mirror of
https://github.com/HifiExperiments/overte.git
synced 2025-04-05 17:37:48 +02:00
Adding tarfile member sanitization to extractall()
This commit is contained in:
parent
f914be119a
commit
d211403334
1 changed files with 20 additions and 1 deletions
|
@ -131,7 +131,26 @@ def downloadAndExtract(url, destPath, hash=None, hasher=hashlib.sha512(), isZip=
|
|||
else:
|
||||
# Extract the archive
|
||||
with tarfile.open(tempFileName, 'r:*') as tgz:
|
||||
tgz.extractall(destPath)
|
||||
def is_within_directory(directory, target):
|
||||
|
||||
abs_directory = os.path.abspath(directory)
|
||||
abs_target = os.path.abspath(target)
|
||||
|
||||
prefix = os.path.commonprefix([abs_directory, abs_target])
|
||||
|
||||
return prefix == abs_directory
|
||||
|
||||
def safe_extract(tar, path=".", members=None, *, numeric_owner=False):
|
||||
|
||||
for member in tar.getmembers():
|
||||
member_path = os.path.join(path, member.name)
|
||||
if not is_within_directory(path, member_path):
|
||||
raise Exception("Attempted Path Traversal in Tar File")
|
||||
|
||||
tar.extractall(path, members, numeric_owner=numeric_owner)
|
||||
|
||||
|
||||
safe_extract(tgz, destPath)
|
||||
os.remove(tempFileName)
|
||||
|
||||
def readEnviromentVariableFromFile(buildRootDir, var):
|
||||
|
|
Loading…
Reference in a new issue