[USENIX Security 2025]ChainFuzz: Exploiting Upstream Vulnerabilities in Open-Source Supply Chains

发布者:周烩君发布时间:2025-04-08浏览次数:10

Authors:

Deng Peng; Zhang Lei; Meng Yuchuan; Yang Zhemin; Zhang Yuan; Yang Min


Publication:

This paper is included in proceedings of the 34th USENIX Security Symposium (USENIX Security 2025)


Abstract:

 Software supply chain attacks pose an increasingly severe threat to the security of downstream software worldwide. A common method to mitigate these risks is Software Composition Analysis (SCA), which helps developers identify vulnerable dependencies. However, studies show that popular SCA approaches often suffer from high false positive rates. As a result, developers spend significant time manually validating these alerts, which delays the detection and remediation of genuinely exploitable upstream vulnerabilities.  In this paper, we propose CHAINFUZZ, an automated approach for validating upstream vulnerabilities in downstream software by generating Proof-of-Concepts (PoCs). To achieve this, CHAINFUZZ addresses three key challenges. First, intralayer code and constraints. Downstream software introduces custom code and sanity checks that significantly alter the triggering paths and conditions of upstream vulnerabilities. Second, inter-layer dependencies. Software supply chains often involve cross-layer control-flow and data-flow dependencies between conditional statements across different layers. Third, long supply chains. Transitive dependencies in long chains result in intricate exploitation paths, making it challenging to explore large code spaces and handle deeply nested constraints effectively.  We comprehensively evaluate CHAINFUZZ using our dataset, which comprises 66 unique vulnerability and supply chain combinations. Our results demonstrate its effectiveness and practicality in generating PoCs for both direct and transitive vulnerable dependencies. Additionally, we compare CHAINFUZZ with representative fuzzing tools: AFLGo, AFL++, and NESTFUZZ, highlighting its superior performance in downstream PoC generation.