87f03a9eb8
the first except this issue is triggered by prefixing the .. sequence with certain non-printable characters which are filtered out resulting in just the .. sequence.
83 lines
3.1 KiB
Plaintext
83 lines
3.1 KiB
Plaintext
$OpenBSD: patch-unix_unix_c,v 1.1 2003/07/02 16:03:59 brad Exp $
|
|
--- unix/unix.c.orig Mon Jan 21 17:54:42 2002
|
|
+++ unix/unix.c Wed Jul 2 11:48:50 2003
|
|
@@ -421,7 +421,8 @@ int mapname(__G__ renamed)
|
|
*/
|
|
{
|
|
char pathcomp[FILNAMSIZ]; /* path-component buffer */
|
|
- char *pp, *cp=(char *)NULL; /* character pointers */
|
|
+ char *pp, *cp=(char *)NULL, /* character pointers */
|
|
+ *dp=(char *)NULL;
|
|
char *lastsemi=(char *)NULL; /* pointer to last semi-colon in pathcomp */
|
|
#ifdef ACORN_FTYPE_NFS
|
|
char *lastcomma=(char *)NULL; /* pointer to last comma in pathcomp */
|
|
@@ -429,6 +430,7 @@ int mapname(__G__ renamed)
|
|
#endif
|
|
int quote = FALSE; /* flags */
|
|
int killed_ddot = FALSE; /* is set when skipping "../" pathcomp */
|
|
+ int snarf_ddot = FALSE; /* Is set while scanning for "../" */
|
|
int error = MPN_OK;
|
|
register unsigned workch; /* hold the character being tested */
|
|
|
|
@@ -467,6 +469,9 @@ int mapname(__G__ renamed)
|
|
while ((workch = (uch)*cp++) != 0) {
|
|
|
|
if (quote) { /* if character quoted, */
|
|
+ if ((pp == pathcomp) && (workch == '.'))
|
|
+ /* Oh no you don't... */
|
|
+ goto ddot_hack;
|
|
*pp++ = (char)workch; /* include it literally */
|
|
quote = FALSE;
|
|
} else
|
|
@@ -481,15 +486,44 @@ int mapname(__G__ renamed)
|
|
break;
|
|
|
|
case '.':
|
|
- if (pp == pathcomp) { /* nothing appended yet... */
|
|
+ if (pp == pathcomp) {
|
|
+ddot_hack:
|
|
+ /* nothing appended yet... */
|
|
if (*cp == '/') { /* don't bother appending "./" to */
|
|
++cp; /* the path: skip behind the '/' */
|
|
break;
|
|
- } else if (!uO.ddotflag && *cp == '.' && cp[1] == '/') {
|
|
- /* "../" dir traversal detected */
|
|
- cp += 2; /* skip over behind the '/' */
|
|
- killed_ddot = TRUE; /* set "show message" flag */
|
|
- break;
|
|
+ } else if (!uO.ddotflag) {
|
|
+
|
|
+ /*
|
|
+ * SECURITY: Skip past control characters if the user
|
|
+ * didn't OK use of absolute pathnames. lhh - this is
|
|
+ * a very quick, ugly, inefficient fix.
|
|
+ */
|
|
+ dp = cp;
|
|
+ do {
|
|
+ workch = (uch)(*dp);
|
|
+ if (workch == '/' && snarf_ddot) {
|
|
+ /* "../" dir traversal detected */
|
|
+ cp = dp + 1; /* skip past the '/' */
|
|
+ killed_ddot = TRUE; /* set "show msg" flag */
|
|
+ break;
|
|
+ } else if (workch == '.' && !snarf_ddot) {
|
|
+ snarf_ddot = TRUE;
|
|
+ } else if (isprint(workch) ||
|
|
+ ((workch > 127) && (workch <= 254))) {
|
|
+ /*
|
|
+ * Since we found a printable, non-ctrl char,
|
|
+ * we can stop looking for '../', the amount
|
|
+ * in ../!
|
|
+ */
|
|
+ break;
|
|
+ }
|
|
+
|
|
+ dp++;
|
|
+ } while (*dp != 0);
|
|
+
|
|
+ if (killed_ddot)
|
|
+ break;
|
|
}
|
|
}
|
|
*pp++ = '.';
|