liangyepianzhou opened a new pull request, #22077:
URL: https://github.com/apache/pulsar/pull/22077

   
   Fixes https://github.com/apache/pulsar/security/code-scanning/36
   
   ### Motivation
   
   Extracting files from a malicious zip file, or similar type of archive, is 
at risk of directory traversal attacks if filenames from the archive are not 
properly validated.
   
   Zip archives contain archive entries representing each file in the archive. 
These entries include a file path for the entry, but these file paths are not 
restricted and may contain unexpected special elements such as the directory 
traversal element (..). If these file paths are used to create a filesystem 
path, then a file operation may happen in an unexpected location. This can 
result in sensitive information being revealed or deleted, or an attacker being 
able to influence behavior by modifying unexpected files.
   
   For example, if a zip file contains a file entry `..\sneaky-file`, and the 
zip file is extracted to the directory `c:\output`, then naively combining the 
paths would result in an output file path of `c:\output\..\sneaky-file`, which 
would cause the file to be written to `c:\sneaky-file`.
   
   ### Modifications
   
   Verify that the normalized full path of the output file starts with a prefix 
that matches the destination directory.
   
   ### Verifying this change
   
   - [ ] Make sure that the change passes the CI checks.
   
   *(Please pick either of the following options)*
   
   This change is a trivial rework / code cleanup without any test coverage.
   
   *(or)*
   
   This change is already covered by existing tests, such as *(please describe 
tests)*.
   
   *(or)*
   
   This change added tests and can be verified as follows:
   
   *(example:)*
     - *Added integration tests for end-to-end deployment with large payloads 
(10MB)*
     - *Extended integration test for recovery after broker failure*
   
   ### Does this pull request potentially affect one of the following parts:
   
   <!-- DO NOT REMOVE THIS SECTION. CHECK THE PROPER BOX ONLY. -->
   
   *If the box was checked, please highlight the changes*
   
   - [ ] Dependencies (add or upgrade a dependency)
   - [ ] The public API
   - [ ] The schema
   - [ ] The default values of configurations
   - [ ] The threading model
   - [ ] The binary protocol
   - [ ] The REST endpoints
   - [ ] The admin CLI options
   - [ ] The metrics
   - [ ] Anything that affects deployment
   
   ### Documentation
   
   <!-- DO NOT REMOVE THIS SECTION. CHECK THE PROPER BOX ONLY. -->
   
   - [ ] `doc` <!-- Your PR contains doc changes. -->
   - [ ] `doc-required` <!-- Your PR changes impact docs and you will update 
later -->
   - [ ] `doc-not-needed` <!-- Your PR changes do not impact docs -->
   - [ ] `doc-complete` <!-- Docs have been already added -->
   
   ### Matching PR in forked repository
   
   PR in forked repository: <!-- ENTER URL HERE -->
   
   <!--
   After opening this PR, the build in apache/pulsar will fail and instructions 
will
   be provided for opening a PR in the PR author's forked repository.
   
   apache/pulsar pull requests should be first tested in your own fork since 
the 
   apache/pulsar CI based on GitHub Actions has constrained resources and quota.
   GitHub Actions provides separate quota for pull requests that are executed 
in 
   a forked repository.
   
   The tests will be run in the forked repository until all PR review comments 
have
   been handled, the tests pass and the PR is approved by a reviewer.
   -->
   


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: [email protected]

For queries about this service, please contact Infrastructure at:
[email protected]

Reply via email to