mirror of
https://github.com/openclaw/openclaw.git
synced 2026-05-08 08:41:23 +00:00
fix: harden sandbox tmp media validation (#17892) (thanks @dashed)
This commit is contained in:
@@ -88,6 +88,39 @@ describe("resolveSandboxedMediaSource", () => {
|
||||
}
|
||||
});
|
||||
|
||||
it("rejects relative traversal outside sandbox even when sandbox root is under tmpdir", async () => {
|
||||
const sandboxDir = await fs.mkdtemp(path.join(os.tmpdir(), "sandbox-media-"));
|
||||
try {
|
||||
await expect(
|
||||
resolveSandboxedMediaSource({
|
||||
media: "../outside-sandbox.png",
|
||||
sandboxRoot: sandboxDir,
|
||||
}),
|
||||
).rejects.toThrow(/sandbox/i);
|
||||
} finally {
|
||||
await fs.rm(sandboxDir, { recursive: true, force: true });
|
||||
}
|
||||
});
|
||||
|
||||
it("rejects symlinked tmpdir paths escaping tmpdir", async () => {
|
||||
if (process.platform === "win32") {
|
||||
return;
|
||||
}
|
||||
const sandboxDir = await fs.mkdtemp(path.join(os.tmpdir(), "sandbox-media-"));
|
||||
const symlinkPath = path.join(sandboxDir, "tmp-link-escape");
|
||||
try {
|
||||
await fs.symlink("/etc/passwd", symlinkPath);
|
||||
await expect(
|
||||
resolveSandboxedMediaSource({
|
||||
media: symlinkPath,
|
||||
sandboxRoot: sandboxDir,
|
||||
}),
|
||||
).rejects.toThrow(/symlink|sandbox/i);
|
||||
} finally {
|
||||
await fs.rm(sandboxDir, { recursive: true, force: true });
|
||||
}
|
||||
});
|
||||
|
||||
it("rejects file:// URLs outside sandbox", async () => {
|
||||
const sandboxDir = await fs.mkdtemp(path.join(os.tmpdir(), "sandbox-media-"));
|
||||
try {
|
||||
|
||||
@@ -90,10 +90,11 @@ export async function resolveSandboxedMediaSource(params: {
|
||||
throw new Error(`Invalid file:// URL for sandboxed media: ${raw}`);
|
||||
}
|
||||
}
|
||||
// Allow files under os.tmpdir() — consistent with buildMediaLocalRoots() defaults.
|
||||
const resolved = path.resolve(params.sandboxRoot, candidate);
|
||||
const tmpDir = os.tmpdir();
|
||||
if (resolved === tmpDir || resolved.startsWith(tmpDir + path.sep)) {
|
||||
const resolved = path.resolve(resolveSandboxInputPath(candidate, params.sandboxRoot));
|
||||
const tmpDir = path.resolve(os.tmpdir());
|
||||
const candidateIsAbsolute = path.isAbsolute(expandPath(candidate));
|
||||
if (candidateIsAbsolute && isPathInside(tmpDir, resolved)) {
|
||||
await assertNoSymlinkEscape(path.relative(tmpDir, resolved), tmpDir);
|
||||
return resolved;
|
||||
}
|
||||
const sandboxResult = await assertSandboxPath({
|
||||
|
||||
Reference in New Issue
Block a user