Skip to content

Commit 47ec96a

Browse files
[3.8] gh-99889: Fix directory traversal security flaw in uu.decode() (GH-104096) (#104332)
(cherry picked from commit 0aeda29) Co-authored-by: Sam Carroll <70000253+samcarroll42@users.noreply.github.com>
1 parent 79e63e5 commit 47ec96a

File tree

3 files changed

+38
-1
lines changed

3 files changed

+38
-1
lines changed

Lib/test/test_uu.py

+28
Original file line numberDiff line numberDiff line change
@@ -145,6 +145,34 @@ def test_newlines_escaped(self):
145145
uu.encode(inp, out, filename)
146146
self.assertIn(safefilename, out.getvalue())
147147

148+
def test_no_directory_traversal(self):
149+
relative_bad = b"""\
150+
begin 644 ../../../../../../../../tmp/test1
151+
$86)C"@``
152+
`
153+
end
154+
"""
155+
with self.assertRaisesRegex(uu.Error, 'directory'):
156+
uu.decode(io.BytesIO(relative_bad))
157+
if os.altsep:
158+
relative_bad_bs = relative_bad.replace(b'/', b'\\')
159+
with self.assertRaisesRegex(uu.Error, 'directory'):
160+
uu.decode(io.BytesIO(relative_bad_bs))
161+
162+
absolute_bad = b"""\
163+
begin 644 /tmp/test2
164+
$86)C"@``
165+
`
166+
end
167+
"""
168+
with self.assertRaisesRegex(uu.Error, 'directory'):
169+
uu.decode(io.BytesIO(absolute_bad))
170+
if os.altsep:
171+
absolute_bad_bs = absolute_bad.replace(b'/', b'\\')
172+
with self.assertRaisesRegex(uu.Error, 'directory'):
173+
uu.decode(io.BytesIO(absolute_bad_bs))
174+
175+
148176
class UUStdIOTest(unittest.TestCase):
149177

150178
def setUp(self):

Lib/uu.py

100755100644
+8-1
Original file line numberDiff line numberDiff line change
@@ -130,7 +130,14 @@ def decode(in_file, out_file=None, mode=None, quiet=False):
130130
# If the filename isn't ASCII, what's up with that?!?
131131
out_file = hdrfields[2].rstrip(b' \t\r\n\f').decode("ascii")
132132
if os.path.exists(out_file):
133-
raise Error('Cannot overwrite existing file: %s' % out_file)
133+
raise Error(f'Cannot overwrite existing file: {out_file}')
134+
if (out_file.startswith(os.sep) or
135+
f'..{os.sep}' in out_file or (
136+
os.altsep and
137+
(out_file.startswith(os.altsep) or
138+
f'..{os.altsep}' in out_file))
139+
):
140+
raise Error(f'Refusing to write to {out_file} due to directory traversal')
134141
if mode is None:
135142
mode = int(hdrfields[1], 8)
136143
#
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,2 @@
1+
Fixed a security in flaw in :func:`uu.decode` that could allow for
2+
directory traversal based on the input if no ``out_file`` was specified.

0 commit comments

Comments
 (0)