2019-07-01 06:07:58 +08:00
|
|
|
// Copyright 2015 Matthew Holt and The Caddy Authors
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
2019-05-21 11:21:33 +08:00
|
|
|
package fileserver
|
2019-05-21 07:15:38 +08:00
|
|
|
|
|
|
|
import (
|
|
|
|
"net/url"
|
2019-10-16 06:05:53 +08:00
|
|
|
"path/filepath"
|
2019-05-21 07:15:38 +08:00
|
|
|
"testing"
|
|
|
|
)
|
|
|
|
|
|
|
|
func TestSanitizedPathJoin(t *testing.T) {
|
|
|
|
// For easy reference:
|
2019-10-16 06:05:53 +08:00
|
|
|
// %2e = .
|
|
|
|
// %2f = /
|
|
|
|
// %5c = \
|
2019-05-21 07:15:38 +08:00
|
|
|
for i, tc := range []struct {
|
|
|
|
inputRoot string
|
|
|
|
inputPath string
|
|
|
|
expect string
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
inputPath: "",
|
|
|
|
expect: ".",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
inputPath: "/",
|
|
|
|
expect: ".",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
inputPath: "/foo",
|
|
|
|
expect: "foo",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
inputPath: "/foo/bar",
|
2019-10-16 06:05:53 +08:00
|
|
|
expect: filepath.Join("foo", "bar"),
|
2019-05-21 07:15:38 +08:00
|
|
|
},
|
|
|
|
{
|
|
|
|
inputRoot: "/a",
|
|
|
|
inputPath: "/foo/bar",
|
2019-10-16 06:05:53 +08:00
|
|
|
expect: filepath.Join("/", "a", "foo", "bar"),
|
2019-05-21 07:15:38 +08:00
|
|
|
},
|
|
|
|
{
|
|
|
|
inputPath: "/foo/../bar",
|
|
|
|
expect: "bar",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
inputRoot: "/a/b",
|
|
|
|
inputPath: "/foo/../bar",
|
2019-10-16 06:05:53 +08:00
|
|
|
expect: filepath.Join("/", "a", "b", "bar"),
|
2019-05-21 07:15:38 +08:00
|
|
|
},
|
|
|
|
{
|
|
|
|
inputRoot: "/a/b",
|
|
|
|
inputPath: "/..%2fbar",
|
2019-10-16 06:05:53 +08:00
|
|
|
expect: filepath.Join("/", "a", "b", "bar"),
|
2019-05-21 07:15:38 +08:00
|
|
|
},
|
|
|
|
{
|
|
|
|
inputRoot: "/a/b",
|
|
|
|
inputPath: "/%2e%2e%2fbar",
|
2019-10-16 06:05:53 +08:00
|
|
|
expect: filepath.Join("/", "a", "b", "bar"),
|
2019-05-21 07:15:38 +08:00
|
|
|
},
|
|
|
|
{
|
|
|
|
inputRoot: "/a/b",
|
|
|
|
inputPath: "/%2e%2e%2f%2e%2e%2f",
|
2019-10-16 06:05:53 +08:00
|
|
|
expect: filepath.Join("/", "a", "b"),
|
2019-05-21 07:15:38 +08:00
|
|
|
},
|
2019-10-16 06:05:53 +08:00
|
|
|
{
|
|
|
|
inputRoot: "C:\\www",
|
|
|
|
inputPath: "/foo/bar",
|
|
|
|
expect: filepath.Join("C:\\www", "foo", "bar"),
|
|
|
|
},
|
|
|
|
// TODO: test more windows paths... on windows... sigh.
|
2019-05-21 07:15:38 +08:00
|
|
|
} {
|
|
|
|
// we don't *need* to use an actual parsed URL, but it
|
|
|
|
// adds some authenticity to the tests since real-world
|
|
|
|
// values will be coming in from URLs; thus, the test
|
|
|
|
// corpus can contain paths as encoded by clients, which
|
|
|
|
// more closely emulates the actual attack vector
|
|
|
|
u, err := url.Parse("http://test:9999" + tc.inputPath)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Test %d: invalid URL: %v", i, err)
|
|
|
|
}
|
|
|
|
actual := sanitizedPathJoin(tc.inputRoot, u.Path)
|
|
|
|
if actual != tc.expect {
|
|
|
|
t.Errorf("Test %d: [%s %s] => %s (expected %s)", i, tc.inputRoot, tc.inputPath, actual, tc.expect)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2019-05-21 11:21:33 +08:00
|
|
|
|
|
|
|
// TODO: test fileHidden
|