Signed-off-by: lvgenggeng <lvgenggeng@uniontech.com> (cherry picked from commit 353d0a2d6b6b6264e7373fb7e69869e4cd981918)
66 lines
3.0 KiB
Diff
66 lines
3.0 KiB
Diff
From 04e2f280cc4a0766bedcc7b9eb56449ceecc2ad4 Mon Sep 17 00:00:00 2001
|
|
From: Kevin Hendricks <kevin.b.hendricks@icloud.com>
|
|
Date: Thu, 27 Jun 2019 11:47:42 -0400
|
|
Subject: [PATCH 1/1] further harden against malicious epubs and produce error
|
|
message
|
|
|
|
---
|
|
src/Importers/ImportEPUB.cpp | 41 ++++++++++++++++++++++++++++++------
|
|
1 file changed, 35 insertions(+), 6 deletions(-)
|
|
|
|
diff --git a/src/Importers/ImportEPUB.cpp b/src/Importers/ImportEPUB.cpp
|
|
index 501f49f8e..2f5c25f40 100644
|
|
--- a/src/Importers/ImportEPUB.cpp
|
|
+++ b/src/Importers/ImportEPUB.cpp
|
|
@@ -425,12 +425,41 @@ void ImportEPUB::ExtractContainer()
|
|
// If there is no file name then we can't do anything with it.
|
|
if (!qfile_name.isEmpty()) {
|
|
|
|
- // for security reasons we need the file path to always be inside the
|
|
- // target folder and not outside, so we will remove all relative upward
|
|
- // paths segments ".." from the file path before prepending the target
|
|
- // folder to create the final target path
|
|
- qfile_name = qfile_name.replace("../","");
|
|
- cp437_file_name = cp437_file_name.replace("../","");
|
|
+ // for security reasons against maliciously crafted zip archives
|
|
+ // we need the file path to always be inside the target folder
|
|
+ // and not outside, so we will remove all illegal backslashes
|
|
+ // and all relative upward paths segments "/../" from the zip's local
|
|
+ // file name/path before prepending the target folder to create
|
|
+ // the final path
|
|
+
|
|
+ QString original_path = qfile_name;
|
|
+ bool evil_or_corrupt_epub = false;
|
|
+
|
|
+ if (qfile_name.contains("\\")) evil_or_corrupt_epub = true;
|
|
+ qfile_name = "/" + qfile_name.replace("\\","");
|
|
+
|
|
+ if (qfile_name.contains("/../")) evil_or_corrupt_epub = true;
|
|
+ qfile_name = qfile_name.replace("/../","/");
|
|
+
|
|
+ while(qfile_name.startsWith("/")) {
|
|
+ qfile_name = qfile_name.remove(0,1);
|
|
+ }
|
|
+
|
|
+ if (cp437_file_name.contains("\\")) evil_or_corrupt_epub = true;
|
|
+ cp437_file_name = "/" + cp437_file_name.replace("\\","");
|
|
+
|
|
+ if (cp437_file_name.contains("/../")) evil_or_corrupt_epub = true;
|
|
+ cp437_file_name = cp437_file_name.replace("/../","/");
|
|
+
|
|
+ while(cp437_file_name.startsWith("/")) {
|
|
+ cp437_file_name = cp437_file_name.remove(0,1);
|
|
+ }
|
|
+
|
|
+ if (evil_or_corrupt_epub) {
|
|
+ unzCloseCurrentFile(zfile);
|
|
+ unzClose(zfile);
|
|
+ throw (EPUBLoadParseError(QString(QObject::tr("Possible evil or corrupt epub file name: %1")).arg(original_path).toStdString()));
|
|
+ }
|
|
|
|
// We use the dir object to create the path in the temporary directory.
|
|
// Unfortunately, we need a dir ojbect to do this as it's not a static function.
|
|
--
|
|
2.20.1
|
|
|