sigil/further-harden-against-malicious-epubs-and-produce-e.patch
lvgenggeng 0f07972996 fix CVE-2019-14452
Signed-off-by: lvgenggeng <lvgenggeng@uniontech.com>
(cherry picked from commit 353d0a2d6b6b6264e7373fb7e69869e4cd981918)
2023-11-16 16:31:23 +08:00

66 lines
3.0 KiB
Diff

From 04e2f280cc4a0766bedcc7b9eb56449ceecc2ad4 Mon Sep 17 00:00:00 2001
From: Kevin Hendricks <kevin.b.hendricks@icloud.com>
Date: Thu, 27 Jun 2019 11:47:42 -0400
Subject: [PATCH 1/1] further harden against malicious epubs and produce error
message
---
src/Importers/ImportEPUB.cpp | 41 ++++++++++++++++++++++++++++++------
1 file changed, 35 insertions(+), 6 deletions(-)
diff --git a/src/Importers/ImportEPUB.cpp b/src/Importers/ImportEPUB.cpp
index 501f49f8e..2f5c25f40 100644
--- a/src/Importers/ImportEPUB.cpp
+++ b/src/Importers/ImportEPUB.cpp
@@ -425,12 +425,41 @@ void ImportEPUB::ExtractContainer()
// If there is no file name then we can't do anything with it.
if (!qfile_name.isEmpty()) {
- // for security reasons we need the file path to always be inside the
- // target folder and not outside, so we will remove all relative upward
- // paths segments ".." from the file path before prepending the target
- // folder to create the final target path
- qfile_name = qfile_name.replace("../","");
- cp437_file_name = cp437_file_name.replace("../","");
+ // for security reasons against maliciously crafted zip archives
+ // we need the file path to always be inside the target folder
+ // and not outside, so we will remove all illegal backslashes
+ // and all relative upward paths segments "/../" from the zip's local
+ // file name/path before prepending the target folder to create
+ // the final path
+
+ QString original_path = qfile_name;
+ bool evil_or_corrupt_epub = false;
+
+ if (qfile_name.contains("\\")) evil_or_corrupt_epub = true;
+ qfile_name = "/" + qfile_name.replace("\\","");
+
+ if (qfile_name.contains("/../")) evil_or_corrupt_epub = true;
+ qfile_name = qfile_name.replace("/../","/");
+
+ while(qfile_name.startsWith("/")) {
+ qfile_name = qfile_name.remove(0,1);
+ }
+
+ if (cp437_file_name.contains("\\")) evil_or_corrupt_epub = true;
+ cp437_file_name = "/" + cp437_file_name.replace("\\","");
+
+ if (cp437_file_name.contains("/../")) evil_or_corrupt_epub = true;
+ cp437_file_name = cp437_file_name.replace("/../","/");
+
+ while(cp437_file_name.startsWith("/")) {
+ cp437_file_name = cp437_file_name.remove(0,1);
+ }
+
+ if (evil_or_corrupt_epub) {
+ unzCloseCurrentFile(zfile);
+ unzClose(zfile);
+ throw (EPUBLoadParseError(QString(QObject::tr("Possible evil or corrupt epub file name: %1")).arg(original_path).toStdString()));
+ }
// We use the dir object to create the path in the temporary directory.
// Unfortunately, we need a dir ojbect to do this as it's not a static function.
--
2.20.1