mirror of
https://github.com/discourse/discourse.git
synced 2024-11-25 09:42:07 +08:00
DEV: Raise exception when execute_command will spawn a shell (#12716)
This commit is contained in:
parent
eb99ecf1d2
commit
0ec5fd5262
|
@ -95,10 +95,16 @@ module Discourse
|
|||
|
||||
private
|
||||
|
||||
def execute_command(*command, timeout: nil, failure_message: "", success_status_codes: [0], chdir: ".")
|
||||
def execute_command(*command, timeout: nil, failure_message: "", success_status_codes: [0], chdir: ".", unsafe_shell: false)
|
||||
env = nil
|
||||
env = command.shift if command[0].is_a?(Hash)
|
||||
|
||||
if !unsafe_shell && (command.length == 1) && command[0].include?(" ")
|
||||
# Sending a single string to Process.spawn will launch a shell
|
||||
# This means various things (e.g. subshells) are possible, and could present injection risk
|
||||
raise "Arguments should be provided as separate strings"
|
||||
end
|
||||
|
||||
if timeout
|
||||
# will send a TERM after timeout
|
||||
# will send a KILL after timeout * 2
|
||||
|
|
|
@ -438,6 +438,21 @@ describe Discourse do
|
|||
has_checked_chdir = true
|
||||
thread.join
|
||||
end
|
||||
|
||||
it "raises error for unsafe shell" do
|
||||
expect(Discourse::Utils.execute_command("pwd").strip).to eq(Rails.root.to_s)
|
||||
|
||||
expect do
|
||||
Discourse::Utils.execute_command("echo a b c")
|
||||
end.to raise_error(RuntimeError)
|
||||
|
||||
expect do
|
||||
Discourse::Utils.execute_command({ "ENV1" => "VAL" }, "echo a b c")
|
||||
end.to raise_error(RuntimeError)
|
||||
|
||||
expect(Discourse::Utils.execute_command("echo", "a", "b", "c").strip).to eq("a b c")
|
||||
expect(Discourse::Utils.execute_command("echo a b c", unsafe_shell: true).strip).to eq("a b c")
|
||||
end
|
||||
end
|
||||
|
||||
end
|
||||
|
|
Loading…
Reference in New Issue
Block a user