This is an automated email from the ASF dual-hosted git repository.

davsclaus pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/camel.git


The following commit(s) were added to refs/heads/main by this push:
     new 343f04cb98a CAMEL-18825: Fix 
https://github.com/apache/camel/security/code-scanning/36
343f04cb98a is described below

commit 343f04cb98a20da45473527757f55623404378de
Author: Claus Ibsen <[email protected]>
AuthorDate: Mon Jan 2 15:46:09 2023 +0100

    CAMEL-18825: Fix https://github.com/apache/camel/security/code-scanning/36
---
 .../main/java/org/apache/camel/http/common/DefaultHttpBinding.java    | 4 ++++
 1 file changed, 4 insertions(+)

diff --git 
a/components/camel-http-common/src/main/java/org/apache/camel/http/common/DefaultHttpBinding.java
 
b/components/camel-http-common/src/main/java/org/apache/camel/http/common/DefaultHttpBinding.java
index 4d0033c5ae2..c372fed310f 100644
--- 
a/components/camel-http-common/src/main/java/org/apache/camel/http/common/DefaultHttpBinding.java
+++ 
b/components/camel-http-common/src/main/java/org/apache/camel/http/common/DefaultHttpBinding.java
@@ -320,6 +320,10 @@ public class DefaultHttpBinding implements HttpBinding {
             LOG.trace("HTTP attachment {} = {}", name, object);
             if (object instanceof File) {
                 String fileName = request.getParameter(name);
+                // fix file name if using malicious parameter name
+                if (fileName != null) {
+                    fileName = fileName.replaceAll("[\n\r\t]", "_");
+                }
                 // is the file name accepted
                 boolean accepted = true;
                 if (fileNameExtWhitelist != null) {

Reply via email to