Reuse filename_is_safe/check_filename_safe()

This commit is contained in:
RumovZ 2022-03-30 19:33:53 +02:00
parent 3c17d37d26
commit 112ad118ab
4 changed files with 41 additions and 56 deletions

View file

@ -11,15 +11,13 @@ use itertools::Itertools;
use crate::{ use crate::{
card::{CardQueue, CardType}, card::{CardQueue, CardType},
decks::NormalDeck, decks::NormalDeck,
io::filename_is_safe,
latex::extract_latex, latex::extract_latex,
prelude::*, prelude::*,
revlog::RevlogEntry, revlog::RevlogEntry,
search::{Negated, SearchNode, SortMode}, search::{Negated, SearchNode, SortMode},
storage::ids_to_string, storage::ids_to_string,
text::{ text::{extract_media_refs, extract_underscored_css_imports, extract_underscored_references},
extract_media_refs, extract_underscored_css_imports, extract_underscored_references,
is_remote_filename,
},
}; };
#[derive(Debug, Default)] #[derive(Debug, Default)]
@ -49,20 +47,7 @@ fn optional_deck_search(deck_id: Option<DeckId>) -> SearchNode {
} }
} }
fn is_local_base_name(name: &str) -> bool {
!is_remote_filename(name) && Path::new(name).parent().is_none()
}
impl ExportData { impl ExportData {
/*
pub(super) fn new(, media_folder: Option<PathBuf>) -> Self {
Self {
with_scheduling,
media_folder,
..Default::default()
}
}
*/
pub(super) fn gather_data( pub(super) fn gather_data(
&mut self, &mut self,
col: &mut Collection, col: &mut Collection,
@ -87,7 +72,7 @@ impl ExportData {
pub(super) fn gather_media_paths(&mut self, media_folder: &Path) { pub(super) fn gather_media_paths(&mut self, media_folder: &Path) {
let mut inserter = |name: &str| { let mut inserter = |name: &str| {
if is_local_base_name(name) { if filename_is_safe(name) {
self.media_paths.insert(media_folder.join(name)); self.media_paths.insert(media_folder.join(name));
} }
}; };

View file

@ -6,7 +6,7 @@ use std::{
collections::HashMap, collections::HashMap,
fs::{self, File}, fs::{self, File},
io::{self, Read, Write}, io::{self, Read, Write},
path::{Component, Path, PathBuf}, path::{Path, PathBuf},
}; };
use prost::Message; use prost::Message;
@ -21,7 +21,7 @@ use crate::{
package::{MediaEntries, MediaEntry, Meta}, package::{MediaEntries, MediaEntry, Meta},
ImportProgress, ImportProgress,
}, },
io::{atomic_rename, tempfile_in_parent_of}, io::{atomic_rename, filename_is_safe, tempfile_in_parent_of},
media::files::normalize_filename, media::files::normalize_filename,
prelude::*, prelude::*,
}; };
@ -149,7 +149,9 @@ fn restore_media_file(meta: &Meta, zip_file: &mut ZipFile, path: &Path) -> Resul
impl MediaEntry { impl MediaEntry {
fn safe_normalized_file_path(&self, meta: &Meta, media_folder: &Path) -> Result<PathBuf> { fn safe_normalized_file_path(&self, meta: &Meta, media_folder: &Path) -> Result<PathBuf> {
check_filename_safe(&self.name)?; if !filename_is_safe(&self.name) {
return Err(AnkiError::ImportError(ImportError::Corrupt));
}
let normalized = maybe_normalizing(&self.name, meta.strict_media_checks())?; let normalized = maybe_normalizing(&self.name, meta.strict_media_checks())?;
Ok(media_folder.join(normalized.as_ref())) Ok(media_folder.join(normalized.as_ref()))
} }
@ -179,20 +181,6 @@ fn maybe_normalizing(name: &str, strict: bool) -> Result<Cow<str>> {
} }
} }
/// Return an error if name contains any path separators.
fn check_filename_safe(name: &str) -> Result<()> {
let mut components = Path::new(name).components();
let first_element_normal = components
.next()
.map(|component| matches!(component, Component::Normal(_)))
.unwrap_or_default();
if !first_element_normal || components.next().is_some() {
Err(AnkiError::ImportError(ImportError::Corrupt))
} else {
Ok(())
}
}
fn extract_media_entries(meta: &Meta, archive: &mut ZipArchive<File>) -> Result<Vec<MediaEntry>> { fn extract_media_entries(meta: &Meta, archive: &mut ZipArchive<File>) -> Result<Vec<MediaEntry>> {
let mut file = archive.by_name("media")?; let mut file = archive.by_name("media")?;
let mut buf = Vec::new(); let mut buf = Vec::new();
@ -251,22 +239,6 @@ fn copy_collection(
mod test { mod test {
use super::*; use super::*;
#[test]
fn path_traversal() {
assert!(check_filename_safe("foo").is_ok(),);
assert!(check_filename_safe("..").is_err());
assert!(check_filename_safe("foo/bar").is_err());
assert!(check_filename_safe("/foo").is_err());
assert!(check_filename_safe("../foo").is_err());
if cfg!(windows) {
assert!(check_filename_safe("foo\\bar").is_err());
assert!(check_filename_safe("c:\\foo").is_err());
assert!(check_filename_safe("\\foo").is_err());
}
}
#[test] #[test]
fn normalization() { fn normalization() {
assert_eq!(&maybe_normalizing("con", false).unwrap(), "con_"); assert_eq!(&maybe_normalizing("con", false).unwrap(), "con_");

