Skip to content

Commit 1f6615b

Browse files
committed
Check whether filename is a child of the current file (Fixes #341)
1 parent e5084ed commit 1f6615b

File tree

3 files changed

+100
-17
lines changed

3 files changed

+100
-17
lines changed

src/main/java/net/schmizz/sshj/xfer/FileSystemFile.java

+36-10
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,7 @@
2121
import java.io.*;
2222
import java.util.ArrayList;
2323
import java.util.List;
24+
import java.util.Stack;
2425

2526
public class FileSystemFile
2627
implements LocalSourceFile, LocalDestFile {
@@ -83,8 +84,9 @@ public boolean accept(File file) {
8384
}
8485
});
8586

86-
if (childFiles == null)
87+
if (childFiles == null) {
8788
throw new IOException("Error listing files in directory: " + this);
89+
}
8890

8991
final List<FileSystemFile> children = new ArrayList<FileSystemFile>();
9092
for (File f : childFiles) {
@@ -113,12 +115,13 @@ public long getLastModifiedTime()
113115
@Override
114116
public int getPermissions()
115117
throws IOException {
116-
if (isDirectory())
118+
if (isDirectory()) {
117119
return 0755;
118-
else if (isFile())
120+
} else if (isFile()) {
119121
return 0644;
120-
else
122+
} else {
121123
throw new IOException("Unsupported file type");
124+
}
122125
}
123126

124127
@Override
@@ -130,8 +133,9 @@ public void setLastAccessedTime(long t)
130133
@Override
131134
public void setLastModifiedTime(long t)
132135
throws IOException {
133-
if (!file.setLastModified(t * 1000))
136+
if (!file.setLastModified(t * 1000)) {
134137
log.warn("Could not set last modified time for {} to {}", file, t);
138+
}
135139
}
136140

137141
@Override
@@ -143,22 +147,41 @@ public void setPermissions(int perms)
143147
!(FilePermission.OTH_W.isIn(perms) || FilePermission.GRP_W.isIn(perms)));
144148
final boolean x = file.setExecutable(FilePermission.USR_X.isIn(perms),
145149
!(FilePermission.OTH_X.isIn(perms) || FilePermission.GRP_X.isIn(perms)));
146-
if (!(r && w && x))
150+
if (!(r && w && x)) {
147151
log.warn("Could not set permissions for {} to {}", file, Integer.toString(perms, 16));
152+
}
148153
}
149154

150155
@Override
151156
public FileSystemFile getChild(String name) {
157+
validateIsChildPath(name);
152158
return new FileSystemFile(new File(file, name));
153159
}
154160

161+
private void validateIsChildPath(String name) {
162+
String[] split = name.split("/");
163+
Stack<String> s = new Stack<String>();
164+
for (String component : split) {
165+
if (component == null || component.isEmpty() || component.equals(".")) {
166+
continue;
167+
} else if (component.equals("..") && !s.isEmpty()) {
168+
s.pop();
169+
continue;
170+
} else if (component.equals("..")) {
171+
throw new IllegalArgumentException("Cannot traverse higher than " + file + " to get child " + name);
172+
}
173+
s.push(component);
174+
}
175+
}
176+
155177
@Override
156178
public FileSystemFile getTargetFile(String filename)
157179
throws IOException {
158180
FileSystemFile f = this;
159181

160-
if (f.isDirectory())
182+
if (f.isDirectory()) {
161183
f = f.getChild(filename);
184+
}
162185

163186
if (!f.getFile().exists()) {
164187
if (!f.getFile().createNewFile())
@@ -174,12 +197,15 @@ public FileSystemFile getTargetDirectory(String dirname)
174197
throws IOException {
175198
FileSystemFile f = this;
176199

177-
if (f.getFile().exists())
200+
if (f.getFile().exists()) {
178201
if (f.isDirectory()) {
179-
if (!f.getName().equals(dirname))
202+
if (!f.getName().equals(dirname)) {
180203
f = f.getChild(dirname);
181-
} else
204+
}
205+
} else {
182206
throw new IOException(f + " - already exists as a file; directory required");
207+
}
208+
}
183209

