr)
|
|
|
|
|
|
|
|
expected_stdout = [
|
|
|
|
'has_png_and_jpeg.xls: logo.png.good.UNOFFICIAL FOUND',
|
|
|
|
]
|
|
|
|
self.verify_output(output.out, expected=expected_stdout)
|
2023-01-20 14:53:12 -08:00
|
|
|
|
|
|
|
|
|
|
|
def test_HTML_style_with_detection(self):
|
|
|
|
self.step_name('Test that clamav can successfully alert on PNG image extracted from HTML <style> blocks')
|
|
|
|
# This tests a regression wherein extracted images weren't properly scanned, or the scan result recorded.
|
|
|
|
# Note: we aren't testing the JPEG detection because the JPEG attached to the sample XLS is not properly fuzzy-hashed by clamav, yet.
|
|
|
|
# TODO: Once it is working, add the JPEG detection test.
|
|
|
|
|
|
|
|
os.mkdir(str(TC.path_tmp / 'html-css-detection-sigs'))
|
|
|
|
|
|
|
|
(TC.path_tmp / 'cisco-logo.png.ldb').write_text(
|
|
|
|
"cisco-logo.png.good;Engine:150-255,Target:0;0;fuzzy_img#9463944473afd82f#0\n"
|
|
|
|
)
|
|
|
|
(TC.path_tmp / 'clam-logo.gif.ldb').write_text(
|
|
|
|
"clam-logo.gif.good;Engine:150-255,Target:0;0;fuzzy_img#97e4789e252993c6#0\n"
|
|
|
|
)
|
|
|
|
|
|
|
|
testfiles = TC.path_source / 'unit_tests' / 'input' / 'htmlnorm_scanfiles' / 'css_background_2.html'
|
|
|
|
command = '{valgrind} {valgrind_args} {clamscan} -d {path_db} -d {path_db2} {testfiles} --gen-json --debug --allmatch'.format(
|
|
|
|
valgrind=TC.valgrind, valgrind_args=TC.valgrind_args, clamscan=TC.clamscan,
|
|
|
|
path_db=TC.path_tmp / 'cisco-logo.png.ldb',
|
|
|
|
path_db2=TC.path_tmp / 'clam-logo.gif.ldb',
|
|
|
|
testfiles=testfiles,
|
|
|
|
)
|
|
|
|
output = self.execute_command(command)
|
|
|
|
|
|
|
|
expected_stderr = [
|
|
|
|
'Recognized GIF file',
|
|
|
|
'Recognized PNG file',
|
2025-06-03 19:03:20 -04:00
|
|
|
'"sha2-256":"e559f8ea2867eb925d4fd3472129f455832912eb5dd5adc3769ea9138d6d9f0c"',
|
|
|
|
'"sha2-256":"b80f890d19ccb36dae6cf9e62c56013ea9988f763ac3ca86f74539303b091f6b"',
|
2023-01-20 14:53:12 -08:00
|
|
|
]
|
|
|
|
self.verify_output(output.err, expected=expected_stderr)
|
|
|
|
|
|
|
|
expected_stdout = [
|
|
|
|
'css_background_2.html: cisco-logo.png.good.UNOFFICIAL FOUND',
|
|
|
|
'css_background_2.html: clam-logo.gif.good.UNOFFICIAL FOUND',
|
|
|
|
]
|
|
|
|
self.verify_output(output.out, expected=expected_stdout)
|
|
|
|
|
|
|
|
assert output.ec == 1 # no virus, no failures
|