-
-
Notifications
You must be signed in to change notification settings - Fork 5.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SECURITY: prevent DeleteFilePost doing arbitrary deletion #5631
Conversation
Codecov Report
@@ Coverage Diff @@
## master #5631 +/- ##
=========================================
Coverage ? 37.81%
=========================================
Files ? 322
Lines ? 47485
Branches ? 0
=========================================
Hits ? 17957
Misses ? 26939
Partials ? 2589
Continue to review full report at Codecov.
|
@go-gitea/owners I think we have to backport this to 1.6 since this is quite critical IMHO. |
This commit wraps more of the TreePaths with cleanUploadFileName Signed-off-by: Andrew Thornton <[email protected]>
9663346
to
d87fcfc
Compare
@zeripath thanks for PR :) as @jonasfranz has said, please backport to both release/v1.7 and release/v1.6 |
…itea#5631) This commit wraps more of the TreePaths with cleanUploadFileName Signed-off-by: Andrew Thornton <[email protected]>
…itea#5631) This commit wraps more of the TreePaths with cleanUploadFileName Signed-off-by: Andrew Thornton <[email protected]>
… (#5634) This commit wraps more of the TreePaths with cleanUploadFileName Signed-off-by: Andrew Thornton <[email protected]>
… (#5635) This commit wraps more of the TreePaths with cleanUploadFileName Signed-off-by: Andrew Thornton <[email protected]>
Unfortunately a suitably malformed request to DeleteFilePost will allow arbitrary deletion. Further it was also possible to adjust the .git directories on editFilePost and UploadFilePost.