From cdc97ec9c3ba5afd8824c73604c6bb0c5ad1b17f Mon Sep 17 00:00:00 2001 From: Robin Appelman Date: Thu, 27 Jun 2019 11:10:08 +0200 Subject: [PATCH] verify that paths are valid for recursive local move Signed-off-by: Robin Appelman --- lib/private/Files/Storage/Local.php | 21 +++++++++++++++++++++ 1 file changed, 21 insertions(+) diff --git a/lib/private/Files/Storage/Local.php b/lib/private/Files/Storage/Local.php index 5f7232e64b3..e3e6ac783d9 100644 --- a/lib/private/Files/Storage/Local.php +++ b/lib/private/Files/Storage/Local.php @@ -39,6 +39,7 @@ namespace OC\Files\Storage; +use OC\Files\Filesystem; use OC\Files\Storage\Wrapper\Jail; use OCP\Files\ForbiddenException; use OCP\Files\Storage\IStorage; @@ -231,6 +232,18 @@ class Local extends \OC\Files\Storage\Common { } + private function treeContainsBlacklistedFile(string $path): bool { + $iterator = new \RecursiveIteratorIterator(new \RecursiveDirectoryIterator($path)); + foreach ($iterator as $file) { + /** @var \SplFileInfo $file */ + if (Filesystem::isFileBlacklisted($file->getBasename())) { + return true; + } + } + + return false; + } + public function rename($path1, $path2) { $srcParent = dirname($path1); $dstParent = dirname($path2); @@ -267,6 +280,10 @@ class Local extends \OC\Files\Storage\Common { } return $result; } + + if ($this->treeContainsBlacklistedFile($this->getSourcePath($path1))) { + throw new ForbiddenException('Invalid path', false); + } } return rename($this->getSourcePath($path1), $this->getSourcePath($path2)); @@ -362,6 +379,10 @@ class Local extends \OC\Files\Storage\Common { * @throws ForbiddenException */ public function getSourcePath($path) { + if (Filesystem::isFileBlacklisted($path)) { + throw new ForbiddenException('Invalid path', false); + } + $fullPath = $this->datadir . $path; $currentPath = $path; if ($this->allowSymlinks || $currentPath === '') { -- 2.39.5