aboutsummaryrefslogtreecommitdiff
path: root/pkg/tool
diff options
context:
space:
mode:
authorUnknwon <u@gogs.io>2018-12-25 09:45:20 -0500
committerUnknwon <u@gogs.io>2018-12-25 09:47:33 -0500
commit5f1f1bb5ed3c9916f11016942b9f553ef4fb72a9 (patch)
tree626d65ac7a5e9f10a3c36ed1650a1457af5cc42c /pkg/tool
parent9ff2df78f02fb09106b33beb7e4c644f86c30c6f (diff)
pkg/tool/path: use IsMaliciousPath to replace SanitizePath (#5558)
Diffstat (limited to 'pkg/tool')
-rw-r--r--pkg/tool/path.go11
-rw-r--r--pkg/tool/path_test.go23
2 files changed, 17 insertions, 17 deletions
diff --git a/pkg/tool/path.go b/pkg/tool/path.go
index e8f7bcbe..e95bba8b 100644
--- a/pkg/tool/path.go
+++ b/pkg/tool/path.go
@@ -5,6 +5,7 @@
package tool
import (
+ "path/filepath"
"strings"
)
@@ -15,10 +16,8 @@ func IsSameSiteURLPath(url string) bool {
return len(url) >= 2 && url[0] == '/' && url[1] != '/' && url[1] != '\\'
}
-// SanitizePath sanitizes user-defined file paths to prevent remote code execution.
-func SanitizePath(path string) string {
- path = strings.TrimLeft(path, "/")
- path = strings.Replace(path, "../", "", -1)
- path = strings.Replace(path, "..\\", "", -1)
- return path
+// IsMaliciousPath returns true if given path is an absolute path or contains malicious content
+// which has potential to traverse upper level directories.
+func IsMaliciousPath(path string) bool {
+ return filepath.IsAbs(path) || strings.Contains(path, "..")
}
diff --git a/pkg/tool/path_test.go b/pkg/tool/path_test.go
index d9b9fb21..44ee975f 100644
--- a/pkg/tool/path_test.go
+++ b/pkg/tool/path_test.go
@@ -31,22 +31,23 @@ func Test_IsSameSiteURLPath(t *testing.T) {
})
}
-func Test_SanitizePath(t *testing.T) {
- Convey("Sanitize malicious user-defined path", t, func() {
+func Test_IsMaliciousPath(t *testing.T) {
+ Convey("Detects malicious path", t, func() {
testCases := []struct {
path string
- expect string
+ expect bool
}{
- {"../../../../../../../../../data/gogs/data/sessions/a/9/a9f0ab6c3ef63dd8", "data/gogs/data/sessions/a/9/a9f0ab6c3ef63dd8"},
- {"data/gogs/../../../../../../../../../data/sessions/a/9/a9f0ab6c3ef63dd8", "data/gogs/data/sessions/a/9/a9f0ab6c3ef63dd8"},
- {"..\\..\\..\\..\\..\\..\\..\\..\\..\\data\\gogs\\data\\sessions\\a\\9\\a9f0ab6c3ef63dd8", "data\\gogs\\data\\sessions\\a\\9\\a9f0ab6c3ef63dd8"},
- {"data\\gogs\\..\\..\\..\\..\\..\\..\\..\\..\\..\\data\\sessions\\a\\9\\a9f0ab6c3ef63dd8", "data\\gogs\\data\\sessions\\a\\9\\a9f0ab6c3ef63dd8"},
-
- {"data/sessions/a/9/a9f0ab6c3ef63dd8", "data/sessions/a/9/a9f0ab6c3ef63dd8"},
- {"data\\sessions\\a\\9\\a9f0ab6c3ef63dd8", "data\\sessions\\a\\9\\a9f0ab6c3ef63dd8"},
+ {"../../../../../../../../../data/gogs/data/sessions/a/9/a9f0ab6c3ef63dd8", true},
+ {"..\\/..\\/../data/gogs/data/sessions/a/9/a9f0ab6c3ef63dd8", true},
+ {"data/gogs/../../../../../../../../../data/sessions/a/9/a9f0ab6c3ef63dd8", true},
+ {"..\\..\\..\\..\\..\\..\\..\\..\\..\\data\\gogs\\data\\sessions\\a\\9\\a9f0ab6c3ef63dd8", true},
+ {"data\\gogs\\..\\..\\..\\..\\..\\..\\..\\..\\..\\data\\sessions\\a\\9\\a9f0ab6c3ef63dd8", true},
+
+ {"data/sessions/a/9/a9f0ab6c3ef63dd8", false},
+ {"data\\sessions\\a\\9\\a9f0ab6c3ef63dd8", false},
}
for _, tc := range testCases {
- So(SanitizePath(tc.path), ShouldEqual, tc.expect)
+ So(IsMaliciousPath(tc.path), ShouldEqual, tc.expect)
}
})
}