View file

@ -1,7 +1,7 @@
// Copyright: Ankitects Pty Ltd and contributors // Copyright: Ankitects Pty Ltd and contributors
// License: GNU AGPL, version 3 or later; http://www.gnu.org/licenses/agpl.html // License: GNU AGPL, version 3 or later; http://www.gnu.org/licenses/agpl.html
use std::path::Path; use std::path::{Component, Path};
use tempfile::NamedTempFile; use tempfile::NamedTempFile;
@ -42,6 +42,17 @@ pub(crate) fn read_dir_files(path: impl AsRef<Path>) -> std::io::Result<ReadDirF
std::fs::read_dir(path).map(ReadDirFiles) std::fs::read_dir(path).map(ReadDirFiles)
} }
/// True if name does not contain any path separators.
pub(crate) fn filename_is_safe(name: &str) -> bool {
let mut components = Path::new(name).components();
let first_element_normal = components
.next()
.map(|component| matches!(component, Component::Normal(_)))
.unwrap_or_default();
first_element_normal && components.next().is_none()
}
pub(crate) struct ReadDirFiles(std::fs::ReadDir); pub(crate) struct ReadDirFiles(std::fs::ReadDir);
impl Iterator for ReadDirFiles { impl Iterator for ReadDirFiles {
@ -60,3 +71,24 @@ impl Iterator for ReadDirFiles {
} }
} }
} }
#[cfg(test)]
mod test {
use super::*;
#[test]
fn path_traversal() {
assert!(filename_is_safe("foo"));
assert!(!filename_is_safe(".."));
assert!(!filename_is_safe("foo/bar"));
assert!(!filename_is_safe("/foo"));
assert!(!filename_is_safe("../foo"));
if cfg!(windows) {
assert!(!filename_is_safe("foo\\bar"));
assert!(!filename_is_safe("c:\\foo"));
assert!(!filename_is_safe("\\foo"));
}
}
}

View file

@ -437,10 +437,6 @@ lazy_static! {
pub(crate) static ref REMOTE_FILENAME: Regex = Regex::new("(?i)^https?://").unwrap(); pub(crate) static ref REMOTE_FILENAME: Regex = Regex::new("(?i)^https?://").unwrap();
} }
pub(crate) fn is_remote_filename(name: &str) -> bool {
REMOTE_FILENAME.is_match(name)
}
/// IRI-encode unescaped local paths in HTML fragment. /// IRI-encode unescaped local paths in HTML fragment.
pub(crate) fn encode_iri_paths(unescaped_html: &str) -> Cow<str> { pub(crate) fn encode_iri_paths(unescaped_html: &str) -> Cow<str> {
transform_html_paths(unescaped_html, |fname| { transform_html_paths(unescaped_html, |fname| {