Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Please specify the area for this PR
Vulnerability fixes
What does does this PR do / why we need it:
This PR aims to add a fix that ensures no malicious files can be added to an
archive.tar
file that is being read. Currently thefilepath.Join
andfilepath.Clean
functions are not properly accounting for paths added in a relative fashion (ie. "../../filename") and only properly cleans file paths that start with a leading slash. This fix adds that leading slash to all filepaths (relative or absolute) before the cleaning process, this ensures that no filepath can leave the confines of its parent by escaping out. The cleaning process removes any redundant double slashes that may arise because we are prepending the leading slash.Which issue(s) this PR fixes:
No public issue
PR acceptance criteria:
Documentation (WIP)
How to test changes / Special notes to the reviewer: