Perform an extra sanity check on ZIP64 detection
This commit is contained in:
parent
44d179355c
commit
475b55df1d
2 changed files with 60 additions and 33 deletions
80
src/read.rs
80
src/read.rs
|
@ -70,7 +70,9 @@ pub(crate) mod zip_archive {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
use crate::spec::CentralDirectoryEnd;
|
||||||
pub use zip_archive::ZipArchive;
|
pub use zip_archive::ZipArchive;
|
||||||
|
|
||||||
#[allow(clippy::large_enum_variant)]
|
#[allow(clippy::large_enum_variant)]
|
||||||
pub(crate) enum CryptoReader<'a> {
|
pub(crate) enum CryptoReader<'a> {
|
||||||
Plaintext(io::Take<&'a mut dyn Read>),
|
Plaintext(io::Take<&'a mut dyn Read>),
|
||||||
|
@ -121,14 +123,14 @@ impl<'a> CryptoReader<'a> {
|
||||||
|
|
||||||
pub(crate) enum ZipFileReader<'a> {
|
pub(crate) enum ZipFileReader<'a> {
|
||||||
NoReader,
|
NoReader,
|
||||||
Raw(io::Take<&'a mut dyn io::Read>),
|
Raw(io::Take<&'a mut dyn Read>),
|
||||||
Stored(Crc32Reader<CryptoReader<'a>>),
|
Stored(Crc32Reader<CryptoReader<'a>>),
|
||||||
#[cfg(any(
|
#[cfg(any(
|
||||||
feature = "deflate",
|
feature = "deflate",
|
||||||
feature = "deflate-miniz",
|
feature = "deflate-miniz",
|
||||||
feature = "deflate-zlib"
|
feature = "deflate-zlib"
|
||||||
))]
|
))]
|
||||||
Deflated(Crc32Reader<flate2::read::DeflateDecoder<CryptoReader<'a>>>),
|
Deflated(Crc32Reader<DeflateDecoder<CryptoReader<'a>>>),
|
||||||
#[cfg(feature = "bzip2")]
|
#[cfg(feature = "bzip2")]
|
||||||
Bzip2(Crc32Reader<BzDecoder<CryptoReader<'a>>>),
|
Bzip2(Crc32Reader<BzDecoder<CryptoReader<'a>>>),
|
||||||
#[cfg(feature = "zstd")]
|
#[cfg(feature = "zstd")]
|
||||||
|
@ -207,11 +209,11 @@ pub(crate) fn find_content<'a>(
|
||||||
|
|
||||||
#[allow(clippy::too_many_arguments)]
|
#[allow(clippy::too_many_arguments)]
|
||||||
pub(crate) fn make_crypto_reader<'a>(
|
pub(crate) fn make_crypto_reader<'a>(
|
||||||
compression_method: crate::compression::CompressionMethod,
|
compression_method: CompressionMethod,
|
||||||
crc32: u32,
|
crc32: u32,
|
||||||
last_modified_time: DateTime,
|
last_modified_time: DateTime,
|
||||||
using_data_descriptor: bool,
|
using_data_descriptor: bool,
|
||||||
reader: io::Take<&'a mut dyn io::Read>,
|
reader: io::Take<&'a mut dyn Read>,
|
||||||
password: Option<&[u8]>,
|
password: Option<&[u8]>,
|
||||||
aes_info: Option<(AesMode, AesVendorVersion)>,
|
aes_info: Option<(AesMode, AesVendorVersion)>,
|
||||||
#[cfg(feature = "aes-crypto")] compressed_size: u64,
|
#[cfg(feature = "aes-crypto")] compressed_size: u64,
|
||||||
|
@ -291,12 +293,12 @@ pub(crate) fn make_reader(
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
impl<R: Read + io::Seek> ZipArchive<R> {
|
impl<R: Read + Seek> ZipArchive<R> {
|
||||||
/// Get the directory start offset and number of files. This is done in a
|
/// Get the directory start offset and number of files. This is done in a
|
||||||
/// separate function to ease the control flow design.
|
/// separate function to ease the control flow design.
|
||||||
pub(crate) fn get_directory_counts(
|
pub(crate) fn get_directory_counts(
|
||||||
reader: &mut R,
|
reader: &mut R,
|
||||||
footer: &spec::CentralDirectoryEnd,
|
footer: &CentralDirectoryEnd,
|
||||||
cde_start_pos: u64,
|
cde_start_pos: u64,
|
||||||
) -> ZipResult<(u64, u64, usize)> {
|
) -> ZipResult<(u64, u64, usize)> {
|
||||||
// See if there's a ZIP64 footer. The ZIP64 locator if present will
|
// See if there's a ZIP64 footer. The ZIP64 locator if present will
|
||||||
|
@ -327,24 +329,18 @@ impl<R: Read + io::Seek> ZipArchive<R> {
|
||||||
};
|
};
|
||||||
|
|
||||||
match zip64locator {
|
match zip64locator {
|
||||||
None => {
|
None => Self::get_directory_counts_zip32(footer, cde_start_pos),
|
||||||
// Some zip files have data prepended to them, resulting in the
|
|
||||||
// offsets all being too small. Get the amount of error by comparing
|
|
||||||
// the actual file position we found the CDE at with the offset
|
|
||||||
// recorded in the CDE.
|
|
||||||
let archive_offset = cde_start_pos
|
|
||||||
.checked_sub(footer.central_directory_size as u64)
|
|
||||||
.and_then(|x| x.checked_sub(footer.central_directory_offset as u64))
|
|
||||||
.ok_or(ZipError::InvalidArchive(
|
|
||||||
"Invalid central directory size or offset",
|
|
||||||
))?;
|
|
||||||
|
|
||||||
let directory_start = footer.central_directory_offset as u64 + archive_offset;
|
|
||||||
let number_of_files = footer.number_of_files_on_this_disk as usize;
|
|
||||||
Ok((archive_offset, directory_start, number_of_files))
|
|
||||||
}
|
|
||||||
Some(locator64) => {
|
Some(locator64) => {
|
||||||
// If we got here, this is indeed a ZIP64 file.
|
if let Ok((archive_offset, directory_start, number_of_files)) =
|
||||||
|
Self::get_directory_counts_zip32(footer, cde_start_pos)
|
||||||
|
{
|
||||||
|
if directory_start >= locator64.end_of_central_directory_offset {
|
||||||
|
// This isn't a ZIP64, it's a ZIP that happens to have ZIP64 magic in a filename
|
||||||
|
return Ok((archive_offset, directory_start, number_of_files));
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// If we got here, we're pretty sure this is a ZIP64 file.
|
||||||
|
|
||||||
if !footer.record_too_small()
|
if !footer.record_too_small()
|
||||||
&& footer.disk_number as u32 != locator64.disk_with_central_directory
|
&& footer.disk_number as u32 != locator64.disk_with_central_directory
|
||||||
|
@ -395,11 +391,31 @@ impl<R: Read + io::Seek> ZipArchive<R> {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
fn get_directory_counts_zip32(
|
||||||
|
footer: &CentralDirectoryEnd,
|
||||||
|
cde_start_pos: u64,
|
||||||
|
) -> Result<(u64, u64, usize), ZipError> {
|
||||||
|
// Some zip files have data prepended to them, resulting in the
|
||||||
|
// offsets all being too small. Get the amount of error by comparing
|
||||||
|
// the actual file position we found the CDE at with the offset
|
||||||
|
// recorded in the CDE.
|
||||||
|
let archive_offset = cde_start_pos
|
||||||
|
.checked_sub(footer.central_directory_size as u64)
|
||||||
|
.and_then(|x| x.checked_sub(footer.central_directory_offset as u64))
|
||||||
|
.ok_or(ZipError::InvalidArchive(
|
||||||
|
"Invalid central directory size or offset",
|
||||||
|
))?;
|
||||||
|
|
||||||
|
let directory_start = footer.central_directory_offset as u64 + archive_offset;
|
||||||
|
let number_of_files = footer.number_of_files_on_this_disk as usize;
|
||||||
|
Ok((archive_offset, directory_start, number_of_files))
|
||||||
|
}
|
||||||
|
|
||||||
/// Read a ZIP archive, collecting the files it contains
|
/// Read a ZIP archive, collecting the files it contains
|
||||||
///
|
///
|
||||||
/// This uses the central directory record of the ZIP file, and ignores local file headers
|
/// This uses the central directory record of the ZIP file, and ignores local file headers
|
||||||
pub fn new(mut reader: R) -> ZipResult<ZipArchive<R>> {
|
pub fn new(mut reader: R) -> ZipResult<ZipArchive<R>> {
|
||||||
let (footer, cde_start_pos) = spec::CentralDirectoryEnd::find_and_parse(&mut reader)?;
|
let (footer, cde_start_pos) = CentralDirectoryEnd::find_and_parse(&mut reader)?;
|
||||||
|
|
||||||
if !footer.record_too_small() && footer.disk_number != footer.disk_with_central_directory {
|
if !footer.record_too_small() && footer.disk_number != footer.disk_with_central_directory {
|
||||||
return unsupported_zip_error("Support for multi-disk files is not implemented");
|
return unsupported_zip_error("Support for multi-disk files is not implemented");
|
||||||
|
@ -643,7 +659,7 @@ fn unsupported_zip_error<T>(detail: &'static str) -> ZipResult<T> {
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Parse a central directory entry to collect the information for the file.
|
/// Parse a central directory entry to collect the information for the file.
|
||||||
pub(crate) fn central_header_to_zip_file<R: Read + io::Seek>(
|
pub(crate) fn central_header_to_zip_file<R: Read + Seek>(
|
||||||
reader: &mut R,
|
reader: &mut R,
|
||||||
archive_offset: u64,
|
archive_offset: u64,
|
||||||
) -> ZipResult<ZipFileData> {
|
) -> ZipResult<ZipFileData> {
|
||||||
|
@ -873,7 +889,7 @@ impl<'a> ZipFile<'a> {
|
||||||
note = "by stripping `..`s from the path, the meaning of paths can change.
|
note = "by stripping `..`s from the path, the meaning of paths can change.
|
||||||
`mangled_name` can be used if this behaviour is desirable"
|
`mangled_name` can be used if this behaviour is desirable"
|
||||||
)]
|
)]
|
||||||
pub fn sanitized_name(&self) -> ::std::path::PathBuf {
|
pub fn sanitized_name(&self) -> std::path::PathBuf {
|
||||||
self.mangled_name()
|
self.mangled_name()
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -889,7 +905,7 @@ impl<'a> ZipFile<'a> {
|
||||||
/// [`ZipFile::enclosed_name`] is the better option in most scenarios.
|
/// [`ZipFile::enclosed_name`] is the better option in most scenarios.
|
||||||
///
|
///
|
||||||
/// [`ParentDir`]: `Component::ParentDir`
|
/// [`ParentDir`]: `Component::ParentDir`
|
||||||
pub fn mangled_name(&self) -> ::std::path::PathBuf {
|
pub fn mangled_name(&self) -> std::path::PathBuf {
|
||||||
self.data.file_name_sanitized()
|
self.data.file_name_sanitized()
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -989,13 +1005,13 @@ impl<'a> Drop for ZipFile<'a> {
|
||||||
let mut buffer = [0; 1 << 16];
|
let mut buffer = [0; 1 << 16];
|
||||||
|
|
||||||
// Get the inner `Take` reader so all decryption, decompression and CRC calculation is skipped.
