Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

How do I handle exceptions ? Real exception was thrown executing ExecutionNode #119

Open
unoexperto opened this issue Dec 10, 2018 · 1 comment
Labels

Comments

@unoexperto
Copy link

Provide link to specific APK, DEX, or file hash

https://yelp.en.uptodown.com/android/download/60457
MD5: 1de46895fdc3708bd121e3b9bc3309ba

Describe the bug

Multiple thrown exceptions:

Caused by: java.lang.RuntimeException: Real exception was thrown executing ExecutionNode{signature=Lcom/yelp/android/appdata/webrequests/ApiRequest;-><init>(Lcom/yelp/android/appdata/webrequests/ApiRequest$RequestType;Ljava/lang/String;Lorg/apache/http/client/HttpClient;Landroid/content/Context;Lcom/yelp/android/appdata/webrequests/p;)V, op=new-instance r2, Lcom/yelp/android/services/u;, @=35} and was not handled. This could be a bug in smalivm.
	at org.cf.smalivm.NodeExecutor.execute(NodeExecutor.java:91)
	at org.cf.smalivm.MethodExecutor.execute(MethodExecutor.java:61)
	at org.cf.smalivm.VirtualMachine.execute(VirtualMachine.java:103)
	at org.cf.smalivm.VirtualMachine.execute(VirtualMachine.java:82)
	at org.cf.smalivm.opcode.InvokeOp.executeLocalMethod(InvokeOp.java:353)
	at org.cf.smalivm.opcode.InvokeOp.execute(InvokeOp.java:128)
	at org.cf.smalivm.context.ExecutionNode.execute(ExecutionNode.java:52)
	at org.cf.smalivm.NodeExecutor.execute(NodeExecutor.java:80)
	... 27 more
Caused by: java.lang.NullPointerException
	at org.cf.smalivm.context.ExecutionContext.staticallyInitializeClassIfNecessary(ExecutionContext.java:220)
	at org.cf.smalivm.context.ExecutionContext.readClassState(ExecutionContext.java:132)
	at org.cf.smalivm.opcode.NewInstanceOp.execute(NewInstanceOp.java:37)
	at org.cf.smalivm.context.ExecutionNode.execute(ExecutionNode.java:52)
	at org.cf.smalivm.NodeExecutor.execute(NodeExecutor.java:80)
	... 34 more

To Reproduce

-it 'com/yelp' --output-api-level 23 yelp-5-6-1-en-android.apk
Output file: text
Include filter: com/yelp
Exclude filter: null
Max execution time: 300
Max address visits: 10000
Max call depth: 50
Max method visits: 1000000
Max optimization passes: 100
Output API level: 23

Attempted work-arounds
I tried to limit package to deobfuscate.

@CalebFenton
Copy link
Owner

Thanks for the bug report. I'm going to prioritize bugs dealing with malware obfuscation before this, but it does look legitimate.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

2 participants