Skip to content

Commit

Permalink
http: clean request path from Git endpoints (#7022)
Browse files Browse the repository at this point in the history
  • Loading branch information
unknwon committed Jun 7, 2022
1 parent e370657 commit 9bf748b
Show file tree
Hide file tree
Showing 3 changed files with 17 additions and 5 deletions.
1 change: 1 addition & 0 deletions CHANGELOG.md
Expand Up @@ -26,6 +26,7 @@ All notable changes to Gogs are documented in this file.
- _Security:_ OS Command Injection in file editor. [#7000](https://github.com/gogs/gogs/issues/7000)
- _Security:_ Sanitize `DisplayName` in repository issue list. [#7009](https://github.com/gogs/gogs/pull/7009)
- _Security:_ Path Traversal in file editor on Windows. [#7001](https://github.com/gogs/gogs/issues/7001)
- _Security:_ Path Traversal in Git HTTP endpoints. [#7002](https://github.com/gogs/gogs/issues/7002)
- Unable to use LDAP authentication on ARM machines. [#6761](https://github.com/gogs/gogs/issues/6761)
- Unable to init repository during creation on Windows. [#6967](https://github.com/gogs/gogs/issues/6967)
- Mysterious panic on `Value not found for type *repo.HTTPContext`. [#6963](https://github.com/gogs/gogs/issues/6963)
Expand Down
4 changes: 4 additions & 0 deletions internal/pathutil/pathutil_test.go
Expand Up @@ -27,6 +27,10 @@ func TestClean(t *testing.T) {
path: "/../a/b/../c/../readme.txt",
wantVal: "a/readme.txt",
},
{
path: "../../objects/info/..",
wantVal: "objects",
},
{
path: "/a/readme.txt",
wantVal: "a/readme.txt",
Expand Down
17 changes: 12 additions & 5 deletions internal/route/repo/http.go
Expand Up @@ -24,6 +24,7 @@ import (
"gogs.io/gogs/internal/conf"
"gogs.io/gogs/internal/db"
"gogs.io/gogs/internal/lazyregexp"
"gogs.io/gogs/internal/pathutil"
"gogs.io/gogs/internal/tool"
)

Expand Down Expand Up @@ -408,15 +409,21 @@ func HTTP(c *HTTPContext) {
}

if route.method != c.Req.Method {
c.NotFound()
c.Error(http.StatusNotFound)
return
}

file := strings.TrimPrefix(reqPath, m[1]+"/")
dir, err := getGitRepoPath(m[1])
cleaned := pathutil.Clean(m[1])
if m[1] != "/"+cleaned {
c.Error(http.StatusBadRequest, "Request path contains suspicious characters")
return
}

file := strings.TrimPrefix(reqPath, cleaned)
dir, err := getGitRepoPath(cleaned)
if err != nil {
log.Warn("HTTP.getGitRepoPath: %v", err)
c.NotFound()
c.Error(http.StatusNotFound)
return
}

Expand All @@ -435,5 +442,5 @@ func HTTP(c *HTTPContext) {
return
}

c.NotFound()
c.Error(http.StatusNotFound)
}

0 comments on commit 9bf748b

Please sign in to comment.