summaryrefslogtreecommitdiff
path: root/lib
diff options
context:
space:
mode:
authorDamien Neil <dneil@google.com>2022-11-10 12:16:27 -0800
committerDamien Neil <dneil@google.com>2022-12-06 23:50:47 +0000
commit7dc9fcb13de7bb20b11f6a526865545cc9142c2c (patch)
tree81ee5646ad7f562a29fce73744e2f43469acbd31 /lib
parente535d6776c060da5f1947c4290159be0eb60ed6c (diff)
downloadgo-git-7dc9fcb13de7bb20b11f6a526865545cc9142c2c.tar.gz
os, net/http: avoid escapes from os.DirFS and http.Dir on Windows
Do not permit access to Windows reserved device names (NUL, COM1, etc.) via os.DirFS and http.Dir filesystems. Avoid escapes from os.DirFS(`\`) on Windows. DirFS would join the the root to the relative path with a path separator, making os.DirFS(`\`).Open(`/foo/bar`) open the path `\\foo\bar`, which is a UNC name. Not only does this not open the intended file, but permits reference to any file on the system rather than only files on the current drive. Make os.DirFS("") invalid, with all file access failing. Previously, a root of "" was interpreted as "/", which is surprising and probably unintentional. Fixes CVE-2022-41720 Fixes #56694 Change-Id: I275b5fa391e6ad7404309ea98ccc97405942e0f0 Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/1663834 Reviewed-by: Tatiana Bradley <tatianabradley@google.com> Reviewed-by: Julie Qiu <julieqiu@google.com> Reviewed-on: https://go-review.googlesource.com/c/go/+/455362 Reviewed-by: Michael Pratt <mpratt@google.com> TryBot-Result: Gopher Robot <gobot@golang.org> Run-TryBot: Jenny Rakoczy <jenny@golang.org> Reviewed-on: https://go-review.googlesource.com/c/go/+/455716 Reviewed-by: Jenny Rakoczy <jenny@golang.org> Run-TryBot: Damien Neil <dneil@google.com>
Diffstat (limited to 'lib')
0 files changed, 0 insertions, 0 deletions