Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix arbitrary path traversal vulnerability in full snapshot REST API #3856

Merged
merged 3 commits into from Mar 18, 2024

Conversation

timvisee
Copy link
Member

Fix arbitrary path traversal in our full snapshot API.

We now enforce snapshot files to be within their snapshot directories.

A simple integration test is added to assert this behavior.

All Submissions:

  • Contributions should target the dev branch. Did you create your branch from dev?
  • Have you followed the guidelines in our Contributing document?
  • Have you checked to ensure there aren't other open Pull Requests for the same update/change?

New Feature Submissions:

  1. Does your submission pass tests?
  2. Have you formatted your code locally using cargo +nightly fmt --all command prior to submission?
  3. Have you checked your code using cargo clippy --all --all-features command?

@timvisee timvisee merged commit 78f1320 into dev Mar 18, 2024
17 checks passed
@timvisee timvisee deleted the fix-snapshot-arbitrary-path-traversal branch March 18, 2024 19:51
timvisee added a commit that referenced this pull request Mar 19, 2024
…3856)

* Improve function to get collection snapshot path

* Fix arbitrary path traversal in full snapshot path function

* Add integration test to assert arbitrary path traversal is blocked
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants