SPR-8515 Check for traversal to parent directory via ../ in resource requests
This commit is contained in:
parent
5d2a84f39a
commit
fd7e0b405b
|
|
@ -18,6 +18,7 @@ package org.springframework.web.servlet.resource;
|
||||||
|
|
||||||
import java.io.IOException;
|
import java.io.IOException;
|
||||||
import java.util.List;
|
import java.util.List;
|
||||||
|
|
||||||
import javax.servlet.ServletException;
|
import javax.servlet.ServletException;
|
||||||
import javax.servlet.http.HttpServletRequest;
|
import javax.servlet.http.HttpServletRequest;
|
||||||
import javax.servlet.http.HttpServletResponse;
|
import javax.servlet.http.HttpServletResponse;
|
||||||
|
|
@ -142,7 +143,7 @@ public class ResourceHttpRequestHandler extends WebContentGenerator implements H
|
||||||
HandlerMapping.PATH_WITHIN_HANDLER_MAPPING_ATTRIBUTE + "' is not set");
|
HandlerMapping.PATH_WITHIN_HANDLER_MAPPING_ATTRIBUTE + "' is not set");
|
||||||
}
|
}
|
||||||
|
|
||||||
if (!StringUtils.hasText(path) || path.contains("WEB-INF") || path.contains("META-INF")) {
|
if (!StringUtils.hasText(path) || isInvalidPath(path)) {
|
||||||
if (logger.isDebugEnabled()) {
|
if (logger.isDebugEnabled()) {
|
||||||
logger.debug("Ignoring invalid resource path [" + path + "]");
|
logger.debug("Ignoring invalid resource path [" + path + "]");
|
||||||
}
|
}
|
||||||
|
|
@ -172,6 +173,15 @@ public class ResourceHttpRequestHandler extends WebContentGenerator implements H
|
||||||
return null;
|
return null;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns {@code true} if the given path is not a valid resource path.
|
||||||
|
* The default implementation rejects paths containing "WEB-INF" or "META-INF" as well as paths with
|
||||||
|
* relative paths ("../") that result in access of a parent directory.
|
||||||
|
*/
|
||||||
|
protected boolean isInvalidPath(String path) {
|
||||||
|
return (path.contains("WEB-INF") || path.contains("META-INF") || StringUtils.cleanPath(path).startsWith(".."));
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Determine an appropriate media type for the given resource.
|
* Determine an appropriate media type for the given resource.
|
||||||
* @param resource the resource to check
|
* @param resource the resource to check
|
||||||
|
|
|
||||||
|
|
@ -122,6 +122,22 @@ public class ResourceHttpRequestHandlerTests {
|
||||||
assertEquals("function foo() { console.log(\"hello world\"); }", response.getContentAsString());
|
assertEquals("function foo() { console.log(\"hello world\"); }", response.getContentAsString());
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void getResourceViaDirectoryTraversal() throws Exception {
|
||||||
|
MockHttpServletRequest request = new MockHttpServletRequest();
|
||||||
|
request.setMethod("GET");
|
||||||
|
|
||||||
|
request.setAttribute(HandlerMapping.PATH_WITHIN_HANDLER_MAPPING_ATTRIBUTE, "../testsecret/secret.txt");
|
||||||
|
MockHttpServletResponse response = new MockHttpServletResponse();
|
||||||
|
handler.handleRequest(request, response);
|
||||||
|
assertEquals(404, response.getStatus());
|
||||||
|
|
||||||
|
request.setAttribute(HandlerMapping.PATH_WITHIN_HANDLER_MAPPING_ATTRIBUTE, "test/../../testsecret/secret.txt");
|
||||||
|
response = new MockHttpServletResponse();
|
||||||
|
handler.handleRequest(request, response);
|
||||||
|
assertEquals(404, response.getStatus());
|
||||||
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void notModified() throws Exception {
|
public void notModified() throws Exception {
|
||||||
MockHttpServletRequest request = new MockHttpServletRequest();
|
MockHttpServletRequest request = new MockHttpServletRequest();
|
||||||
|
|
|
||||||
Loading…
Reference in New Issue