fix(summary): arbitrary file access during archive extraction zipslip #39896
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
cilium/cilium-cli/features/summary.go
Lines 227 to 253 in 94ac65e
Fix the issue need to validate the
file.Name
field from the ZIP archive before using it to construct file paths. Specifically:file.Name
does not contain directory traversal elements (..
) or absolute paths.filepath.Clean
to normalize the path and check that the resulting path is within the intendeddestDir
.The fix involves:
file.Name
does not contain..
or result in paths outsidedestDir
.filepath.Clean
to sanitize the path.Zip Slip Vulnerability
description and a
Fixes: #XXX
line if the commit addresses a particularGitHub issue.
Fixes: <commit-id>
tag, thenplease add the commit author[s] as reviewer[s] to this issue.
Fixes: #issue-number