SECURITY: force IM decoder based on file extension

This commit is contained in:
Régis Hanol 2018-07-25 22:00:04 +02:00
parent 0e84024958
commit 4bf3bf6786
3 changed files with 46 additions and 15 deletions

View File

@ -118,6 +118,14 @@ class OptimizedImage < ActiveRecord::Base
end
end
IM_DECODERS ||= /\A(jpe?g|png|tiff?|bmp|ico)\z/i
def self.prepend_decoder!(path)
extension = File.extname(path)[1..-1]
raise Discourse::InvalidAccess unless extension[IM_DECODERS]
"#{extension}:#{path}"
end
def self.thumbnail_or_resize
SiteSetting.strip_image_metadata ? "thumbnail" : "resize"
end
@ -125,6 +133,9 @@ class OptimizedImage < ActiveRecord::Base
def self.resize_instructions(from, to, dimensions, opts = {})
ensure_safe_paths!(from, to)
prepend_decoder!(from)
prepend_decoder!(to)
# NOTE: ORDER is important!
%W{
convert
@ -159,6 +170,9 @@ class OptimizedImage < ActiveRecord::Base
def self.crop_instructions(from, to, dimensions, opts = {})
ensure_safe_paths!(from, to)
prepend_decoder!(from)
prepend_decoder!(to)
%W{
convert
#{from}[0]
@ -191,6 +205,9 @@ class OptimizedImage < ActiveRecord::Base
def self.downsize_instructions(from, to, dimensions, opts = {})
ensure_safe_paths!(from, to)
prepend_decoder!(from)
prepend_decoder!(to)
%W{
convert
#{from}[0]

View File

@ -135,13 +135,19 @@ class UploadCreator
def convert_to_jpeg!
jpeg_tempfile = Tempfile.new(["image", ".jpg"])
OptimizedImage.ensure_safe_paths!(@file.path, jpeg_tempfile.path)
from = @file.path
to = jpeg_tempfile.path
OptimizedImage.ensure_safe_paths!(from, to)
OptimizedImage.prepend_decoder!(from)
OptimizedImage.prepend_decoder!(to)
begin
execute_convert(@file, jpeg_tempfile)
execute_convert(from, to)
rescue
# retry with debugging enabled
execute_convert(@file, jpeg_tempfile, true)
execute_convert(from, to, true)
end
# keep the JPEG if it's at least 15% smaller
@ -155,15 +161,18 @@ class UploadCreator
end
end
def execute_convert(input_file, output_file, debug = false)
command = ['convert', input_file.path,
'-auto-orient',
'-background', 'white',
'-interlace', 'none',
'-flatten',
'-quality', SiteSetting.png_to_jpg_quality.to_s]
command << '-debug' << 'all' if debug
command << output_file.path
def execute_convert(from, to, debug = false)
command = [
"convert",
from,
"-auto-orient",
"-background white",
"-interlace none",
"-flatten",
"-quality #{SiteSetting.png_to_jpg_quality}"
]
command << "-debug all" if debug
command << to
Discourse::Utils.execute_command(*command, failure_message: I18n.t("upload.png_to_jpg_conversion_failure_message"))
end
@ -208,8 +217,13 @@ class UploadCreator
end
def fix_orientation!
OptimizedImage.ensure_safe_paths!(@file.path)
Discourse::Utils.execute_command('convert', @file.path, '-auto-orient', @file.path)
path = @file.path
OptimizedImage.ensure_safe_paths!(path)
OptimizedImage.prepend_decoder!(path)
Discourse::Utils.execute_command('convert', path, '-auto-orient', path)
extract_image_info!
end

View File

@ -93,7 +93,7 @@ describe OptimizedImage do
}.not_to raise_error
end
it "raises nothing on paths" do
it "raises InvalidAccess error on paths" do
expect {
OptimizedImage.ensure_safe_paths!("/a.png", "/b.png", "c.png")
}.to raise_error(Discourse::InvalidAccess)