-
-
Notifications
You must be signed in to change notification settings - Fork 294
Symlink path traversal vulnerability #282
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Summary
The package does not check if symlinks are pointing to paths outside the extraction directory
Steps to Reproduce
1- Generate
payload.zip
using the following code:2- Extract
payload.zip
usingunzipItem
Expected Results
evil_symlink
is not linked back after extractionActual Results
evil_symlink
is linked back after extractionTechnical details
Upon extraction, the package passes the path coming from the zip entry directly to
fileManager.createSymbolicLink
without checking that it is located within extraction directoryThe text was updated successfully, but these errors were encountered: