feat: implement a defensive sanitisation strategy

This commit is contained in:
Marli Frost 2020-09-12 10:36:41 +01:00
parent fb5105725f
commit 103003388c
No known key found for this signature in database
GPG key ID: CB0BEA7CF9BD1245

View file

@ -9,7 +9,7 @@ use crate::zipcrypto::ZipCryptoReaderValid;
use std::borrow::Cow; use std::borrow::Cow;
use std::collections::HashMap; use std::collections::HashMap;
use std::io::{self, prelude::*}; use std::io::{self, prelude::*};
use std::path::Component; use std::path::{Component, Path};
use crate::cp437::FromCp437; use crate::cp437::FromCp437;
use crate::types::{DateTime, System, ZipFileData}; use crate::types::{DateTime, System, ZipFileData};
@ -573,6 +573,9 @@ impl<'a> ZipFile<'a> {
/// current directory (`../runtime`). Carelessly writing to these paths /// current directory (`../runtime`). Carelessly writing to these paths
/// allows an attacker to craft a ZIP archive that will overwrite critical /// allows an attacker to craft a ZIP archive that will overwrite critical
/// files. /// files.
///
/// You can use the [`ZipFile::name_as_child`] method to validate the name
/// as a safe path.
pub fn name(&self) -> &str { pub fn name(&self) -> &str {
&self.data.file_name &self.data.file_name
} }
@ -603,13 +606,41 @@ impl<'a> ZipFile<'a> {
/// ///
/// This is appropriate if you need to be able to extract *something* from /// This is appropriate if you need to be able to extract *something* from
/// any archive, but will easily misrepresent trivial paths like /// any archive, but will easily misrepresent trivial paths like
/// `foo/../bar` as `foo/bar` (instead of `bar`). /// `foo/../bar` as `foo/bar` (instead of `bar`). Because of this,
/// [`ZipFile::name_as_child`] is the better option in most scenarios.
/// ///
/// [`ParentDir`]: `Component::ParentDir` /// [`ParentDir`]: `Component::ParentDir`
pub fn mangled_name(&self) -> ::std::path::PathBuf { pub fn mangled_name(&self) -> ::std::path::PathBuf {
self.data.file_name_sanitized() self.data.file_name_sanitized()
} }
/// Ensure the file path is safe to use as a [`Path`].
///
/// - It can't contain NULL bytes
/// - It can't resolve to a path outside the current directory
/// > `foo/../bar` is fine, `foo/../../bar` is not.
/// - It can't be an absolute path
///
/// This will read well-formed ZIP files correctly, and is resistant
/// to path-based exploits. It is recommended over
/// [`ZipFile::mangled_name`].
pub fn name_as_child(&self) -> Option<&Path> {
if self.data.file_name.contains('\0') {
return None;
}
let path = Path::new(&self.data.file_name);
let mut depth = 0usize;
for component in path.components() {
match component {
Component::Prefix(_) | Component::RootDir => return None,
Component::ParentDir => depth = depth.checked_sub(1)?,
Component::Normal(_) => depth += 1,
Component::CurDir => (),
}
}
Some(path)
}
/// Get the comment of the file /// Get the comment of the file
pub fn comment(&self) -> &str { pub fn comment(&self) -> &str {
&self.data.file_comment &self.data.file_comment