Merge pull request #2326 from aszlig/fix-symlink-leak
Fix symlink leak in restricted eval mode
This commit is contained in:
		
						commit
						bc65e02d96
					
				
					 2 changed files with 21 additions and 4 deletions
				
			
		| 
						 | 
				
			
			@ -349,19 +349,25 @@ Path EvalState::checkSourcePath(const Path & path_)
 | 
			
		|||
 | 
			
		||||
    bool found = false;
 | 
			
		||||
 | 
			
		||||
    /* First canonicalize the path without symlinks, so we make sure an
 | 
			
		||||
     * attacker can't append ../../... to a path that would be in allowedPaths
 | 
			
		||||
     * and thus leak symlink targets.
 | 
			
		||||
     */
 | 
			
		||||
    Path abspath = canonPath(path_);
 | 
			
		||||
 | 
			
		||||
    for (auto & i : *allowedPaths) {
 | 
			
		||||
        if (isDirOrInDir(path_, i)) {
 | 
			
		||||
        if (isDirOrInDir(abspath, i)) {
 | 
			
		||||
            found = true;
 | 
			
		||||
            break;
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (!found)
 | 
			
		||||
        throw RestrictedPathError("access to path '%1%' is forbidden in restricted mode", path_);
 | 
			
		||||
        throw RestrictedPathError("access to path '%1%' is forbidden in restricted mode", abspath);
 | 
			
		||||
 | 
			
		||||
    /* Resolve symlinks. */
 | 
			
		||||
    debug(format("checking access to '%s'") % path_);
 | 
			
		||||
    Path path = canonPath(path_, true);
 | 
			
		||||
    debug(format("checking access to '%s'") % abspath);
 | 
			
		||||
    Path path = canonPath(abspath, true);
 | 
			
		||||
 | 
			
		||||
    for (auto & i : *allowedPaths) {
 | 
			
		||||
        if (isDirOrInDir(path, i)) {
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
		Loading…
	
	Add table
		Add a link
		
	
		Reference in a new issue