184210
if (!f.getFile().exists() && !f.getFile().mkdir())
185211
throw new IOException("Failed to create directory: " + f);

src/main/java/net/schmizz/sshj/xfer/scp/SCPDownloadClient.java

+10-7
Original file line numberDiff line numberDiff line change
@@ -75,9 +75,9 @@ private void startCopy(String sourcePath, LocalDestFile targetFile, ScpCommandLi
7575
engine.signal("Start status OK");
7676

7777
String msg = engine.readMessage();
78-
do
78+
do {
7979
process(engine.getTransferListener(), null, msg, targetFile);
80-
while (!(msg = engine.readMessage()).isEmpty());
80+
} while (!(msg = engine.readMessage()).isEmpty());
8181
}
8282

8383
private long parseLong(String longString, String valType)
@@ -93,15 +93,17 @@ private long parseLong(String longString, String valType)
9393

9494
private int parsePermissions(String cmd)
9595
throws SCPException {
96-
if (cmd.length() != 5)
96+
if (cmd.length() != 5) {
9797
throw new SCPException("Could not parse permissions from `" + cmd + "`");
98+
}
9899
return Integer.parseInt(cmd.substring(1), 8);
99100
}
100101

101102
private boolean process(TransferListener listener, String bufferedTMsg, String msg, LocalDestFile f)
102103
throws IOException {
103-
if (msg.length() < 1)
104+
if (msg.length() < 1) {
104105
throw new SCPException("Could not parse message `" + msg + "`");
106+
}
105107

106108
switch (msg.charAt(0)) {
107109

@@ -139,8 +141,9 @@ private void processDirectory(TransferListener listener, String dMsg, String tMs
139141
final List<String> dMsgParts = tokenize(dMsg, 3, true); // D<perms> 0 <dirname>
140142
final long length = parseLong(dMsgParts.get(1), "dir length");
141143
final String dirname = dMsgParts.get(2);
142-
if (length != 0)
144+
if (length != 0) {
143145
throw new IOException("Remote SCP command sent strange directory length: " + length);
146+
}
144147

145148
final TransferListener dirListener = listener.directory(dirname);
146149
{
@@ -186,9 +189,9 @@ private void setAttributes(LocalDestFile f, int perms, String tMsg)
186189
private static List<String> tokenize(String msg, int totalParts, boolean consolidateTail)
187190
throws IOException {
188191
List<String> parts = Arrays.asList(msg.split(" "));
189-
if (parts.size() < totalParts ||
190-
(!consolidateTail && parts.size() != totalParts))
192+
if (parts.size() < totalParts || (!consolidateTail && parts.size() != totalParts)) {
191193
throw new IOException("Could not parse message received from remote SCP: " + msg);
194+
}
192195

193196
if (consolidateTail && totalParts < parts.size()) {
194197
final StringBuilder sb = new StringBuilder(parts.get(totalParts - 1));
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,54 @@
1+
/*
2+
* Copyright (C)2009 - SSHJ Contributors
3+
*
4+
* Licensed under the Apache License, Version 2.0 (the "License");
5+
* you may not use this file except in compliance with the License.
6+
* You may obtain a copy of the License at
7+
*
8+
* http://www.apache.org/licenses/LICENSE-2.0
9+
*
10+
* Unless required by applicable law or agreed to in writing, software
11+
* distributed under the License is distributed on an "AS IS" BASIS,
12+
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13+
* See the License for the specific language governing permissions and
14+
* limitations under the License.
15+
*/
16+
package net.schmizz.sshj.xfer
17+
18+
import spock.lang.Specification
19+
20+
class FileSystemFileSpec extends Specification {
21+
22+
def "should get child path"() {
23+
given:
24+
def file = new FileSystemFile("foo")
25+
26+
when:
27+
def child = file.getChild("bar")
28+
29+
then:
30+
child.getName() == "bar"
31+
}
32+
33+
def "should not traverse higher than original path when getChild is called"() {
34+
given:
35+
def file = new FileSystemFile("foo")
36+
37+
when:
38+
file.getChild("bar/.././foo/../../")
39+
40+
then:
41+
thrown(IllegalArgumentException.class)
42+
}
43+
44+
def "should ignore double slash (empty path component)"() {
45+
given:
46+
def file = new FileSystemFile("foo")
47+
48+
when:
49+
def child = file.getChild("bar//etc/passwd")
50+
51+
then:
52+
child.getFile().getPath() endsWith "foo/bar/etc/passwd"
53+
}
54+
}

0 commit comments

Comments
 (0)