|
// Get the inner `Take` reader so all decryption, decompression and CRC calculation is skipped.
|
||||||
let mut reader: std::io::Take<&mut dyn std::io::Read> = match &mut self.reader {
|
let mut reader: io::Take<&mut dyn Read> = match &mut self.reader {
|
||||||
ZipFileReader::NoReader => {
|
ZipFileReader::NoReader => {
|
||||||
let innerreader = self.crypto_reader.take();
|
let innerreader = self.crypto_reader.take();
|
||||||
innerreader.expect("Invalid reader state").into_inner()
|
innerreader.expect("Invalid reader state").into_inner()
|
||||||
}
|
}
|
||||||
reader => {
|
reader => {
|
||||||
let innerreader = ::std::mem::replace(reader, ZipFileReader::NoReader);
|
let innerreader = std::mem::replace(reader, ZipFileReader::NoReader);
|
||||||
innerreader.into_inner()
|
innerreader.into_inner()
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
@ -1029,9 +1045,7 @@ impl<'a> Drop for ZipFile<'a> {
|
||||||
/// * `comment`: set to an empty string
|
/// * `comment`: set to an empty string
|
||||||
/// * `data_start`: set to 0
|
/// * `data_start`: set to 0
|
||||||
/// * `external_attributes`: `unix_mode()`: will return None
|
/// * `external_attributes`: `unix_mode()`: will return None
|
||||||
pub fn read_zipfile_from_stream<'a, R: io::Read>(
|
pub fn read_zipfile_from_stream<'a, R: Read>(reader: &'a mut R) -> ZipResult<Option<ZipFile<'_>>> {
|
||||||
reader: &'a mut R,
|
|
||||||
) -> ZipResult<Option<ZipFile<'_>>> {
|
|
||||||
let signature = reader.read_u32::<LittleEndian>()?;
|
let signature = reader.read_u32::<LittleEndian>()?;
|
||||||
|
|
||||||
match signature {
|
match signature {
|
||||||
|
@ -1105,7 +1119,7 @@ pub fn read_zipfile_from_stream<'a, R: io::Read>(
|
||||||
return unsupported_zip_error("The file length is not available in the local header");
|
return unsupported_zip_error("The file length is not available in the local header");
|
||||||
}
|
}
|
||||||
|
|
||||||
let limit_reader = (reader as &'a mut dyn io::Read).take(result.compressed_size);
|
let limit_reader = (reader as &'a mut dyn Read).take(result.compressed_size);
|
||||||
|
|
||||||
let result_crc32 = result.crc32;
|
let result_crc32 = result.crc32;
|
||||||
let result_compression_method = result.compression_method;
|
let result_compression_method = result.compression_method;
|
||||||
|
|
13
src/write.rs
13
src/write.rs
|
@ -1688,6 +1688,19 @@ mod test {
|
||||||
.expect_err("Expected duplicate filename not to be allowed");
|
.expect_err("Expected duplicate filename not to be allowed");
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn test_filename_looks_like_zip64_locator() {
|
||||||
|
let mut writer = ZipWriter::new(io::Cursor::new(Vec::new()));
|
||||||
|
writer
|
||||||
|
.start_file(
|
||||||
|
"PK\u{6}\u{7}\0\0\0\u{11}\0\0\0\0\0\0\0\0\0\0\0\0",
|
||||||
|
FileOptions::default(),
|
||||||
|
)
|
||||||
|
.unwrap();
|
||||||
|
let zip = writer.finish().unwrap();
|
||||||
|
let _ = ZipArchive::new(zip).unwrap();
|
||||||
|
}
|
||||||
|
|
||||||
#[test]
|
#[test]
|
||||||
fn path_to_string() {
|
fn path_to_string() {
|
||||||
let mut path = std::path::PathBuf::new();
|
let mut path = std::path::PathBuf::new();
|
||||||
|
|
Loading…
Add table
Reference in a new issue